SEMIQUANTUM SECRET SHARING USING TWO-PARTICLE ENTANGLED STATE

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comment on"Semiquantum secret sharing using entangled states"

Recently, Li et al. [Phys. Rev. A, 82(2), 022303] presented two semi-quantum secret sharing (SQSS) protocols using GHZ-like states. The proposed schemes are rather practical because only the secret dealer requires to equip with advanced quantum devices such as quantum memory, whereas the other agents can merely perform classical operations to complete the secret sharing. However, this study poi...

متن کامل

Probabilistic teleportation of two - particle entangled state

In this report, two different probabilistic teleportations of a two-particle entangled state by pure entangled three-particle state are shown. Their successful probabilities are different. 03.65.Bz, 03.67.-a Typeset using REVTEX ∗E-mail: [email protected] †E-Mail: [email protected] 1 Quantum teleportation, proposed by Bennett et.al [1], is the process that transmits an unknown two-state particl...

متن کامل

Teleportation and Secret Sharing with Pure Entangled States

In recent years quantum entanglement [1] has found many exciting applications which have considerable bearing on the emerging fields of quantum information [2] and quantum computing [3]. Two such key applications are quantum teleportation [4] and quantum secret sharing [9]. Quantum teleportation involves secure transfer of an unknown qubit from one place to another and in quantum secret sharing...

متن کامل

Sharing a verifiable secret image using two shadows

Article history: Received 15 September 2008 Received in revised form 16 February 2009 Accepted 20 April 2009

متن کامل

Secret Sharing using Image Hashing

This paper presents a cryptographic technique that encrypts secret information using a coding image by transforming the pixels of this image from the intensity domain to the characters domain using a hash function. In the proposed technique, the coding image will be used to encrypt the secret information at the sender and decrypt it at the receiver using the pixels whose intensity values are tr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Quantum Information

سال: 2012

ISSN: 0219-7499,1793-6918

DOI: 10.1142/s0219749912500505