We present a remote three-party quantum state sharing (QSTS) scheme with three-atom Greenberger- Horne-Zeilinger (GHZ) states assisted by cavity QED and flying qubits. It exploits some photons to act as the flying...We present a remote three-party quantum state sharing (QSTS) scheme with three-atom Greenberger- Horne-Zeilinger (GHZ) states assisted by cavity QED and flying qubits. It exploits some photons to act as the flying qubits for setting up the quantum channel securely with three-atom systems in a GHZ state, which maybe make this remote QSTS scheme more practical than some other schemes based on atom systems only or ion-trap systems as photons interact with their environments weakly. The coherence of the stationary atom qubits in cavities provides the convenience for the parties in QSTS to check eavesdropping, different from entangled photon systems. Moreover, the present scheme works in a collective-noise condition and it may be more practical than others in applications in future.展开更多
In a recent letter [H.F. Wang, X. Ji, and S. Zhang, Phys. Lett. A 358 (2006) 11], an improvement of the multiparty quantum secret splitting and quantum state sharing protocol [F.G. Deng, et al., Phys. Lett. A 354 (...In a recent letter [H.F. Wang, X. Ji, and S. Zhang, Phys. Lett. A 358 (2006) 11], an improvement of the multiparty quantum secret splitting and quantum state sharing protocol [F.G. Deng, et al., Phys. Lett. A 354 (2006) 190.] was presented. We study the security of the improved protocol and find that two or more dishonest participants may recover the secret from the dealer. Hence we further modify the improved protocol, which make it stand against this kind of attack.展开更多
In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised...In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely.展开更多
基金Supported by the National Natural Science Foundation of China under Grant No.10974020the Fundamental Research Funds for the Central Universities
文摘We present a remote three-party quantum state sharing (QSTS) scheme with three-atom Greenberger- Horne-Zeilinger (GHZ) states assisted by cavity QED and flying qubits. It exploits some photons to act as the flying qubits for setting up the quantum channel securely with three-atom systems in a GHZ state, which maybe make this remote QSTS scheme more practical than some other schemes based on atom systems only or ion-trap systems as photons interact with their environments weakly. The coherence of the stationary atom qubits in cavities provides the convenience for the parties in QSTS to check eavesdropping, different from entangled photon systems. Moreover, the present scheme works in a collective-noise condition and it may be more practical than others in applications in future.
基金Supported by National Natural Science Foundation of China under Grant No.60903152National Laboratory for Modern Communications Science Foundation of China under Grant No.9140C1101010601+3 种基金the Beijing Natural Science Foundation under Grant No.4072020a Key Project of Fujian Provincial Universities - Information Technology Research Based on Mathematics the Fujian Province Natural Science Foundation under Grant No.2008J0013the Foundation of Fujian Education Bureau under Grant No.JA08044
文摘In a recent letter [H.F. Wang, X. Ji, and S. Zhang, Phys. Lett. A 358 (2006) 11], an improvement of the multiparty quantum secret splitting and quantum state sharing protocol [F.G. Deng, et al., Phys. Lett. A 354 (2006) 190.] was presented. We study the security of the improved protocol and find that two or more dishonest participants may recover the secret from the dealer. Hence we further modify the improved protocol, which make it stand against this kind of attack.
基金Supported in part by an International Macquarie University Research Excellence Scholarship(i MQRES),Australian Research Council Grant DP0987734also supported by the National Basic Research Program of China(973 Program)under Grant No.2010CB923200+2 种基金the National Natural Science Foundation of China under No.61377067Fund of State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications,China,National Natural Science Foundation of China under Grant Nos.61202362,61262057,61472433China Postdoctora Science Foundation under Grant No.2013M542560
文摘In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely.