期刊文献+

Efficient Three-Party Quantum Secret Sharing with Single Photons 被引量:4

Efficient Three-Party Quantum Secret Sharing with Single Photons
下载PDF
导出
摘要 A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice who checks the security of the transmission with measurements and produces some decoy photons by rearranging the orders of some sample photons. Alice encodes her bits with two unitary operations on the photons and then sends them to the other agent. The security of this scheme is equivalent to that in the modified Bennett Brassard 1984 quantum key distribution protocol. Moreover, each photon can carry one bit of the private key and the intrinsic efficiency for qubits and the total efficiency both approach the maximal value 100% when the number of the bits in the key is very large. A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice who checks the security of the transmission with measurements and produces some decoy photons by rearranging the orders of some sample photons. Alice encodes her bits with two unitary operations on the photons and then sends them to the other agent. The security of this scheme is equivalent to that in the modified Bennett Brassard 1984 quantum key distribution protocol. Moreover, each photon can carry one bit of the private key and the intrinsic efficiency for qubits and the total efficiency both approach the maximal value 100% when the number of the bits in the key is very large.
出处 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第8期2181-2184,共4页 中国物理快报(英文版)
基金 Supported by the National Natural Science Foundation of China under Grant Nos 10604008 and 10435020 and Beijing Education Committee under Grant No XK100270454.
关键词 PODOLSKY-ROSEN PAIRS HORNE-ZEILINGER STATES COMMUNICATION PROTOCOLS ENTANGLED STATES BELL STATES INFORMATION NETWORK CRYPTOGRAPHY SCHEME PODOLSKY-ROSEN PAIRS HORNE-ZEILINGER STATES COMMUNICATION PROTOCOLS ENTANGLED STATES BELL STATES INFORMATION NETWORK CRYPTOGRAPHY SCHEME
  • 相关文献

参考文献45

  • 1Nielsen M A and Chuang I L Quantum Computation and Quantum Information (Cambridge: Cambridge University Press) 被引量:1
  • 2Gisin N, Ribordy G, Tittel W and Zbinden H 2002 Rev. Mod. Phys. 74 145 被引量:1
  • 3Bennett C H and Brassad G 1984 Proc. IEEE Int. Conf. Computers, Systems and Signal Processing (Bangalore, India (New York: IEEE) p 175 被引量:1
  • 4Long G L and Liu X S 2002 Phys. Rev. A 65 032302 被引量:1
  • 5Deng F G and Long G L 2003 Phys. Rev. A 68 042315 被引量:1
  • 6Deng F G and Long G L 2004 Phys. Rev. A 70 012311 被引量:1
  • 7Lo H K et al 2005 J. Cryptology 18 122 被引量:1
  • 8Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317 被引量:1
  • 9Deng F G and Long G L 2004 Phys. Rev. A 69 052319 被引量:1
  • 10Deng F G and Long G L 2006 Commun. Theor. Phys. 46 443 被引量:1

同被引文献40

引证文献4

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部