2013
DOI: 10.1103/physreva.88.042313
|View full text |Cite
|
Sign up to set email alerts
|

Quantum secret sharing with continuous-variable cluster states

Abstract: We extend the formalism of cluster state quantum secret sharing, as presented in Markham and Sanders [Phys. Rev. A 78, 042309 (2008)] and Keet et al. [Phy. Rev. A 82, 062315 (2010)], to the continuous-variable regime. We show that both classical and quantum information can be shared by distributing continuous-variable cluster states through either public or private channels. We find that the adversary structure is completely denied from the secret if the cluster state is infinitely squeezed, but some secret in… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
37
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
9
1

Relationship

2
8

Authors

Journals

citations
Cited by 72 publications
(39 citation statements)
references
References 46 publications
0
37
0
Order By: Relevance
“…However, it is hard to map the quantum state to n quantum states in coding. Later, some other threshold schemes are proposed with different physical characteristics, such as those in [25][26][27] benefit from continuous variable and in [28][29][30] construct from the ability of exactly distinguishing orthogonal multipartite entangled states under restricted local operation and classical communication. Some schemes [31][32][33][34][35] take advantage of the classical (t, n)-SS, which using phase shift operation to embed the secret and shares generated from classical (t, n)-SS into processed quantum state, so after sequential operations, participants can collaborate to recover secret.…”
Section: Comparisons and Discussionmentioning
confidence: 99%
“…However, it is hard to map the quantum state to n quantum states in coding. Later, some other threshold schemes are proposed with different physical characteristics, such as those in [25][26][27] benefit from continuous variable and in [28][29][30] construct from the ability of exactly distinguishing orthogonal multipartite entangled states under restricted local operation and classical communication. Some schemes [31][32][33][34][35] take advantage of the classical (t, n)-SS, which using phase shift operation to embed the secret and shares generated from classical (t, n)-SS into processed quantum state, so after sequential operations, participants can collaborate to recover secret.…”
Section: Comparisons and Discussionmentioning
confidence: 99%
“…This allows additional hacking strategies and makes the security analysis of a QSS protocol more demanding than that of QKD. The application of continuous variable (CV) QKD techniques to analyze CV-QSS security was first proposed in [14]. More recently, the security proof of CV-QSS against both eavesdroppers in the channels and dishonest players appeared [15].…”
Section: Introductionmentioning
confidence: 99%
“…The experimental advantages brought on by CV quantum architectures have resulted in an extensive use of CVs in recent years. For instance, the extension of the discrete formalism of cluster state protocols to the continuous formalism [16] provided the advantage of the deterministic production of multipartite entangled states, and measurement of high fidelity, using present technology [17]. The physical realization of CV cluster-state quantum computing has led to proof-of-principle experimental demonstrations such as a fully tunable gate for continuous-variable one-way quantum computation [18], a dynamical squeezing gate for universal quantum information processing [19], and large entangled states for scalable quantum information and quantum computing [20].…”
Section: Introductionmentioning
confidence: 99%