This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GH...This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency.展开更多
Recently, Gao et al. [Opt. Commun. 283 (2010) 192] pointed out that Wang et al,'s multiparty controlled quantum secure direct communication (CQSDC) protocol [Opt. Commun. 266 (2006) 732] has the information lea...Recently, Gao et al. [Opt. Commun. 283 (2010) 192] pointed out that Wang et al,'s multiparty controlled quantum secure direct communication (CQSDC) protocol [Opt. Commun. 266 (2006) 732] has the information leakage problem and proposed an improved protocol. However, in the improved protocol, due to the introduction of an additional random sampling to avoid the weakness, the qubit efficiency is decreased. By introducing the base changing technique to the random sampling in Wang et al. 's protocol, this study overcomes the information leakage problem and provides a better qubit efficiency.展开更多
基金Supported by the National Science Council,Taiwan,China,under the Contract No.NSC 98-2221-E-006-097-MY3
文摘This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency.
文摘Recently, Gao et al. [Opt. Commun. 283 (2010) 192] pointed out that Wang et al,'s multiparty controlled quantum secure direct communication (CQSDC) protocol [Opt. Commun. 266 (2006) 732] has the information leakage problem and proposed an improved protocol. However, in the improved protocol, due to the introduction of an additional random sampling to avoid the weakness, the qubit efficiency is decreased. By introducing the base changing technique to the random sampling in Wang et al. 's protocol, this study overcomes the information leakage problem and provides a better qubit efficiency.