Next Article in Journal
Infinite Turing Bifurcations in Chains of Van der Pol Systems
Next Article in Special Issue
Quantum Communication with Polarization-Encoded Qubits under Majorization Monotone Dynamics
Previous Article in Journal
A Novel Bio-Inspired Motion Direction Detection Mechanism in Binary and Grayscale Background
Previous Article in Special Issue
Towards Quantum Noise Squeezing for 2-Micron Light with Tellurite and Chalcogenide Fibers with Large Kerr Nonlinearity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Continuous Variable Quantum Secret Sharing with Security Enhancement in Practical Quantum Communications

1
School of Information Engineering, Shaoyang University, Shaoyang 422000, China
2
School of Automation, Central South University, Changsha 410083, China
3
School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2022, 10(20), 3768; https://doi.org/10.3390/math10203768
Submission received: 24 September 2022 / Revised: 10 October 2022 / Accepted: 11 October 2022 / Published: 13 October 2022
(This article belongs to the Special Issue Advances in Quantum Optics and Quantum Information)

Abstract

:
Quantum communications can be conveniently implemented by two participants, but quantum secret key sharing (QSS) through multi-participant communication seems difficult in practice. In this paper, we propose a multi-participant QSS scheme with the local local oscillator (LLO) in continuous variable (CV) quantum communications. It allows an honest participant called a dealer to share a secret key with the others, making it possible to establish a secret key if and only if all participants gather together. The LLO scheme, which eliminates the need for the local oscillator (LO) to be propagated in insecure channels, can be used to avoid the potential LO attack in the traditional CVQSS scheme. Numerical simulation shows that the performance of the LLO-based CVQSS can be improved in terms of the maximal transmission distance even if it is performed with the partially trusted noise.

1. Introduction

Continuous variable quantum communications, which has the advantage of compatibility and convenience in signal preparations [1,2], has been proposed for secure communications with two participants. With the popularization of networks, however, the demand for multi-participant quantum communication increases. In order to establish a multi-participant approach to network, we consider implementations of quantum secret sharing (QSS) [3,4,5], where the secret message or information is divided into many pieces and sent to all users who participate in sharing information. The legal users can recover the initial message only if they cooperate together.
The traditional QSS was the discrete variable (DV) QSS [3,4,5] since it uses the single-photon for the signal single-photon source and single-photon detector for detection. Whereas, for CVQSS, it employs continuous light for the signal source and uses either a homodyne detector or heterodyne detector for detection. There is an advantage since it can be carried out by using the existing optical communication technology, resulting in good compatibility and usability [6]. After CVQSS was suggested in feasible implementations [7,8], lots of schemes on CVQSS have been proposed, which involve the detection of eavesdroppers, the modulation of coherent states, and so on [9,10]. However, there are few studies on security enhancement that are related to the key distribution in quantum communications.
Motivated by structure characteristics of the CV quantum communication systems [11], the propagation of local oscillator (LO) between the sender and the receiver is a necessary factor for security assurance [12,13]. Taking into account the performance improvement [14,15], we consider the local local oscillator (LLO)-based CVQSS. Different from the previous CVQSS that involves the LO used to avoid the practical security problems of coherent detection [12], the proposed CVQSS can be implemented with the LLO-based detection scheme, aiming at security enhancement. Consequently, it provides an advantage because the LLO can be used to eliminate the potential dangers through insecure channels, such as the wavelength attack, the LO fluctuation attack, and the LO polarization attack [16,17]. However, when the LLO scheme is implemented in CVQSS for a large number of users, the performance of the system becomes worse. Fortunately, we can make the part of phase noise regarded as reliable to improve the performance, where the trusted part of phase noise is overestimated [18]. As the dealer needs to establish quantum communication links with all legal users, we can achieve security enhancement while making use of the partially trusted noises.
This paper is organized as follows. In Section 2, we suggest an approach to the implementation of the LLO-based CVQSS. In Section 3, we demonstrate the security analysis of the CVQSS system. Moreover, we perform numerical simulations to prove its feasibility in practical implementation, which includes the number of users, the maximal transmission distance and the secure key rate. Finally, the conclusion is drawn in Section 4.

