Selection of unitary operations in quantum secret sharing without entanglement

Publication Type:
Journal Article
Citation:
Science China Information Sciences, 2011, 54 (9), pp. 1837 - 1842
Issue Date:
2011-09-01
Metrics:
Full metadata record
Files in This Item:
Filename Description Size
10.1007%2Fs11432-011-4240-9.pdfPublished Version178.39 kB
Adobe PDF
We propose a substitute-Bell-state attack strategy for quantum secret sharing schemes without entanglement, as well as a definition of the minimum failure probability of such attack strategy. A quantitative analysis of security degrees corresponding to different unitary operations is also provided, when the secret sharing schemes without entanglement are stricken by substitute-Bell-state attack. As a result, the relation between the selection of unitary operations and the effect of substitute-Bell-state attack is shown, which can serve as an important guidance for the selection of unitary operations in designing and implementing quantum secret sharing schemes. © 2011 Science China Press and Springer-Verlag Berlin Heidelberg.
Please use this identifier to cite or link to this item: