Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing
نویسندگان
چکیده
منابع مشابه
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing
We show a simple example of a secret sharing scheme encoding classical secret to quantum shares that can realize an access structure impossible by classical information processing with limitation on the size of each share. The example is based on quantum stabilizer codes.
متن کاملQuantum Stabilizer Codes and Classical Linear Codes
We show that within any quantum stabilizer code there lurks a classical binary linear code with similar error-correcting capabilities, thereby demonstrating new connections between quantum codes and classical codes. Using this result—which applies to degenerate as well as nondegenerate codes— previously established necessary conditions for classical linear codes can be easily translated into ne...
متن کاملUnitary Reconstruction of Secret for Stabilizer Based Quantum Secret Sharing
We propose a unitary procedure to reconstruct quantum secret for a quantum secret sharing scheme constructed from stabilizer quantum errorcorrecting codes. Erasure correcting procedures for stabilizer codes need to add missing shares for reconstruction of quantum secret while unitary reconstruction procedures for certain class of quantum secret sharing are known to work without adding missing s...
متن کاملQuantum secret sharing with classical Bobs
Boyer, Kenigsberg, and Mor [Phys.Rev.Lett.99, 140501(2007)] proposed a novel idea of semi-quantum key distribution where a key can be securely distributed between Alice who can perform any quantum operation and Bob who is classical. Extending the idea of “semiquantum” to other tasks of quantum information processing is of interest and worth considering. In this article, we consider the issue of...
متن کاملSecret sharing schemes for Multipartite access structures
Information security has become much more important since electronic communication is started to be used in our daily life. The content of the term information security varies according to the type and the requirements of the area. Secret sharing schemes are introduced to solve the problems for securing sensitive information. In this paper, we review our proposed hierarchical and compartmented ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
سال: 2017
ISSN: 0916-8508,1745-1337
DOI: 10.1587/transfun.e100.a.2738