2. The LLO-Based CVQSS

In the QSS scheme, each legal user U i can send the discretely modulated coherent states (DMCS), denoted by u i { ( x i , p i ) : x i + i p i } for i Z n = { 1 , 2 , , n } , to the dealer, and then recover the secret in cooperation by using the highly asymmetric beam splitter (HABS). The QSS scheme can be designed as follows.
Step 1. The user who is the farthest from the dealer can be arranged as the first user U 1 , as shown in Figure 1. For all legal users U = { U i : i Z n } , the user who is nearest to U i but has not been selected as U i + 1 for i Z n . In this way, we define the order of n participants.
Step 2. U 1 prepares u 1 with phase reference, where both the signal and the phase reference are synchronously generated by using the same laser [11]. Then, U 1 sends them to U 2 . Subsequently, U 2 prepares u 2 with phase reference and couples them to the same mode as U 1 has. Finally, U n sends the final mode to the dealer.
Because the displacement of each user is ( x i , p i ) , the resulting signal which is received by the dealer can be expressed as ( x d , p d ) with
x d = i = 1 n T i x i , p d = i = 1 n T i p i ,
where T i is the i-th channel transmittance established between U i and the dealer.
Step 3. Repeat the above steps to ensure all participants hold sufficient raw data. In order to estimate T i , the dealer requests all participants to announce the corresponding data in a random subset of raw data. After that, they discard the disclosed data.
Step 4. All users U achieve the key K according to the calculation K = i = 1 n K i , where K i is the devision of u i .
Assuming that U i is honest, the dealer chooses a random subset of remaining raw data while asking all users U except U i to announce their raw data, respectively. Following the resulting data, the measurements will be updated as
x r i = x d j i n T j x j , p r i = p d j i n T j p j ,
for i , j Z n . When establishing the link T i between the dealer and U i , we can achieve the secret key rate R i . Subsequently, a lower bound of the final secret key rate R of CVQSS can be expressed as R = min R i : i Z n [19].
When considering the characteristics of R for the LLO-based CVQSS, we take into account the effect of the phase noise given by [20]
ξ phase = 2 V A 1 e V est 2 ,
where V A denotes the modulation variance, V est is the variance of the phase noise given by V est = var θ S θ ^ S with the real phase rotation value θ S and the estimated value θ ^ S . The analysis and extrapolation of V est are detailed in Appendix A, where the relations of the trusted phase noise, the total channel added noise, the total detection added noise and the total added noise has been derived in details.

