Efficient multiparty quantum-secret-sharing schemes
نویسندگان
چکیده
منابع مشابه
Multiparty Quantum Secret Sharing
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a (n, n)-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons. We take advantage of this multiparty QSSCM scheme to establish a scheme of multiparty secret sharing of quantum information (SSQI), in which only all quantum information recei...
متن کاملQuantum Secret Sharing Schemes
Nascimento et al. [19] introduced a quantum information theoretical model for Quantum Secret Sharing (QSS) schemes. In this thesis, we describe existing schemes, such as the construction using Monotone Span Programs (MSPs) [16], according to this model. Moreover, the correctness of these schemes is proved in an information theoretical way. In particular, we consider the so-called pure state QSS...
متن کاملMultiparty quantum secret splitting and quantum state sharing
Fu-Guo Deng, Xi-Han Li, Chun-Yan Li, Ping Zhou, and Hong-Yu Zhou 1 The Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 100875, People’s Republic of China 2 Institute of Low Energy Nuclear Physics, and Department of Material Science and Engineering, Beijing Normal University, Beijing 100875, People’s Republic of China 3 Bei...
متن کاملCommunication Efficient Quantum Secret Sharing
Building upon the recent work in communication efficient classical secret sharing schemes of Bitar and El Rouayheb, we study communication efficient quantum secret sharing schemes. In the standard model of quantum secret sharing, typically one is interested in minimal authorized sets for the reconstruction of the secret. In such a setting, reconstruction requires the communication of all the sh...
متن کاملMatroids and Quantum Secret Sharing Schemes
A secret sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2004
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.69.052307