Ci-Hong Liao’s research while affiliated with National Cheng Kung University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (3)


Dynamic quantum secret sharing protocol based on GHZ state
  • Article

August 2014

·

37 Reads

·

79 Citations

Quantum Information Processing

Ci-Hong Liao

·

·

Tzonelish Hwang

This work proposes a new dynamic quantum secret sharing (DQSS) protocol using the measurement property of Greenberger–Horne–Zeilinger state and the controlled-NOT gate. In the proposed DQSS protocol, an agent can obtain a shadow of the secret key by simply performing a measurement on single photons. In comparison with the existing DQSS protocols, it provides better qubit efficiency and has an easy way to add a new agent. The proposed protocol is also free from the eavesdropping attack, the collusion attack, and can have an honesty check on a revoked agent.


Authenticated semi-quantum key distribution protocol using Bell states

February 2014

·

76 Reads

·

141 Citations

Quantum Information Processing

This study presents the first authenticated semi-quantum key distribution (ASQKD) protocols without using authenticated classical channels. By pre-sharing a master secret key between two communicants, a sender with advanced quantum devices can transmit a working key to a receiver, who can merely perform classical operations. The idea of ASQKD enables establishment of a key hierarchy in security systems that also eases the key management problem. The proposed protocols are free from several well-known attacks


Comment on "Dynamic Quantum Secret Sharing"

October 2013

·

41 Reads

·

20 Citations

Quantum Information Processing

Hsu et al. (Quantum Inf Process 12:331-344,2013) proposed a dynamic quantum secret sharing (DQSS) protocol using the entanglement swapping of Bell states for an agent to easily join (or leave) the system. In 2013, Wang and Li (Quantum Inf Process 12(5):1991-1997, 2013) proposed a collusion attack on Hsu et al.'s DQSS protocol. Nevertheless, this study points out a new security issue on Hsu et al.'s DQSS protocol regarding to the honesty of a revoked agent. Without considering this issue, the DQSS protocol could be failed to provide secret sharing function.

Citations (3)


... Depending on their characteristics and application scenarios, they can be classified into various types. For example, verifiable quantum secret sharing (VQSS) [27][28][29][30] that ensure the authenticity and validity of the shares provided by the participants through the introduction of a verification mechanism, dynamic quantum secret sharing (DQSS) [31][32][33]that can dynamically change the number of participants, quantum secret sharing that use the principle of error correction codes to improve the anti-noise capability of secret information during transmission [34][35][36], and device-independent quantum secret sharing (DI QSS) [37][38][39][40] that do not rely on specific quantum hardware devices and improve the versatility of systems device quantum secret sharing schemes that do not depend on specific quantum hardware devices and increase the versatility and practicality of the system, etc. In addition, some experimental progress has been made [41][42][43]. ...

Reference:

A (t, n) threshold quantum secret sharing with authentication based on single photons
Dynamic quantum secret sharing protocol based on GHZ state
  • Citing Article
  • August 2014

Quantum Information Processing

... The environment for SQKD protocols, based on the capabilities of classical users, can be divided into three types: measure-resend [17][18][19][20][21][22][23][24][25][26][27][28], randomization-based [17,18,21,24], and measurement-free [29]. That is, the classical users possess the capabilities (1), (2), and (4); (1), (3), and (4); and (2), (3), and (4) for the measure-resend, randomization-based, and measurement-free environments, respectively. ...

Authenticated semi-quantum key distribution protocol using Bell states
  • Citing Article
  • February 2014

Quantum Information Processing

... This makes QSS more flexible in practical applications. However, in the same year Wang et al [12] and Li et al [13] demonstrated that the protocol could not resist collusion attack and dishonest revoked participant attack. In 2014 Liao et al [14] proposed a dynamic QSS protocol based on GHZ states. ...

Comment on "Dynamic Quantum Secret Sharing"
  • Citing Article
  • October 2013

Quantum Information Processing