Access the full text.
Sign up today, get DeepDyve free for 14 days.
C. Blundo, A. Santis, Douglas Stinson, U. Vaccaro (1992)
Graph decompositions and secret sharing schemesJournal of Cryptology, 8
Xihan Li, Fu-Guo Deng, Hong-Yu Zhou (2007)
Controlled Teleportation of an Arbitrary Multi-Qudit State in a General Form with d-Dimensional Greenberger–Horne–Zeilinger StatesChinese Physics Letters, 24
Vlad Gheorghiu, B. Sanders (2013)
Accessing quantum secrets via local operations and classical communicationPhysical Review A, 88
Li Xiao, G. Long, Fuguo Deng, Jian-Wei Pan (2004)
Efficient multiparty quantum-secret-sharing schemesPhysical Review A, 69
Jason Lin, Chun-Wei Yang, T. Hwang (2014)
Quantum private comparison of equality protocol without a third partyQuantum Information Processing, 13
A. Karlsson, M. Koashi, N. Imoto (1999)
Quantum entanglement for secret sharing and secret splittingPhysical Review A, 59
(1979)
In: Proceedings of the National Computer Conference (AFIPS, 1979), pp
Q. Cai (2005)
Eavesdropping on the two-way quantum communication protocols with invisible photonsPhysics Letters A, 351
G. Gordon, G. Rigolin (2006)
Generalized quantum-state sharingPhysical Review A, 73
M. Dehkordi, Elham Fattahi (2013)
Threshold quantum secret sharing between multiparty and multiparty using Greenberger–Horne–Zeilinger stateQuantum Information Processing, 12
Jason Lin, Chun-Wei Yang, Chia-Wei Tsai, T. Hwang (2011)
Intercept-Resend Attacks on Semi-quantum Secret Sharing and the ImprovementsInternational Journal of Theoretical Physics, 52
G. Long, X. Liu (2000)
Theoretically efficient high-capacity quantum-key-distribution schemePhysical Review A, 65
Huawang Qin, Yue-wei Dai (2015)
Proactive quantum secret sharingQuantum Information Processing, 14
Chun-Yan Li, Xihan Li, Fuguo Deng, Ping Zhou, Yu-Jie Liang, Hong-Yu Zhou (2006)
Efficient Quantum Cryptography Network without Entanglement and Quantum MemoryChinese Physics Letters, 23
A. Shamir (1979)
How to share a secretCommun. ACM, 22
Ci-Hong Liao, Chun-Wei Yang, T. Hwang (2014)
Dynamic quantum secret sharing protocol based on GHZ stateQuantum Information Processing, 13
Fuguo Deng, Xihan Li, Chun-Yan Li, P. Zhou, Hong-Yu Zhou (2005)
Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs (4 pages)Physical Review A, 72
Xihan Li, Fuguo Deng, Hong-Yu Zhou (2006)
Improving the security of secure direct communication based on the secret transmitting order of particlesPhysical Review A, 74
Xihan Li, P. Zhou, Chun-Yan Li, Hong-Yu Zhou, Fuguo Deng (2005)
Efficient symmetric multiparty quantum state sharing of an arbitrary m-qubit stateJournal of Physics B: Atomic, Molecular and Optical Physics, 39
L. Dong, X. Xiu, Ya-Jun Gao (2007)
MULTIPARTY QUANTUM STATE SHARING OF m-QUBIT STATEInternational Journal of Modern Physics C, 18
Hoi-Kwong Lo, Yi Zhao (1995)
Quantum Cryptography
Jason Lin, T. Hwang (2013)
New circular quantum secret sharing for remote agentsQuantum Information Processing, 12
N Gisin, S Fasel, H Zbinden, G Ribordy (2006)
Trojan-horse attacks on quantum-key distribution systemsPhys. Rev. A, 73
V. Karimipour, M. Asoudeh (2015)
Quantum secret sharing and random hopping: Using single states instead of entanglementPhysical Review A, 92
L. Hsu, Che Li (2005)
Quantum secret sharing using product statesPhysical Review A, 71
A. Tavakoli, I. Herbauts, M. Żukowski, M. Bourennane (2015)
Secret sharing with a single d -level quantum systemPhysical Review A, 92
R Rahaman, MG Parker (2015)
Quantum scheme for secret sharing based on local distinguishabilityPhys. Rev. A, 91
Arpita Maitra, S. De, G. Paul, A. Pal (2015)
A Proposal for Quantum Rational Secret SharingArXiv, abs/1501.04212
Chuan Wang, Fuguo Deng, Yansong Li, Xiao-Shu Liu, G. Long (2005)
Quantum secure direct communication with high-dimension quantum superdense codingPhysical Review A, 71
Fuguo Deng, Hongyu Long (2006)
Circular quantum secret sharingJournal of Physics A, 39
HW Qin, XH Zhu, YW Dai (2015)
$$(t, n)$$ ( t , n ) Threshold quantum secret sharing using the phase shift operationQuantum Inf. Process., 14
Zu-Rong Zhang, Wei-Tao Liu, Cheng-Zu Li (2011)
Quantum secret sharing based on quantum error-correcting codesChinese Physics B, 20
Chun-Yan Li, Hong-Yu Zhou, Yan Wang, Fuguo Deng (2007)
Secure quantum key distribution network with Bell states and local unitary operations
D. Gottesman (1999)
Theory of quantum secret sharingPhysical Review A, 61
Fuguo Deng, Xihan Li, Hong-Yu Zhou, Zhan-jun Zhang (2005)
Improving the security of multiparty quantum secret sharing against Trojan horse attackPhysical Review A, 72
M. Hillery, V. Bužek, A. Berthiaume (1998)
Quantum secret sharingPhysical Review A, 59
Chun-Wei Yang, T. Hwang, Yi-Ping Luo (2013)
Enhancement on “quantum blind signature based on two-state vector formalism”Quantum Information Processing, 12
邓富国, 龙桂鲁, 汪燕, 肖丽 (2004)
Increasing the Efficiencies of Random-Choice-Based Quantum Communication Protocols with Delayed Measurement
P. Sarvepalli, R. Raussendorf (2009)
Matroids and Quantum Secret Sharing SchemesArXiv, abs/0909.0549
Huawang Qin, Yue-wei Dai (2016)
Verifiable (t, n) threshold quantum secret sharing using d-dimensional Bell stateInf. Process. Lett., 116
Huawang Qin, Xiaohua Zhu, Yue-wei Dai (2015)
(t, n) Threshold quantum secret sharing using the phase shift operationQuantum Information Processing, 14
N. Gisin, Sylvain Fasel, Barbara Kraus, H. Zbinden, G. Ribordy (2005)
Trojan-horse attacks on quantum-key-distribution systems (6 pages)Physical Review A, 73
A. Lance, T. Symul, W. Bowen, B. Sanders, P. Lam (2003)
Tripartite quantum state sharing.Physical review letters, 92 17
R. Cleve, D. Gottesman, H. Lo (1999)
HOW TO SHARE A QUANTUM SECRETPhysical Review Letters, 83
We propose a quantum secret sharing scheme that uses an orthogonal pair of n-qudit GHZ states and local distinguishability. In the proposed protocol, the participants use an X-basis measurement and classical communication to distinguish between the two orthogonal states and reconstruct the original secret. We also present (2, n)-threshold and generalized restricted (2, n)-threshold schemes that enable any two cooperating players from two disjoint groups to always reconstruct the secret. Compared to the existing scheme by Rahaman and Parker (Phys Rev A 91:022330, 2015), the proposed scheme is more general and the access structure contains more authorized sets.
Quantum Information Processing – Springer Journals
Published: Jan 21, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.