3. Performance Analysis

3.1. Derivation of the Secret Key Rate

We have achieved the secret key rate R of the LLO-based QSS system for U. The secret key rate can be obtained from the longest transmission distance when each user U i has an equal amount of noise ξ tot , including the phase noise ξ 0 phase and ξ rest [19]. Without loss of generality, Alice is the farthest user U 1 and Bob is the dealer. The rest of n 1 users are assumed to be dishonestly located with an equal interval. Then, the secret key rate R can be calculated as [21]
R = β I A B χ B E ,
where β denotes the traditional reconciliation efficiency, I A B is Alice and Bob’s mutual information, and χ B E is Eve and Bob’s Holevo bound.
Assuming that the transmittance of HABS approaches one, the channel transmittance of the i-th participant U i is calculated as
T i = 10 δ l i 10 ,
where l i denotes the transmission distance between U i and the dealer, and δ is the attenuation coefficient of the fiber link. The excess noise of U i , referring to the channel input, can be calculated by [6]
ξ i = T i T 1 ( ξ rest + ξ 0 phase ) = T i T 1 ( ξ rest + ξ error ξ error T T 1 ) ,
where ξ rest = ξ 0 + ξ AM + ξ LE + ξ ADC [19]. Combined with the results in Appendix A, the channel-added noise, the total channel-added noise, the total detection-added noise and the total added noise can be derived as
χ line T = 1 T 1 + i = 1 n ξ i , χ het T = 2 μ + 2 v el μ 1 + V A E R 2 , χ tot = χ line T + χ het T T .
Consequently, Alice and Bob’s mutual information I A B can be derived as
I A B = log 2 V + χ tot 1 + χ tot ,
where V = 1 + V A . The Holevo bound χ B E is given by
χ B E = S ρ E d x B , p B P x B , p B S ρ E x B , p B ,
where ( x B , p B ) is Bob’s results with the probability density P ( x B , p B ) , ρ E x B , p B denotes the eavesdropper’s state based on Bob’s measurements, and S represents the von Neumann entropy. Followed by the derivation in Appendix A, we assume that the loss and noise of Bob’s detector are all trusted, and then we obtain
χ B E = j = 1 2 G λ j 1 2 j = 3 5 G λ j 1 2 ,
where G ( x ) = ( x + 1 ) log 2 ( x + 1 ) x log 2 x , and { λ k : k { 1 , 2 , 3 , 4 } } can be described as
λ 1 , 2 2 = 1 2 A ± A 2 4 B , λ 3 , 4 2 = 1 2 C ± C 2 4 D ,
involving the parameters A , B , C and D given by
A = V 2 + T 2 V + χ line T 2 2 T κ 4 2 , B = T 2 V 2 + V χ line T κ 4 2 2 ,
C = 1 T 2 V + χ tot 2 A ( χ het T ) 2 + B + 1 + 2 χ het T V B + T V + χ line + 2 T κ 4 2 ,
D = V + B χ het / T V + χ tot 2 , λ 5 = 1 .
We note that the derivation of the parameter κ 4 can be found in Appendix B.

3.2. Numerical Simulations

For security analysis with numerical simulations, we make use of parameters, including attenuation coefficient 0.2 dB/km, detection efficiency 0.6, electronics noise 0.05, reconciliation efficiency 0.98, and so on, which can usually be used as performance evaluation of the traditional CV quantum communication system [21,22,23,24].
In Figure 2, we demonstrate the performance of the LLO-based CVQSS system in terms of the secret key rate R and the maximal transmission distance for n { 2 , 5 , 10 , 15 } when taking into account effects of the conventional phase noise and the partially trusted phase noise. For the given phase noise, the maximal transmission distance of the LLO-based QSS is achieved with more than 50 km for two legal users, whereas the performance declines with an increased number of legal users. When the number of users is selected more than 15, the maximal transmission distance approaches 10 km. While deriving the secure key rate for each sub-system, the effect of noise and influence brought by other n 1 untrusted users become disastrous when the number of users U is increased.
Meanwhile, for the given number of legal users U, the maximal transmission distance can be lengthened when taking into account the partially trusted noise. The reason is that the tolerance of the traditional phase noise is lower than that of the partially trusted noise. Taking n = 2 as an example, the maximal transmission distance is slightly less than 40 km. However, it reaches more than 50 km for the trusted noise, which means it delivers a performance improvement. With the traditional phase noise, the implementation of the LLO-based CVQSS will result in limits in terms of the secret key rate and the maximal transmission distance. A slight excess noise will become a great impact on the performance because the system is sensitive to the excess noise, as shown in Figure 3. This improvement is more pronounced with the large number of users U. It seems that the proposed scheme is very sensitive to the number of users U. Therefore, three factors, which include the secret key rate, the maximal transmission distance and the number of legal users, should be determined to illustrate the security of the LLO-based CVQSS. For example, while designing a scheme with long-distance transmission and high-rate secret keys, the number of legal users U has to be sacrificed.

4. Conclusions

We have proposed an approach to the LLO-based CVQSS with security enhancement, which can be further improved by making the partial phase noise be trusted. We prove the security of the CVQSS system while considering effects of the external eavesdroppers and dishonest users. Numerical simulations demonstrate the performance of the LLO-based CVQSS system when taking into account the effect of the number of legal users. When we take the suitable numbers of legal participants, the performance of the LLO-based CVQSS can be furthermore improved in terms of the secret key rate, which is compared with the traditional one. Moreover, we find that the performance of the system can be improved by making full use of the partially trusted phase noise. It leaves an optimization space for multi-participant secret sharing in practical networks.

Author Contributions

Conceptualization, Y.M.; writing—original draft preparation, Y.Z.; writing—review, Y.W.; writing—editing, Y.G. All authors have read and agree to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (Grant No. 61871407), and the Special Funds for the Construction of an Innovative Province in Hunan (Grant No. 2022GK2016).

Data Availability Statement

All data generated or analyzed during this study are included in this published article.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. The Phase Noise

The parameter V error denotes the variance generated by the error between the real phase rotation value θ R and estimated value θ ^ R given by
V error = var θ R θ ^ R = χ + 1 E R 2 ,
where χ is the total noise of phase reference can be calculated by
χ = 1 T 1 + ε 0 + 2 μ + 2 v el T μ .
The first three items mentioned above are the components of channel-added noise in quantum communications, and the last item denotes the heterodyne detector noise. The parameter V drift represents the variance of the relative phase drift between two lasers for Δ T , which can be described as
V drift = 2 π Δ v A + Δ v B Δ T
where Δ v A and Δ v B correspond to the line widths of the two free-running lasers. The parameter V channel represents the variance of the noise resulting from the accumulated drift of phase of the signal pulse. Therefore, when V est approaches 0, the phase noise can be approximated as
ξ phase = V A V drift + V channel + V error = ξ drift + ξ channel + ξ error .
Furthermore, we consider the characteristics of the trusted noise after calibration. The excess noise ξ is a component element of the channel added noise, which is part of the total added noise, and hence it can be described as
ξ = ξ phase + ξ rest .
Then the total channel added noise χ line can be given by
χ line = 1 / T 1 + ξ .
The total detection added noise χ het can be calculated as
χ het = 2 μ + 2 v e l / μ .
Combined with the noise calculation method, the total noise can be derived as
χ tot = χ line + χ het T .
In what follows, we try to distinguish the trusted and untrusted parts among them. We assume χ het is the trusted noise based on a well calibration of μ and v e l . Meanwhile, since the part of the phase noise ξ error can be perfectly controlled and calibrated by Bob, it can be regarded as the trusted noise [18,22].
Based on (A8), we achieve the total phase noise of reference given by
χ = χ u + χ T T ,
where χ u = 1 / T 1 + ε 0 and χ T = 2 μ + 2 v el / μ .
Combined with (A1), (A2), (A4) and (A9), the measurement noise of phase reference can calculated as
ξ error = ξ error u + ξ error T T ,
where
ξ error u = V A χ u + 1 E R 2 = V A 1 + T ε 0 T E R 2 ,
and
ξ error T = V A χ T E R 2 = V A 2 μ + 2 v el μ E R 2 .

Appendix B. The Secret Key Rate

In the EB version, DMCS with QPSK modulation can be defined as [24]
Ψ 4 = k = 0 3 λ k ϕ k 4 ϕ k 4 = 1 2 k = 0 3 ψ k 4 α k 4 ,
where the state ψ k 4 for k Z 4 , can be given by
ψ k 4 = 1 2 m = 0 3 e i ( 1 + 2 k ) m π / 4 ϕ m 4 .
The state ϕ m 4 for m Z 4 , can be described as
ϕ k 4 = e α 2 / 2 λ k n = 0 ( 1 ) n α 4 n + k ( 4 n + k ) ! | 4 n + k
with λ 0 , 2 and λ 1 , 3 given by
λ 0 , 2 = 1 2 e α 2 cosh α 2 ± cos α 2 , λ 1 , 3 = 1 2 e α 2 sinh α 2 ± sin α 2 .
Therefore, the mixture state ρ 4 can be defined as
ρ 4 = Tr Ψ 4 Ψ 4 = k = 0 3 λ k ϕ k 4 ϕ k 4 .
Let A and B describe two output modes of state Ψ 4 , whereas a ^ and b ^ denote the respective annihilation operators corresponding to A and B. We can achieve the covariance matrix, denoted by Γ A B 4 , of Ψ 4 . Namely, we obtain
Γ A B 4 = X I κ 4 σ z κ 4 σ z Y I ,
where I and σ z represent the respective diagonal matrices diag(1,1) and diag(1,−1), and X, Y, and Z 4 are parameters given by
X = Ψ 4 1 + 2 a a Ψ 4 = 1 + 2 α 2 , Y = Ψ 4 1 + 2 b b Ψ 4 = 1 + 2 α 2 , κ 4 = Ψ 4 a b + a b Ψ 4 = 2 α 2 k = 0 3 λ k 1 3 / 2 λ k 1 / 2 .

