Access the full text.
Sign up today, get DeepDyve free for 14 days.
I-ching Yu, Feng-Li Lin, Ching-Yu Huang (2007)
Quantum secret sharing with multilevel mutually (un)biased basesPhysical Review A, 78
Somshubhro Bandyopadhyay (2000)
Teleportation and secret sharing with pure entangled statesPhysical Review A, 62
Li Xiao, G. Long, Fuguo Deng, Jian-Wei Pan (2004)
Efficient multiparty quantum-secret-sharing schemesPhysical Review A, 69
A. Karlsson, M. Koashi, N. Imoto (1999)
Quantum entanglement for secret sharing and secret splittingPhysical Review A, 59
Anderson Nascimento, J. Mueller-Quade, H. Imai (2001)
Improving quantum secret-sharing schemesPhysical Review A, 64
H. Takesue, K. Inoue (2006)
Quantum secret sharing based on modulated high-dimensional time-bin entanglementPhysical Review A, 74
G. Guo, G. Guo (2002)
Quantum secret sharing without entanglementPhysics Letters A, 310
Torben Pedersen (1991)
A Threshold Cryptosystem without a Trusted Party (Extended Abstract)
A. Shamir (1979)
How to share a secretCommun. ACM, 22
C. Crépeau, D. Gottesman, Adam Smith (2002)
Secure multi-party quantum computation
G. Blakley (1899)
Safeguarding cryptographic keys1979 International Workshop on Managing Requirements Knowledge (MARK)
Wen-Ai Jackson, K. Martin, C. O'Keefe (1995)
Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract)
M. Ben-Or, C. Crépeau, D. Gottesman, A. Hassidim, Adam Smith (2006)
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06)
Fuguo Deng, Hong-Yu Zhou, G. Long (2005)
Bidirectional quantum secret sharing and secret splitting with polarized single photonsPhysics Letters A, 337
I. Ingemarsson, G. Simmons (1991)
A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party
Zhan-jun Zhang, Yong Li, Z. Man (2004)
Multiparty quantum secret sharingPhysical Review A, 71
D. Gottesman (1999)
Theory of quantum secret sharingPhysical Review A, 61
W. Wootters, W. Wootters, W. Zurek (1982)
A single quantum cannot be clonedNature, 299
M. Hillery, V. Bužek, A. Berthiaume (1998)
Quantum secret sharingPhysical Review A, 59
S. Kak (2013)
Threshold Quantum CryptographyArXiv, abs/1310.6333
Zhan-jun Zhang (2006)
Multiparty secret sharing of quantum information via cavity QEDOptics Communications, 261
Kiril Bankov, M. Aigner, Günter Ziegler (2001)
Proofs from "The Book"The Mathematical Gazette, 85
M. Aigner, G. Ziegler (1998)
Proofs from THE BOOK
A. Lance, T. Symul, W. Bowen, B. Sanders, P. Lam (2003)
Tripartite quantum state sharing.Physical review letters, 92 17
S. Qin, F. Gao, Q. Wen, F. Zhu (2007)
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocolPhysical Review A, 76
R. Cleve, D. Gottesman, H. Lo (1999)
HOW TO SHARE A QUANTUM SECRETPhysical Review Letters, 83
In a conventional quantum (k, n) threshold scheme, a trusted party shares a secret quantum state with n participants such that any k of those participants can cooperate to recover the original secret, while fewer than k participants obtain no information about the secret. In this paper we show how to construct a quantum (k, n) threshold scheme without the assistance of a trusted party, who generates and distributes shares among the participants. Instead, each participant chooses his private state and contributes the same to the determination of the final secret quantum state.
Quantum Information Processing – Springer Journals
Published: May 25, 2010
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.