Access the full text.
Sign up today, get DeepDyve free for 14 days.
Hoi-Kwan Lau, C. Weedbrook (2013)
Quantum secret sharing with continuous-variable cluster statesPhysical Review A, 88
Yuguang Yang, Xin Jia, Hong-Yang Wang, Hua Zhang (2012)
Verifiable quantum (k, n)-threshold secret sharingQuantum Information Processing, 11
G. Guo, G. Guo (2002)
Quantum secret sharing without entanglementPhysics Letters A, 310
Yuguang Yang, Yi-Wei Teng, Hai-Ping Chai, Q. Wen (2011)
Verifiable Quantum (k,n)-threshold Secret Key SharingInternational Journal of Theoretical Physics, 50
Yan-Bing Li, Shenglong Xu, Qing-le Wang, Fang Liu, Zongjie Wan (2016)
Quantum Key Distribution Based on Interferometry and Interaction-Free MeasurementInternational Journal of Theoretical Physics, 55
Qing Chen, Jian-Bo Cheng, Ke-lin Wang, Jiangfeng Du (2005)
Efficient construction of two-dimensional cluster states with probabilistic quantum gatesPhysical Review A, 73
Ronghua Shi, Geli Lv, Y. Wang, Dazu Huang, Ying Guo (2013)
On Quantum Secret Sharing via Chinese Remainder Theorem with the Non-maximally Entanglement State AnalysisInternational Journal of Theoretical Physics, 52
A. Shamir (1979)
How to share a secretCommun. ACM, 22
Ying Sun, Shengwei Xu, Xiubo Chen, Xinxin Niu, Yixian Yang (2013)
Expansible quantum secret sharing networkQuantum Information Processing, 12
T. Jennewein, C. Simon, G. Weihs, Harald WeinfurterD, Anton Vienna, U. Munich (1999)
Quantum cryptography with entangled photonsPhysical review letters, 84 20
A. Beveratos, R. Brouri, T. Gacoin, A. Villing, J. Poizat, P. Grangier (2002)
Single photon quantum cryptography.Physical review letters, 89 18
Richard Hughes, J. Nordholt, D. Derkacs, C. Peterson (2002)
Practical free-space quantum key distribution over 10 km in daylight and at nightNew Journal of Physics, 4
Jung-Lun Hsu, Song-Kong Chong, T. Hwang, Chia-Wei Tsai (2013)
Dynamic quantum secret sharingQuantum Information Processing, 12
Ying Sun, F. Gao, Zheng Yuan, Yan-Bing Li, Q. Wen (2012)
Splitting a quantum secret without the assistance of entanglementsQuantum Information Processing, 11
Yuguang Yang, Yuan Wang, Hai-Ping Chai, Yi-Wei Teng, Hua Zhang (2011)
Member expansion in quantum (t,n) threshold secret sharing schemesOptics Communications, 284
Yan-Bing Li, S. Qin, Zheng Yuan, Wei Huang, Ying Sun (2013)
Quantum private comparison against decoherence noiseQuantum Information Processing, 12
HY Jia, QY Wen, F Gao, SJ Qin, FZ Guo (2012)
Dynamic quantum secret sharingPhys. Lett. A, 376
Zhan-jun Zhang, Yong Li, Z. Man (2004)
Multiparty quantum secret sharingPhysical Review A, 71
C. Gobby, Z. Yuan, A. Shields (2004)
Quantum key distribution over 122 km of standard telecom fiberApplied Physics Letters, 84
Qin Li, Dongyang Long, W. Chan, Daowen Qiu (2008)
Sharing a quantum secret without a trusted partyQuantum Information Processing, 10
M. Hillery, V. Bužek, A. Berthiaume (1998)
Quantum secret sharingPhysical Review A, 59
Gan Gao (2013)
Secure multiparty quantum secret sharing with the collective eavesdropping-check characterQuantum Information Processing, 12
D. Stucki, N. Gisin, O. Guinnard, G. Ribordy, H. Zbinden (2002)
Quantum key distribution over 67 km with a plug&play systemNew Journal of Physics, 4
Rui-Ke Chen, Ying-Ying Zhang, Jian-Hong Shi, Feng-Guang Li (2014)
A multiparty error-correcting method for quantum secret sharingQuantum Information Processing, 13
L. Liu, Chia-Wei Tsai, T. Hwang (2012)
Quantum Secret Sharing Using Symmetric W StateInternational Journal of Theoretical Physics, 51
Through generating the d-dimensional GHZ state in the Z-basis and measuring it in the X-basis, a dynamic quantum secret sharing scheme is proposed. In the proposed scheme, multiple participants can be added or deleted in one update period, and the shared secret does not need to be changed. The participants can be added or deleted by themselves, and the dealer does not need to be online. Compared to the existing schemes, the proposed scheme is more efficient and more practical.
Quantum Information Processing – Springer Journals
Published: Jan 30, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.