References

  1. Grosshans, F.; Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Liao, Q.; Xiao, G.; Zhong, H.; Guo, Y. Multi-label learning for improving discretely-modulated continuous- variable quantum key distribution. New J. Phys. 2021, 22, 083086. [Google Scholar] [CrossRef]
  3. Hillery, M.; Buzek, V.; Berthiaume, A. Quantum secret sharing. Phys. Rev. A 1999, 59, 1829. [Google Scholar] [CrossRef] [Green Version]
  4. Karlsson, A.; Koashi, M.; Imoto, N. Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 1999, 59, 162. [Google Scholar] [CrossRef]
  5. Schmid, C.; Trojek, P.; Bourennane, M.; Kurtsiefer, C.; Zukowski, M.; Weinfurter, H. Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 2005, 95, 230505. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Grice, W.P.; Qi, B. Quantum secret sharing using weak coherent states. Phys. Rev. A 2019, 100, 022339. [Google Scholar] [CrossRef] [Green Version]
  7. Lau, H.-K.; Weedbrook, C. Quantum secret sharing with continuous-variable cluster states. Phys. Rev. A 2013, 88, 042313. [Google Scholar] [CrossRef] [Green Version]
  8. Liao, Q.; Liu, H.; Gong, Y.; Wang, Z.; Peng, Q.; Guo, Y. Practical continuous-variable quantum secret sharing using plug-and-play dual-phase modulation. Opt. Express 2022, 30, 3876. [Google Scholar] [CrossRef]
  9. Kogias, I.; Xiang, Y.; He, Q.; Adesso, G. Unconditional security of entanglement-based continuous-variable quantum secret sharing. Phys. Rev. A 2017, 95, 012315. [Google Scholar] [CrossRef] [Green Version]
  10. Liao, Q.; Liu, H.; Zhu, L.; Guo, Y. Quantum secret sharing using discretely modulated coherent states. Phys. Rev. A 2021, 103, 032410. [Google Scholar] [CrossRef]
  11. Zhong, H.; Ye, W.; Zuo, Z.; Huang, D.; Guo, Y. Kalman filter-enabled parameter estimation for simultaneous quantum key distribution and classical communication scheme over a satellite-mediated link. Opt. Express 2022, 30, 5981. [Google Scholar] [CrossRef] [PubMed]
  12. Huang, D.; Huang, P.; Lin, D.; Wang, C.; Zeng, G. High-speed continuous-variable quantum key distribution without sending a local oscillator. Opt. Lett. 2015, 40, 3695. [Google Scholar] [CrossRef]
  13. Huang, J.-Z.; Weedbrook, C.; Yin, Z.-Q.; Wang, S.; Li, H.-W.; Chen, W.; Guo, G.-C.; Han, Z.-F. Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack. Phys. Rev. A 2013, 87, 062329. [Google Scholar] [CrossRef] [Green Version]
  14. Ma, X.-C.; Sun, S.-H.; Jiang, M.-S.; Liang, L.-M. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol. Phys. Rev. A 2013, 87, 052309. [Google Scholar] [CrossRef] [Green Version]
  15. Huang, J.-Z.; Kunz-Jacques, S.; Jouguet, P.; Weed-Brook, C.; Yin, Z.-Q.; Wang, S.; Chen, W.; Guo, G.-C.; Han, Z.-F. Quantum hacking on quantum key distribution using homodyne detection. Phys. Rev. A 2014, 89, 032304. [Google Scholar] [CrossRef] [Green Version]
  16. Jouguet, P.; Kunz-Jacques, S.; Diamanti, E. Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution. Phys. Rev. A 2013, 87, 062313. [Google Scholar] [CrossRef] [Green Version]
  17. Zhao, Y.J.; Zhang, Y.C.; Huang, Y.D.; Xu, B.J.; Yu, S.; Guo, H. Polarization attack on continuous-variable quantum key distribution. J. Phys. B 2021, 52, 015501. [Google Scholar] [CrossRef] [Green Version]
  18. Ren, S.; Kumar, R.; Wonfor, A.; Tang, X.; Penty, R.; White, I. Reference pulse attack on continuous variable quantum key distribution with local local oscillator untrusted phase noise. J. Opt. Soc. Am. B 2019, 36, B7. [Google Scholar] [CrossRef] [Green Version]
  19. Shao, Y.; Wang, H.; Pi, Y.; Huang, W.; Li, Y.; Yang, J.L.J.; Zhang, Y.; Xu, B. Phase noise model for continuous-variable quantum key distribution using a local local oscillator. Phys. Rev. A 2021, 104, 032608. [Google Scholar] [CrossRef]
  20. Wang, T.; Huang, P.; Zhou, Y.; Liu, W.; Zeng, G. Pilot-multiplexed continuous-variable quantum key distribution with a real local oscillator. Phys. Rev. A 2018, 97, 012310. [Google Scholar] [CrossRef]
  21. Leverrier, A.; Grangier, P. Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett. 2009, 102, 180504. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  22. Qi, B.; Lim, C.C.W. Noise analysis of simultaneous quantum key distribution and classical communication scheme using a true local oscillator. Phys. Rev. Appl. 2018, 9, 054008. [Google Scholar] [CrossRef] [Green Version]
  23. Ghorai, S.; Grangier, P.; Diamanti, E.; Leverrier, A. Asymptotic security of continuous-variable quantum key distribution with a discrete modulation. Phys. Rev. X 2019, 9, 021059. [Google Scholar] [CrossRef] [Green Version]
  24. Liao, Q.; Xiao, G.; Xu, C.-G.; Xu, Y.; Guo, Y. Discretely modulated continuous-variable quantum key distribution with an untrusted entanglement source. Phys. Rev. A 2020, 102, 032604. [Google Scholar] [CrossRef]
Figure 1. The LLO-based QSS with discretely modulated coherent states.
Figure 1. The LLO-based QSS with discretely modulated coherent states.
Mathematics 10 03768 g001
Figure 2. Asymptotic secret key rate of the LLO-based CVQSS. The dashed lines denote the situation of conventional phase noise and the solid lines denote the partially trusted phase noise.
Figure 2. Asymptotic secret key rate of the LLO-based CVQSS. The dashed lines denote the situation of conventional phase noise and the solid lines denote the partially trusted phase noise.
Mathematics 10 03768 g002
Figure 3. The excess noise (solid lines) and the partially trusted phase noise for n { 2 , 5 , 10 , 15 } .
Figure 3. The excess noise (solid lines) and the partially trusted phase noise for n { 2 , 5 , 10 , 15 } .
Mathematics 10 03768 g003
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Mao, Y.; Zhu, Y.; Wang, Y.; Guo, Y. Continuous Variable Quantum Secret Sharing with Security Enhancement in Practical Quantum Communications. Mathematics 2022, 10, 3768. https://doi.org/10.3390/math10203768

AMA Style

Mao Y, Zhu Y, Wang Y, Guo Y. Continuous Variable Quantum Secret Sharing with Security Enhancement in Practical Quantum Communications. Mathematics. 2022; 10(20):3768. https://doi.org/10.3390/math10203768

Chicago/Turabian Style

Mao, Yun, Yiwu Zhu, Yijun Wang, and Ying Guo. 2022. "Continuous Variable Quantum Secret Sharing with Security Enhancement in Practical Quantum Communications" Mathematics 10, no. 20: 3768. https://doi.org/10.3390/math10203768

APA Style

Mao, Y., Zhu, Y., Wang, Y., & Guo, Y. (2022). Continuous Variable Quantum Secret Sharing with Security Enhancement in Practical Quantum Communications. Mathematics, 10(20), 3768. https://doi.org/10.3390/math10203768

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop