How to share a Quantum Secret
نویسندگان
چکیده
quantum information, secret sharing, quantum cryptography, quantum computation We investigate the concept of quantum secret sharing, where a secret quantum state is distributed between n parties in such a way that certain subsets of the parties can jointly recover the secret, while other subsets of the parties can acquire absolutely no information about it. In a ((k,n)) threshold scheme, any subset of k or more parties can reconstruct the secret, while any subset of k – 1 or fewer parties can obtain no information. We show that the only constraint on the existence of threshold schemes comes from the quantum “no-cloning theorem,” which requires that n < 2k, and, in all such cases, we give an efficient construction of a ((k,n)) threshold scheme. We also explore similarities and differences between quantum secret sharing schemes and quantum error-correcting codes. One remarkable difference is that, while most existing quantum codes encode pure states as pure states, quantum secret sharing schemes must use mixed states in some cases. For example, if k ≤ n < 2k – 1 then any ((k,n)) threshold scheme must distribute information that is globally in a mixed state.
منابع مشابه
Quantum secret sharing pdf
quantum secret sharing where a quantum participant Alice can share a secret key with two classical participants Bobs. After analyz.Secret sharing is a procedure for splitting a message into several parts so that no subset of parts is. Quantum cryptography with secret sharing in a way that will.We show how a quantum secret sharing protocol, similar to that of Hillery, Buzek, and Berthiaume. A pr...
متن کاملStrongly Secure Quantum Ramp Secret Sharing Constructed from Algebraic Curves over Finite Fields (full version arXiv:1410.5126)
Secret sharing (SS) scheme encodes a secret into multiple shares being distributed to participants, so that only qualified sets of shares can reconstruct the secret perfectly [13]. The secret and shares are traditionally classical information [13], but now quantum secret and quantum shares can also be used [3, 4, 11]. In perfect SS, if a set of shares is not qualified, that is, it cannot recons...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملGeometric and Computational Approach to Classical and Quantum Secret Sharing
Secret sharing (SS) [15] is a cryptographic scheme to encode a secret to multiple shares being distributed to participants, so that only qualified (or authorized) sets of participants can reconstruct the original secret from their shares. Traditionally both secret and shares were classical information (bits). Several authors [5, 7, 16] extended the traditional SS to a quantum one so that a quan...
متن کاملEthics and politics in Joseph Conrad’s The Secret Agent And Bozorg Alavi’s Her Eyes
In this paper, the writers try to compare two authors, the Iranian leftist, Bozorg Alavi (1904-1997) and the Polish Joseph Conrad (1857-1924). Although these two writers have different attitudes to Socialism and the question of revolution, both share Romantic idealism and a tragic sense of personal and social life. Moreover, they both are precursors of modernist novel in their countries, and sh...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999