Table 5 Comparing the presented QSS schemes with our work.
From: Authenticable quantum secret sharing based on special entangled state
QSS scheme | Quantum resources | Type of shared secret | Measurement bases | Achievable access structure | Identity authentication |
|---|---|---|---|---|---|
Li33 | Three-particle GHZ states (2-dimension) | Classical bit | GHZ basis Bell basis | Specific access structures | Yes |
Zhang27 | Multiparty entangled states (d-dimension) | Classical bit | Fourier basis computational basis | (n, n) | No |
Mansour26 | Maximally entangled multi-qudit states (d-dimension) | Quantum state | Bell basis | (n, n) | No |
Rathi45 | Bell states | Quantum state | Bell basis | (t, n) | No |
| Â | (d-dimension) | Â | Â | Â | Â |
Han46 | Bell states (d-dimension) | Quantum state | Bell basis | (t, n) | Yes |
Bai43 | Multiparty entangled states (d-dimension) | Quantum state | Computational basis | Specific access structures | No |
Our scheme | Multiparty entangled states (2-dimension) | Quantum state | Computational basis | Specific access structures | Yes |