Selection of unitary operations in quantum secret sharing without entanglement
- Publication Type:
- Journal Article
- Citation:
- Science China Information Sciences, 2011, 54 (9), pp. 1837 - 1842
- Issue Date:
- 2011-09-01
Closed Access
Filename | Description | Size | |||
---|---|---|---|---|---|
10.1007%2Fs11432-011-4240-9.pdf | Published Version | 178.39 kB |
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
We propose a substitute-Bell-state attack strategy for quantum secret sharing schemes without entanglement, as well as a definition of the minimum failure probability of such attack strategy. A quantitative analysis of security degrees corresponding to different unitary operations is also provided, when the secret sharing schemes without entanglement are stricken by substitute-Bell-state attack. As a result, the relation between the selection of unitary operations and the effect of substitute-Bell-state attack is shown, which can serve as an important guidance for the selection of unitary operations in designing and implementing quantum secret sharing schemes. © 2011 Science China Press and Springer-Verlag Berlin Heidelberg.
Please use this identifier to cite or link to this item: