2022
DOI: 10.1007/s10773-022-05178-8
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Information Splitting of an Arbitrary Five-Qubit State Using Four-Qubit Entangled States

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…After Bennett et al, various theoretical schemes for QT using different types of entangled states have been reported [3][4][5][6][7][8][9] and QT has been experimentally verified [10][11][12][13][14][15]. The standard QT which enables quantum communication between the sender and the receiver nodes can be made more secure by introducing some additional intermediate quantum nodes [40][41][42][43][44][45][46][47][48][49][50][51][52][53][54][55][56]. In quantum information processing, it is essential to ensure the security of quantum information so that it cannot be stolen and interrupted by an eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…After Bennett et al, various theoretical schemes for QT using different types of entangled states have been reported [3][4][5][6][7][8][9] and QT has been experimentally verified [10][11][12][13][14][15]. The standard QT which enables quantum communication between the sender and the receiver nodes can be made more secure by introducing some additional intermediate quantum nodes [40][41][42][43][44][45][46][47][48][49][50][51][52][53][54][55][56]. In quantum information processing, it is essential to ensure the security of quantum information so that it cannot be stolen and interrupted by an eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…In quantum information processing, it is essential to ensure the security of quantum information so that it cannot be stolen and interrupted by an eavesdropper. For ensuring the security of information, two methods namely quantum information splitting [40][41][42][43][44][45][46][47][48][49][50][51][52][53][54][55][56] and quantum information masking [57][58][59][60][61] are used. In quantum information splitting (QIS), the sender splits the quantum information among the various legitimate participants (recipients) and then it can be retrieved by any one recipient with the help of the remaining recipients.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This ABQT scheme has also become an area of interest for researchers [23][24][25]. In addition, there are various types of quantum teleportation, including quantum information splitting [26,27], cyclic quantum teleportation [28][29][30], and probabilistic quantum teleportation [31][32][33]. On the other hand, RSP differs from the principles of quantum teleportation.…”
Section: Introductionmentioning
confidence: 99%
“…QTP was first proposed by Bennett and Brassard [14] in 1993 and later experimentally verified by Anton Zeilinger and others in 1997. Since then, QTP has attracted the attention of many researchers and has produced many theoretical and experimental advances and variations in the past thirty years [15][16][17][18]. In 1998, Karlsson and Bourennane [19] pioneered the idea of controlled quantum teleportation (CQTP).…”
Section: Introductionmentioning
confidence: 99%