Continuous variable (2, 3) threshold quantum secret sharing schemes
نویسندگان
چکیده
منابع مشابه
Continuous variable (2, 3) threshold quantum secret sharing schemes
We present two schemes to perform continuous variable (2, 3) threshold quantum secret sharing (QSS) on the quadrature amplitudes of bright light beams. Both schemes require a pair of entangled light beams. The first scheme utilizes two phase sensitive optical amplifiers, whilst the second uses an electro-optic feedforward loop for the reconstruction of the secret. We examine the efficacy of QSS...
متن کاملRepairable Threshold Secret Sharing Schemes
In this paper, we propose a class of new threshold secret sharing schemes with repairing function between shares. Specifically, each share, when it is broken or lost, can be repaired by some others without the help of the dealer. Further, a construction of such repairable threshold secret sharing schemes is designed by applying linearized polynomials and regenerating codes in distributed storag...
متن کاملQuantum Secret Sharing Schemes
Nascimento et al. [19] introduced a quantum information theoretical model for Quantum Secret Sharing (QSS) schemes. In this thesis, we describe existing schemes, such as the construction using Monotone Span Programs (MSPs) [16], according to this model. Moreover, the correctness of these schemes is proved in an information theoretical way. In particular, we consider the so-called pure state QSS...
متن کاملThreshold changeable secret sharing schemes revisited
This paper studies the methods for changing thresholds in the absence of secure channels after the setup of threshold secret sharing schemes. First, we construct a perfect (t, n) threshold scheme that is threshold changeable to t ′ > t , which is optimal with respect to the share size. This improves the scheme of Wang and Wong by relaxing the requirement from q ≥ n + v to q > n with the secret-...
متن کاملVerifiable Secret Redistribution for Threshold Sharing Schemes
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m,n) access structures for threshold sharing schemes. Our protocol enables the addition or removal of shareholders and also guards against mobile adversaries that cause permanent damage. We observe that existing protocols either cannot be readily extended to allow redistribution between different access struct...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: New Journal of Physics
سال: 2003
ISSN: 1367-2630
DOI: 10.1088/1367-2630/5/1/304