Table 2 The use of \(\hbox {PIN}_{P_j}^i\) in the identity authentication phase.
From: Authenticable quantum secret sharing based on special entangled state
\(\hbox {PIN}_{P_j}^i\) | 00 | 01 | 10 | 11 |
|---|---|---|---|---|
\(P_j\)’s operation | I | X | Y | Z |
From: Authenticable quantum secret sharing based on special entangled state
\(\hbox {PIN}_{P_j}^i\) | 00 | 01 | 10 | 11 |
|---|---|---|---|---|
\(P_j\)’s operation | I | X | Y | Z |