Reply to ”Comment on quantum secret sharing based on reusable Greenbergr-Horne-Zeilinger states as secure carriers”

نویسنده

  • V. Karimipour
چکیده

In a recent comment, it has been shown that in a quantum secret sharing protocol proposed in [S. Bagherinezhad, V. Karimipour, Phys. Rev. A, 67, 044302, (2003)], one of the receivers can cheat by splitting the entanglement of the carrier and intercepting the secret, without being detected. In this reply we show that a simple modification of the protocol prevents the receivers from this kind of cheating. PACS Numbers: 03.67.Dd, 03.65.Ud. email:[email protected] To set up the context and the notations, it is appropriate to first review briefly the protocol itself [1] and the basic feature of the attack or cheating suggested in [2]. 1 The basic steps of the protocol and the cheating First we need the concept of a reusable secure carrier [3], . A Bell state like |φ〉ab = 1 √ 2 (|00〉+ |11〉)ab, shared between Alice(a) and Bob(b) can be used as a reusable secure carrier between two parties as follows. Alice entangles a qubit |q〉1 by the action of a CNOT gate Ca1 (acting on the qubit 1 and controlled by a), which produces a state like 1 √ 2 (|00q〉+ |11q〉)ab1. At the destination Bob disentangles the qubit by a CNOT operation Cb1, leaving the carrier in its original state for reusing. During the transmission the qubit has been disguised in a highly mixed state. Any of the Bell states |φ〉ab = 1 √ 2 (|00〉 ± |11〉)ab, |ψ〉ab = 1 √ 2 (|01〉 ± |10〉)ab (1) can be used as a carrier. For three parties [1], a carrier shared between Alice(a), Bob(b) and Charlie(c) can be a GHZ state like |GHZ〉 := 1 √ 2 (|000〉+ |111〉)abc, (2) or an even parity state like |E〉 := 1 2 (|000〉+ |110〉+ |101〉+ |011〉)abc. (3) Throughout [1], the comment [2] and the present reply the subscripts a, b and c are used for the quibts shared by, or the local operators acted by, Alice, Bob and Charlie respectively, while the subscripts 1 and 2 are used for the qubits sent to Bob and Charlie respectively. It was shown in [1] that by suitable local operations, Alice can send a qubit q to Bob and Charlie, by entangling it to the above carriers (hence hiding it from Eavesdroppers). In order to share the secret between Bob and Charlie, half of the bits (the bits in the odd rounds) were sent to Bob and Charlie, as states of the form |qq〉12 which they could read without the help

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum secret sharing based on a reusable

Reply to Comments on " Quantum Key Distribution for d-level systems for generalized Bell states " [Phys. Rev. A, 052331, (2002)] and " Quantum secret sharing based on a reusable Greenberger-Horne-Zeilinger states as secure carriers " [Phys. Abstract We show that the criticisms of two recent comments [1, 2] on the insecurity of quantum key distributions proposed in [3] and [4] and the secret sha...

متن کامل

Quantum secret sharing based on a reusable Greenberger - Horne - Zeilinger states as secure carriers ”

We show that the criticism of a recent comment [1] on the insecurity of a quantum secret sharing protocol proposed in [2] is based on a misconception about the meaning of security and hence is invalid. The same misconception also appears in another comment of the authors [3] on the security of an entangled-based quantum key distribution protocol [4, 5].

متن کامل

Multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state

Based on the idea of dense coding of three-photon entangled state and qubit transmission in blocks, we present a multiparty controlled quantum secret direct communication scheme by using Greenberger–Horne–Zeilinger state. In the present scheme, the sender transmits three bits of secret message to the receiver directly and the secret message can only be recovered by the receiver under the permis...

متن کامل

Multiparty quantum secret sharing of secure direct communication

Based on the two-step protocol [Phys. Rev. A68(03)042317], we propose a (n, n)-threshold multiparty quantum secret sharing protocol of secure direct communication. In our protocol only all the sharers collaborate can the sender’s secure direct communication message be extracted. We show a variant version of this protocol based on the variant two-step protocol. This variant version can considera...

متن کامل

Experimental single qubit quantum secret sharing.

We present a simple and practical protocol for the solution of a secure multiparty communication task, the secret sharing, and its proof-of-principle experimental realization. In this protocol, a secret is split among several parties in a way that its reconstruction requires the collaboration of the participating parties. In our scheme the parties solve the problem by sequential transformations...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006