上一条:Secret sharing based on quantum Fourier transform
下一条:Cryptanalysis and improvement of the novel quantum scheme for secure two-party distance computation