Quantum secret sharing based on a reusable Greenberger - Horne - Zeilinger states as secure carriers ”
نویسنده
چکیده
We show that the criticism of a recent comment [1] on the insecurity of a quantum secret sharing protocol proposed in [2] is based on a misconception about the meaning of security and hence is invalid. The same misconception also appears in another comment of the authors [3] on the security of an entangled-based quantum key distribution protocol [4, 5].
منابع مشابه
Quantum secret sharing based on a reusable
Reply to Comments on " Quantum Key Distribution for d-level systems for generalized Bell states " [Phys. Rev. A, 052331, (2002)] and " Quantum secret sharing based on a reusable Greenberger-Horne-Zeilinger states as secure carriers " [Phys. Abstract We show that the criticisms of two recent comments [1, 2] on the insecurity of quantum key distributions proposed in [3] and [4] and the secret sha...
متن کاملMultiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state
Based on the idea of dense coding of three-photon entangled state and qubit transmission in blocks, we present a multiparty controlled quantum secret direct communication scheme by using Greenberger–Horne–Zeilinger state. In the present scheme, the sender transmits three bits of secret message to the receiver directly and the secret message can only be recovered by the receiver under the permis...
متن کاملMultiparty quantum secret sharing of secure direct communication
Based on the two-step protocol [Phys. Rev. A68(03)042317], we propose a (n, n)-threshold multiparty quantum secret sharing protocol of secure direct communication. In our protocol only all the sharers collaborate can the sender’s secure direct communication message be extracted. We show a variant version of this protocol based on the variant two-step protocol. This variant version can considera...
متن کاملReply to ”Comment on quantum secret sharing based on reusable Greenbergr-Horne-Zeilinger states as secure carriers”
In a recent comment, it has been shown that in a quantum secret sharing protocol proposed in [S. Bagherinezhad, V. Karimipour, Phys. Rev. A, 67, 044302, (2003)], one of the receivers can cheat by splitting the entanglement of the carrier and intercepting the secret, without being detected. In this reply we show that a simple modification of the protocol prevents the receivers from this kind of ...
متن کامل3 party quantum secret sharing
3 The QuBit-Case 3 3.1 Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3.2 General setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 3.3 The protocol as a circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 3.4 Preparation of the GHZ state . . . . . . . . . . . . . . ....
متن کامل