On weak odd domination and graph-based quantum secret sharing
نویسندگان
چکیده
A weak odd dominated (WOD) set in a graph is a subset B of vertices such that ∃D ⊆ V \B, ∀v ∈ B, |N(v)∩D| = 1 mod 2. We point out the connections of weak odd domination with odd domination, (σ, ρ)-domination, and perfect codes. We introduce bounds on κ(G), the maximum size of WOD sets of a graph G, and on κ(G), the minimum size of non WOD sets of G. Moreover, we prove that the corresponding decision problems are NP complete. The study of weak odd domination is mainly motivated by the design of graph-based quantum secret sharing protocol introduced by Markham and Sanders [9]. Indeed, a graph G of order n can be used to define a quantum secret sharing protocol where κQ(G) = max(κ(G), n − κ(G)) is a threshold ensuring that any set of more than κQ(G) players can recover a quantum secret. We show the hardness of finding the optimal threshold of a graphbased quantum secret sharing protocol. Finally, using probabilistic methods, we show the existence of an infinite family of graphs {Gi} with ‘small’ κQ, i.e. such that κQ(Gi) ≤ 0.811ni where ni is the order of Gi, and that with high probability a random graph G of order n satisfies κQ(G) ≤ 0.87n.
منابع مشابه
Parameterized Complexity of Weak Odd Domination Problems
Given a graph G = (V,E), a subset B ⊆ V of vertices is a weak odd dominated (WOD) set if there exists D ⊆ V \B such that every vertex in B has an odd number of neighbours in D. κ(G) denotes the size of the largest WOD set, and κ′(G) the size of the smallest non-WOD set. The maximum of κ(G) and |V | − κ′(G), denoted κQ(G), plays a crucial role in quantum cryptography. In particular deciding, giv...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملQuantum Secret Sharing with Graph States
We study the graph-state-based quantum secret sharing protocols [24, 17] which are not only very promising in terms of physical implementation, but also resource efficient since every player’s share is composed of a single qubit. The threshold of a graph-state-based protocol admits a lower bound: for any graph of order n, the threshold of the corresponding n-player protocol is at least 0.506n. ...
متن کاملWeak signed Roman k-domination in graphs
Let $kge 1$ be an integer, and let $G$ be a finite and simple graph with vertex set $V(G)$.A weak signed Roman $k$-dominating function (WSRkDF) on a graph $G$ is a function$f:V(G)rightarrow{-1,1,2}$ satisfying the conditions that $sum_{xin N[v]}f(x)ge k$ for eachvertex $vin V(G)$, where $N[v]$ is the closed neighborhood of $v$. The weight of a WSRkDF $f$ is$w(f)=sum_{vin V(G)}f(v)$. The weak si...
متن کاملInformation Flow in Secret Sharing Protocols
The entangled graph states [9] have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC), error correction and secret sharing amongst others. In addition they are at the forefront in terms of implementations. As such they represent an excellent opportunity to mov...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Theor. Comput. Sci.
دوره 598 شماره
صفحات -
تاریخ انتشار 2015