Access the full text.
Sign up today, get DeepDyve free for 14 days.
MH Dehkordi, E Fattahi (2013)
Threshold quantum secret sharing between multiparty and multiparty using Greenberger-Horne-ZeilingerQuantum Inf. Process., 12
R Cleve, D Gottesman, HK Lo (1999)
How to share a quantum secretPhys. Rev. Lett., 83
P Sarvepalli, R Raussendorf (2010)
Matroids and quantum-secret-sharing schemePhys. Rev. A., 81
L Xiao, GL Long, FG Deng, JW Pan (2004)
Efficient multiparty quantum-secret-sharing schemesPhys. Rev. A., 69
FG Deng, HY Zhou, GL Long (2005)
Bidirectional quantum secret sharing and secret splitting with polarized single photonsPhys. Lett. A., 337
ZJ Zhang, Y Li, ZX Man (2005)
Multiparty quantum secret sharingPhys. Rev. A., 71
CAN Anderson, MQ Joern, I Hideki (2001)
Improving quantum secret sharing schemesPhys. Rev. A., 64
FG Deng, HY Zhou, GL Long (2006)
Circular quantum secret sharingJ. Phys. A Math Gen., 39
RG Du, ZW Sun, BH Wang, DY Long (2012)
Quantum secret sharing of secure direct communication using one-time padInt. J. Theor. Phys., 51
GL Long, XS Liu (2002)
Theoretically efficient high-capacity quantum-key-distribution schemePhys. Rev. A., 65
HD Massoud, F Elham (2012)
A novel and efficient multiparty quantum secret sharing scheme using entangled statesSci China Phys. Mech. Astron., 55
B. Fortescue, G. Gour (2012)
Reducing the quantum communication cost of quantum secret sharingIEEE Trans. Inf. Theory, 58
G Gao (2013)
Secure multiparty quantum secret sharing with the collective eavesdropping-check characterQuantum Inf. Process., 12
YY Nie, YH Li, ZS Wang (2013)
Semi-quantum information splitting using GHZ-type statesQuantum Inf. Process., 12
F.G. Deng, G.L. Long, X.S. Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhys. Rev. A., 68
A Shamir (1979)
How to share a secretCommun. ACM, 22
L Hao, C Wang, GL Long (2011)
Quantum secret sharing protocol with four state Grover algorithm and its proof-of-principle experimental demonstrationOpt. Commun., 284
ZJ Zhang (2006)
Multiparty secret sharing of quantum information via cavity QEDOpt. Commun., 261
A Beige, BG Englert, C Kurtsiefer, H Weinfurter (2002)
Secure communication with a publicly known keyActa Physica A., 101
KJ Wei, HQ Ma, JH Yang (2013)
Experimental circular quantum secret sharing over telecom fiber networkOpt. Express, 21
K Boström, T Felbinger (2002)
Deterministic secure direct communication using entanglementPhys. Rev. Lett., 89
LF Han, YM Liu, J Liu, ZJ Zhang (2008)
Multiparty quantum secret sharing of secure direct communication using single photonsOpt. Commun., 281
M Hillery, V Buz̆ek, A Berthiaume (1999)
Quantum secret sharingPhys. Rev. A., 59
V Gheorghiu (2012)
Generalized semiquantum secret sharing schemesPhys. Rev. A., 85
J Lin, T Hwang (2013)
New circular quantum secret sharing for remote agentsQuantum Inf. Process., 12
D Gottesman (2000)
Theory of quantum secret sharingPhys. Rev. A., 61
ZJ Zhang, ZX Man (2005)
Multiparty quantum secret sharing of classical messages based on entanglement swappingPhys. Rev. A., 72
FG Deng, GL Long, HY Zhou (2005)
An efficient quantum secret sharing scheme with Einstein-Podolsky-Rosen pairsPhys. Lett. A., 340
Q Lin, WH Chan, DY Long (2010)
Semiquantum secret sharing using entangled statesPhys. Rev. A., 82
U Rupert, H Richard (2013)
Quantum information: Sharing quantum secretsNature., 501
YG Yang, X Jia, HY Wang, H Zhang (2012)
Verifiable quantum (k, n) threshold secret sharingQuantum Inf. Process., 11
M Jiang, X Huang, LL Zhou, YM Zhou, J Zeng (2012)
An efficient scheme for multi-party quantum state sharing via non-maximally entangled statesChin. Sci. Bull., 57
CW Tsai, T Hwang (2012)
Multiparty quantum secret sharing based on two special entangled statesSci China Phys. Mech. Astron., 3
ZJ Zhang (2007)
Multiparty quantum secret sharing scheme of classical messages by swapping qudit-state entanglementInt. J. Mod. Phys. C., 18
ZJ Zhang (2007)
Multiparty quantum secret sharing based on the improved Boström-Felbinger protocolOpt. Commun., 269
ZJ Zhang (2005)
Multiparty quantum secret sharing of secure direct communicationPhys. Lett. A., 342
LZ Li, DW Qiu, P Mateus (2013)
Quantum secret sharing with classical BobsJ. Phys. A Math. Theor., 46
C Wang, FG Deng, YS Li, XS Liu, LL Gui (2005)
Quantum secure direct communication with high-dimension quantum superdense codingPhys. Rev. A., 71
BK Li, YG Yang, QY Wen (2009)
Threshold quantum secret sharing of secure direct communicationChin. Phys. Lett., 26
SY Song, C Wang (2012)
Recent development in quantum communicationChin. Sci. Bull., 57
L Hao, JL Li, GL Long (2010)
Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solutionSci China. Phys. Mech. Astron., 53
F Gao, SJ Qin, FZ Guo, QY Wen (2011)
Dense-coding attack on three-party quantum key distribution protocolsIEEE J. Quantum Electron., 47
We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.
Quantum Information Processing – Springer Journals
Published: Nov 24, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.