Access the full text.
Sign up today, get DeepDyve free for 14 days.
Hadian Massoud, Fattahi Elham (2012)
A novel and efficient multiparty quantum secret sharing scheme using entangled statesScience China Physics, Mechanics and Astronomy, 55
Chun-Yan Li, Hong-Yu Zhou, Wang Yan, Fuguo Deng (2005)
Secure Quantum Key Distribution Network with Bell States and Local Unitary OperationsChinese Physics Letters, 22
W. Wootters, B. Fields (1989)
Optimal state-determination by mutually unbiased measurementsAnnals of Physics, 191
I-ching Yu, Feng-Li Lin, Ching-Yu Huang (2007)
Quantum secret sharing with multilevel mutually (un)biased basesPhysical Review A, 78
Xihan Li, Fu-Guo Deng, Hong-Yu Zhou (2007)
Controlled Teleportation of an Arbitrary Multi-Qudit State in a General Form with d-Dimensional Greenberger–Horne–Zeilinger StatesChinese Physics Letters, 24
Fuguo Deng, Xihan Li, Hong-Yu Zhou (2006)
Efficient high-capacity quantum secret sharing with two-photon entanglementPhysics Letters A, 372
Somshubhro Bandyopadhyay (2000)
Teleportation and secret sharing with pure entangled statesPhysical Review A, 62
Li Xiao, G. Long, Fuguo Deng, Jian-Wei Pan (2004)
Efficient multiparty quantum-secret-sharing schemesPhysical Review A, 69
Charles Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, W. Wootters (1993)
Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels.Physical review letters, 70 13
A. Karlsson, M. Koashi, N. Imoto (1999)
Quantum entanglement for secret sharing and secret splittingPhysical Review A, 59
Anderson Nascimento, J. Mueller-Quade, H. Imai (2001)
Improving quantum secret-sharing schemesPhysical Review A, 64
Liang Hao, Chuan Wang, G. Long (2011)
Quantum secret sharing protocol with four state Grover algorithm and its proof-of-principle experimental demonstrationOptics Communications, 284
Josh Benaloh, J. Leichter (1990)
Generalized Secret Sharing and Monotone Functions
Liang Hao, Jun-Lin Li, Guilu Long (2010)
Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solutionScience China Physics, Mechanics and Astronomy, 53
Min Jiang, Xu Huang, Liulei Zhou, Yiming Zhou, Jia Zeng (2012)
An efficient scheme for multi-party quantum state sharing via non-maximally entangled statesChinese Science Bulletin, 57
G. Long, X. Liu (2000)
Theoretically efficient high-capacity quantum-key-distribution schemePhysical Review A, 65
A. Shamir (1979)
How to share a secretCommun. ACM, 22
Yuguang Yang, Juan Xia, Xin Jia, Hua Zhang (2012)
Undeniable quantum state sharing with a five-atom cluster state in cavity QEDScience China Physics, Mechanics and Astronomy, 55
Xiubo Chen, Xinxin Niu, Xinjie Zhou, Yixian Yang (2013)
Multi-party quantum secret sharing with the single-particle quantum state to encode the informationQuantum Information Processing, 12
S. Singh, R. Srikanth (2003)
Generalized quantum secret sharingPhysical Review A, 71
V. Karimipour, S. Bagherinezhad, A. Bahraminasab (2001)
Entanglement swapping of generalized cat states and secret sharingPhysical Review A, 65
G. Blakley (1899)
Safeguarding cryptographic keys1979 International Workshop on Managing Requirements Knowledge (MARK)
Adrian Keet, B. Fortescue, D. Markham, B. Sanders (2010)
Quantum secret sharing with qudit graph statesPhysical Review A, 82
Adam Smith (2000)
Quantum secret sharing for general access structuresarXiv: Quantum Physics
D. Markham, B. Sanders (2008)
Graph states for quantum secret sharingPhysical Review A, 78
Fuguo Deng, Hongyu Long (2006)
Circular quantum secret sharingJournal of Physics A, 39
J. Bogdanski, Nima Rafiei, M. Bourennane (2008)
Experimental quantum secret sharing using telecommunication fiberPhysical Review A, 78
W. Tittel, H. Zbinden, N. Gisin (2001)
Experimental demonstration of quantum secret sharingPhysical Review A, 63
Chun-Yan Li, Hong-Yu Zhou, Yan Wang, Fuguo Deng (2007)
Secure quantum key distribution network with Bell states and local unitary operations
Kejin Wei, Haiqiang Ma, Jian-Hui Yang (2013)
Experimental circular quantum secret sharing over telecom fiber network.Optics express, 21 14
C. Schmid, P. Trojek, M. Bourennane, C. Kurtsiefer, M. Żukowski, H. Weinfurter (2005)
Experimental single qubit quantum secret sharing.Physical review letters, 95 23
D. Gottesman (1999)
Theory of quantum secret sharingPhysical Review A, 61
M. Hillery, V. Bužek, A. Berthiaume (1998)
Quantum secret sharingPhysical Review A, 59
Mingming Wang, Xiubo Chen, Shoushan Luo, Yixian Yang (2012)
Efficient entanglement channel construction schemes for a theoretical quantum network model with d-level systemQuantum Information Processing, 11
A. Pittenger, M. Rubin (2003)
Mutually Unbiased Bases, Generalized Spin Matrices and SeparabilityLinear Algebra and its Applications, 390
Nanrun Zhou, Han-chong Song, L. Gong (2013)
Continuous Variable Quantum Secret Sharing via Quantum TeleportationInternational Journal of Theoretical Physics, 52
S. Salemian, S. Mohammadnejad (2011)
An error-free protocol for quantum entanglement distribution in long-distance quantum communicationChinese Science Bulletin, 56
S. Qin, F. Gao, Q. Wen, F. Zhu (2007)
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocolPhysical Review A, 76
R. Cleve, D. Gottesman, H. Lo (1999)
HOW TO SHARE A QUANTUM SECRETPhysical Review Letters, 83
Siyu Song, Chuan Wang (2012)
Recent development in quantum communicationChinese Science Bulletin, 57
Chia-Wei Tsai, T. Hwang (2012)
Multi-party quantum secret sharing based on two special entangled statesScience China Physics, Mechanics and Astronomy, 55
(1984)
Quantum cryptography: public key distribution and coin tossing
In this paper, we study the implementation of quantum secret sharing (QSS) schemes for general access structures rather than the threshold structure. Using multiparticle entanglements in high-dimensional system, three novel multipartite QSS formalisms for general access structures are proposed. The method of how to build general access structures in these formalisms is discussed. A major feature of these formalisms is that a variety of secret sharing schemes with different access structures can be constructed depending on the dealer’s wish. Besides, hierarchic and threshold authorized structures can also be built. All of which make our formalisms highly flexible.
Quantum Information Processing – Springer Journals
Published: Nov 5, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.