Table 2 The use of \(\hbox {PIN}_{P_j}^i\) in the identity authentication phase.

From: Authenticable quantum secret sharing based on special entangled state

\(\hbox {PIN}_{P_j}^i\)

00

01

10

11

\(P_j\)’s operation

I

X

Y

Z