Cryptanalysis of the Hillery-Bužek-Berthiaume quantum secret-sharing protocol

نویسندگان

  • Su-Juan Qin
  • Fei Gao
  • Qiao-Yan Wen
  • Fu-Chen Zhu
چکیده

Su-Juan Qin, Fei Gao, Qiao-Yan Wen, and Fu-Chen Zhu (1. State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China) (2. School of Science, Beijing University of Posts and Telecommunications, Beijing, 100876, China) (3. National Laboratory for Modern Communications, P.O.Box 810, Chengdu, 610041, China) Email: [email protected] (Dated: February 26, 2008)

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum secret sharing pdf

quantum secret sharing where a quantum participant Alice can share a secret key with two classical participants Bobs. After analyz.Secret sharing is a procedure for splitting a message into several parts so that no subset of parts is. Quantum cryptography with secret sharing in a way that will.We show how a quantum secret sharing protocol, similar to that of Hillery, Buzek, and Berthiaume. A pr...

متن کامل

Generalised Mermin-type non-locality arguments

We broadly generalise Mermin-type arguments on GHZ states, and we provide exact group-theoretic conditions for non-locality to be achieved. Our results are of interest in quantum foundations, where they yield a new hierarchy of quantum-realisable All-vsNothing arguments. They are also of interest to quantum protocols, where they find immediate application to a non-trivial extension of the hybri...

متن کامل

NOVEL QUBIT QUANTUM CRYPTOGRAPHY PROTOCOLS Quantum Secret Sharing

This report summarises the ongoing work in QuComm on the demonstration of novel quantum communication protocols, in particular multi-party protocols or protocols which use more than 2-states (or more than one qubit). Such new protocols will extend the capabilities of quantum communication by increasing the channel capacity, by making the systems less sensitive to channel noise. Examples of such...

متن کامل

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

The Coordinate Ratios as a Tool to Analyze the Intrusion Based on Bužek-hillery Quantum Copying Machine

The intrusion based on Bužek-Hillery universal quantum copying machine (UQCM) is investigated. A major problem to the eavesdropper Eve is how to choose the intrusion parameters required by the copying machine in order to take out the maximum of information on the transmitted qubits while making her intrusion as discrete as possible. The present paper attempts to investigate the equatorial and i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008