2005
DOI: 10.1103/physreva.72.032318
|View full text |Cite
|
Sign up to set email alerts
|

Quantum secret sharing schemes and reversibility of quantum operations

Abstract: Quantum secret sharing schemes encrypting a quantum state into a multipartite entangled state are treated. The lower bound on the dimension of each share given by Gottesman [Phys. Rev. A 61, 042311 (2000)] is revisited based on a relation between the reversibility of quantum operations and the Holevo information. We also propose a threshold ramp quantum secret sharing scheme and evaluate its coding efficiency.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
111
0
1

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 55 publications
(133 citation statements)
references
References 49 publications
0
111
0
1
Order By: Relevance
“…Thus, the overall scheme is a perfect (6,7) QSS scheme, but requiring only three quantum shares. schemes) and satisfies (6). For an initial boundary scheme, then, the optimal underlying QSS scheme will simply have a ( , ) structure.…”
Section: Hybrid Secret Sharingmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the overall scheme is a perfect (6,7) QSS scheme, but requiring only three quantum shares. schemes) and satisfies (6). For an initial boundary scheme, then, the optimal underlying QSS scheme will simply have a ( , ) structure.…”
Section: Hybrid Secret Sharingmentioning
confidence: 99%
“…Proof: An optimal RQSS protocol has share size qubits, (we can always, though not exclusively, construct such protocols [6] for shares of ). For given , we wish to minimize (11) subject to (9) and (8).…”
Section: Hybrid Rqss Schemesmentioning
confidence: 99%
“…Various different QSS schemes have been developed [41], [42], [43], [44], [45], [46]. Among them, a (k, L, n)-threshold ramp QSS scheme is defined as a QSS scheme with n shares having the following property [43]: The original state can be reconstructed from any k shares, and any k − L shares has no information. Hence, partial information of the original state can be drived from t shares with k > t > k − L. The network codes given in the above subsections B and C are strongly related to (k, L, n)-threshold ramp QSS scheme with k = n. Here, the condition k = n means that all the n shares are required to reconstruct the original state.…”
Section: Quantum Threshold Ramp Secret Sharingmentioning
confidence: 99%
“…6. The network that can be derived from the third example by contracting the edge e(4n + 1) and merging vertices vi with 1 ≤ i ≤ n in graph theoretical sense sending n-quantum messages from the input node v 1 to the output node v n+2 , this network coding is nothing but (2n, 2n − 1, 2n) quantum threshold ramp secret sharing scheme [43].…”
Section: Quantum Threshold Ramp Secret Sharingmentioning
confidence: 99%
“…Secret sharing (SS) is an information theoretically secure cryptographic protocol that is applicable to online auctions, electronic voting, shared electronic banking and cooperative activation in the classical domain [1], and distributed quantum computing in the quantum regime [2]. Ramp classical [3,4] and quantum [5,6] SS schemes were proposed to reduce the communication complexity by the sacrifice of security conditions. Continuousvariable quantum secret sharing (CV QSS) [7][8][9] has been formulated in the framework of discrete-variable quantum SS schemes [10], which does not accommodate the quantum-information leakage inherent in continuous representations of quantum information.…”
Section: Introductionmentioning
confidence: 99%