Results 41 to 50 of about 1,065 (175)

Information Flow in Secret Sharing Protocols [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2009
The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC), error correction and secret ...
Elham Kashefi   +3 more
doaj   +1 more source

Circular quantum secret sharing [PDF]

open access: yesJournal of Physics A: Mathematical and General, 2006
7 pages, 2 ...
Fu-Guo Deng, Hong-Yu Zhou, Gui Lu Long
openaire   +2 more sources

Matroids and quantum-secret-sharing schemes [PDF]

open access: yesPhysical Review A, 2010
A secret sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret sharing schemes have been shown to be induced by matroids.
Sarvepalli, Pradeep, Raussendorf, Robert
openaire   +2 more sources

Advance Sharing Procedures for the Ramp Quantum Secret Sharing Schemes With the Highest Coding Rate

open access: yesIEEE Transactions on Quantum Engineering
In some quantum secret sharing schemes, it is known that some shares can be distributed to participants before a secret is given to the dealer. However, it is unclear whether some shares can be distributed before a secret is given in the ramp quantum ...
Ryutaroh Matsumoto
doaj   +1 more source

Graph states for quantum secret sharing [PDF]

open access: yesPhysical Review A, 2008
We consider three broad classes of quantum secret sharing with and without eavesdropping and show how a graph state formalism unifies otherwise disparate quantum secret sharing models. In addition to the elegant unification provided by graph states, our approach provides a generalization of threshold classical secret sharing via insecure quantum ...
Markham, Damian, Sanders, Barry C.
openaire   +3 more sources

Efficient (k, n) threshold semi-quantum secret sharing protocol

open access: yesFrontiers in Physics
Most (k, n) threshold quantum secret sharing protocols are fully quantum. The message receivers must be equipped with complex quantum devices so as to prepare various quantum resources and perform complex quantum operations, which may affect the practice
Jie Cao, Jinchao Xu
doaj   +1 more source

Study of secret sharing schemes based on quantum theory

open access: yesTongxin xuebao, 2009
Quantum secret sharing(QSS) which is based on the laws of quantum mechanics,instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quantum secret sharing can be divided into ...
ZHU Zhen-chao 1, ZHANG Yu-qing2
doaj   +2 more sources

Continuous-Variable Quantum Secret Sharing in Fast-Fluctuating Channels

open access: yesIEEE Transactions on Quantum Engineering, 2023
Recently, several continuous-variable quantum secret sharing (CV-QSS) protocols were proposed, while most of them are limited to the fiber channel systems with a relatively stable transmissivity.
Fangli Yang, Daowen Qiu, Paulo Mateus
doaj   +1 more source

Synergistic Pyro‐Phototronics and Structural Anisotropy in CsAg2I3/GaN Heterostructures for High‐Performance Polarization‐Sensitive UV Photodetectors

open access: yesAdvanced Science, EarlyView.
The development of polarization‐sensitive ultraviolet photodetectors is limited by poor heterojunction quality and low polarization sensitivity. This study integrates synthesized CsAg2I3 single crystals with intrinsic non‐centrosymmetry into van der Waals heterojunction devices, demonstrating pronounced pyro‐phototronic effect.
Yalin Zhai   +9 more
wiley   +1 more source

Quantum Secret Sharing with Error Correction [PDF]

open access: yesCommunications in Theoretical Physics, 2012
We investigate in this work a quantum error correction on a five-qubits graph state used for secret sharing through five noisy channels. We describe the procedure for the five, seven and nine qubits codes. It is known that the three codes always allow error recovery if only one among the sents qubits is disturbed in the transmitting channel.
Mouzali, Aziz   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy