{"id":"https://openalex.org/W7104505276","doi":"https://doi.org/10.1109/jiot.2025.3630672","title":"Quantum ( <i>t, n</i> ) Threshold Multisecret Sharing Based on Cluster States","display_name":"Quantum ( <i>t, n</i> ) Threshold Multisecret Sharing Based on Cluster States","publication_year":2025,"publication_date":"2025-11-10","ids":{"openalex":"https://openalex.org/W7104505276","doi":"https://doi.org/10.1109/jiot.2025.3630672"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3630672","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3630672","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Rui-Hai Ma","orcid":"https://orcid.org/0009-0003-8693-3951"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rui-Hai Ma","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Hui-Nan Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui-Nan Chen","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Bin-Bin Cai","orcid":"https://orcid.org/0000-0002-7407-5932"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin-Bin Cai","raw_affiliation_strings":["Digital Fujian Internet-of-Things Laboratory of Environmental Monitoring, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Digital Fujian Internet-of-Things Laboratory of Environmental Monitoring, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Song Lin","orcid":"https://orcid.org/0000-0003-0907-4594"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Song Lin","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":null,"display_name":"Xiao-Chen Zhang","orcid":"https://orcid.org/0000-0002-3157-7748"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao-Chen Zhang","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.76770031,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"2","first_page":"2621","last_page":"2630"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.8600999712944031,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.8600999712944031,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.035999998450279236,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10622","display_name":"Quantum Mechanics and Applications","score":0.033900000154972076,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-state","display_name":"Quantum state","score":0.534500002861023},{"id":"https://openalex.org/keywords/quantum-network","display_name":"Quantum network","score":0.5206999778747559},{"id":"https://openalex.org/keywords/cluster-state","display_name":"Cluster state","score":0.4916999936103821},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.486299991607666},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.46160000562667847},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.4580000042915344},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.4494999945163727},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.44859999418258667},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.42010000348091125},{"id":"https://openalex.org/keywords/quantum-channel","display_name":"Quantum channel","score":0.3921000063419342}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6855999827384949},{"id":"https://openalex.org/C15706264","wikidata":"https://www.wikidata.org/wiki/Q230883","display_name":"Quantum state","level":3,"score":0.534500002861023},{"id":"https://openalex.org/C186468114","wikidata":"https://www.wikidata.org/wiki/Q836478","display_name":"Quantum network","level":4,"score":0.5206999778747559},{"id":"https://openalex.org/C158456648","wikidata":"https://www.wikidata.org/wiki/Q5136706","display_name":"Cluster state","level":4,"score":0.4916999936103821},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.486299991607666},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.46160000562667847},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.4580000042915344},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.4494999945163727},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.44859999418258667},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4361000061035156},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.42010000348091125},{"id":"https://openalex.org/C187486625","wikidata":"https://www.wikidata.org/wiki/Q2122176","display_name":"Quantum channel","level":4,"score":0.3921000063419342},{"id":"https://openalex.org/C5320026","wikidata":"https://www.wikidata.org/wiki/Q2122216","display_name":"Quantum information science","level":4,"score":0.36399999260902405},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3619999885559082},{"id":"https://openalex.org/C51003876","wikidata":"https://www.wikidata.org/wiki/Q1536431","display_name":"Quantum error correction","level":4,"score":0.3562000095844269},{"id":"https://openalex.org/C137019171","wikidata":"https://www.wikidata.org/wiki/Q2623817","display_name":"Quantum algorithm","level":3,"score":0.32409998774528503},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.3199999928474426},{"id":"https://openalex.org/C41241483","wikidata":"https://www.wikidata.org/wiki/Q7269015","display_name":"Quantum capacity","level":5,"score":0.3140000104904175},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.31200000643730164},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.30970001220703125},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.30730000138282776},{"id":"https://openalex.org/C91717678","wikidata":"https://www.wikidata.org/wiki/Q1135332","display_name":"Quantum teleportation","level":5,"score":0.29649999737739563},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29440000653266907},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2897000014781952},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28690001368522644},{"id":"https://openalex.org/C43682372","wikidata":"https://www.wikidata.org/wiki/Q7269080","display_name":"Quantum operation","level":4,"score":0.2847000062465668},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2635999917984009},{"id":"https://openalex.org/C2778926657","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum system","level":3,"score":0.2624000012874603},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.257099986076355},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.2524000108242035},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.25220000743865967},{"id":"https://openalex.org/C190463098","wikidata":"https://www.wikidata.org/wiki/Q2081419","display_name":"Quantum technology","level":4,"score":0.2515000104904175}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3630672","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3630672","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2351803770","display_name":null,"funder_award_id":"2022J05049","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G3219017833","display_name":null,"funder_award_id":"2023J01533","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G330631701","display_name":null,"funder_award_id":"62171131","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G570309934","display_name":null,"funder_award_id":"2022J01186","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G6630422597","display_name":null,"funder_award_id":"52305568","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321878","display_name":"Natural Science Foundation of Fujian Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1508452091","https://openalex.org/W1575461960","https://openalex.org/W1977973619","https://openalex.org/W1996360405","https://openalex.org/W1997837296","https://openalex.org/W2013879965","https://openalex.org/W2015179126","https://openalex.org/W2021199422","https://openalex.org/W2032711322","https://openalex.org/W2034979624","https://openalex.org/W2035993353","https://openalex.org/W2055325512","https://openalex.org/W2062854284","https://openalex.org/W2068568488","https://openalex.org/W2075770840","https://openalex.org/W2084652510","https://openalex.org/W2095025840","https://openalex.org/W2117584890","https://openalex.org/W2137147061","https://openalex.org/W2141420453","https://openalex.org/W2163216853","https://openalex.org/W2252325337","https://openalex.org/W2272376028","https://openalex.org/W2592149281","https://openalex.org/W2800615355","https://openalex.org/W2883363935","https://openalex.org/W2887030045","https://openalex.org/W2970097841","https://openalex.org/W3015881484","https://openalex.org/W3186298127","https://openalex.org/W3195927526","https://openalex.org/W3204331120","https://openalex.org/W4200256728","https://openalex.org/W4211223090","https://openalex.org/W4288081587","https://openalex.org/W4293329452","https://openalex.org/W4367311051","https://openalex.org/W4382021628","https://openalex.org/W4388816689","https://openalex.org/W4389328574","https://openalex.org/W4389526970","https://openalex.org/W4400185528","https://openalex.org/W4401691541","https://openalex.org/W4406577607","https://openalex.org/W4412079052"],"related_works":[],"abstract_inverted_index":{"Quantum":[0],"secret":[1,43],"sharing":[2,59],"is":[3,68,158,166],"an":[4],"encryption":[5],"technique":[6],"based":[7,61],"on":[8,23,62,192],"quantum":[9,27,50,85,104,114,129,148,153],"mechanics,":[10],"which":[11,70],"utilizes":[12],"uncertainty":[13],"principle":[14],"to":[15,82,97,127,168],"achieve":[16],"security":[17,91],"in":[18,101,122],"transmission.":[19],"Most":[20],"protocols":[21],"focus":[22],"the":[24,48,90,94,108,118,135,138,156,161,179,197],"study":[25],"of":[26,77,93],"(<italic":[28,35,51],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[29,32,36,39,52,55,74,79],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i>,":[30],"<italic":[31,38,54,73,78],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i>)":[33,40,56],"or":[34],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">t</i>,":[37,53],"threshold":[41,57],"single":[42],"sharing.":[44],"In":[45,134,189],"this":[46],"paper,":[47],"first":[49],"multi-secret":[58],"protocol":[60,88,157,180,198],"Lagrangian":[63],"interpolation":[64],"and":[65,105,174,186,201],"cluster":[66,95,123],"states":[67,124],"proposed,":[69],"requires":[71],"only":[72],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">t</i>":[75],"instead":[76],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i>":[80],"participants":[81,126],"reconstruct":[83],"multiple":[84],"secrets.":[86,115,145],"The":[87],"exploits":[89],"properties":[92],"state":[96],"transmit":[98,128],"shared":[99],"information":[100,130],"two":[102],"parts,":[103],"classical,":[106],"where":[107],"shares":[109],"remain":[110],"private":[111],"after":[112,143],"reconstructing":[113],"Meanwhile,":[116],"extending":[117],"new":[119],"measurement":[120],"basis":[121],"enables":[125],"without":[131],"preparing":[132],"particles.":[133],"presented":[136],"protocol,":[137],"dealer":[139],"can":[140],"be":[141,169],"offline":[142],"sending":[144],"And":[146],"required":[147],"operations":[149],"are":[150],"all":[151],"common":[152,183],"operations,":[154],"thus":[155],"practical":[159],"under":[160,181],"current":[162],"technical":[163],"conditions.":[164],"It":[165],"proven":[167],"theoretically":[170],"secure":[171],"against":[172],"external":[173,184],"internal":[175,187],"attacks":[176,185],"by":[177],"analyzing":[178],"several":[182],"attacks.":[188],"addition,":[190],"experiments":[191],"IMB":[193],"Q":[194],"prove":[195],"that":[196],"satisfies":[199],"correctness":[200],"feasibility.":[202]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-10T00:00:00"}
