期刊文献+

Quantum secret sharing between m-party and n-party with six states 被引量:15

Quantum secret sharing between m-party and n-party with six states
原文传递
导出
摘要 A quantum secret sharing scheme between an m-party group and an n-party group is proposed using three conjugate bases.A sequence of single photons,each of which is prepared in one of the six states,is used directly to encode classical information in the quantum secret sharing process.In this scheme,each of all m members in group 1 chooses randomly his/her own secret key individually and independently,and directly encodes his/her respective secret information on the states of single photons via unitary operations,then the last one sends 1/n of the resulting qubits to each member of group 2.By measuring their respective qubits,all members in group 2 share the secret information shared by all members in group 1.It renders impossible a Trojan horse attack with a multi-photon signal,a fake-signal attack with EPR pairs,an attack with single photons,and an attack with invisible photons.We give the upper bounds on the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states. A quantum secret sharing scheme between an m-party group and an n-party group is proposed using three conjugate bases. A sequence of single photons, each of which is prepared in one of the six states, is used directly to encode classical information in the quantum secret sharing process. In this scheme, each of all m members in group 1 chooses randomly his/her own secret key individually and independently, and directly encodes his/her respective secret information on the states of single photons via unitary operations, then the last one sends 1/n of the resulting qubits to each member of group 2. By measuring their respective qubits, all members in group 2 share the secret information shared by all members in group 1. It renders impossible a Trojan horse attack with a multi-photon signal, a fake-signal attack with EPR pairs, an attack with single photons, and an attack with invisible photons. We give the upper bounds on the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states.
出处 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2009年第8期1191-1202,共12页 中国科学:物理学、力学、天文学(英文版)
基金 Supported by the National Natural Science Foundation of China (Grant No. 10671054) the Key Project of Science and Technology Research of Education Ministry of China (Grant No. 207011) the Natural Science Foundation of Hebei Province, China (Grant Nos. 07M006 and F2009000311)
关键词 quantum SECRET SHARING security EPR PAIRS quantum secret sharing security EPR pairs
  • 相关文献

参考文献1

二级参考文献54

  • 1Xiao L, Long G L, Deng F G and Pan J W 2004 Phys. Rev. A 69 052307
  • 2Karlsson A, Koashi M and Imoto N 1999 Phys. Rev. A 59 162
  • 3Tittel W, Zbinden H and Gisin N 2001 Phys. Rev. A 63 042301
  • 4Gottesman D 2000 Phys. Rev. A 61 042311
  • 5Nascimento A C A, Quade J M and Imai H 2001 Phys. Rev. A 64 042311
  • 6Cleve R, Gottesman D and Lo H K 1999 Phys. Rev. Lett. 83 648
  • 7Karimipour V, Bahraminasab A and Bagherinezhad S 2002 Phys. Rev. A 65 042320
  • 8Deng F G, Long G L and Zhou H Y 2005 Phys. Lett. A 340 43
  • 9Zhang Z J and Man Z X 2005 Phys. Rev. A 72 022303
  • 10Zhang Z J, Yang J, Man Z X and Li Y 2005 Eur. Phys. J. D 33 133

共引文献9

同被引文献127

引证文献15

二级引证文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部