Security of a kind of quantum secret sharing with single photons
暂无分享,去创建一个
[1] Barry C. Sanders,et al. Continuous-variable quantum-state sharing via quantum disentanglement , 2004, quant-ph/0411191.
[2] Fuguo Deng,et al. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.
[3] P. Hayden,et al. Possibility, impossibility, and cheat sensitivity of quantum-bit string commitment , 2005, quant-ph/0504078.
[4] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] E. Knill,et al. Resilient Quantum Computation , 1998 .
[6] Qiaoyan Wen,et al. Improving the security of multiparty quantum secret sharing against an attack with a fake signal , 2006 .
[7] Hong-Yu Zhou,et al. Fake-signal-and-cheating attack on quantum secret sharing , 2006 .
[8] Fuguo Deng,et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.
[9] Hideki Imai,et al. Improving quantum secret-sharing schemes , 2001 .
[10] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[11] Deng Fu-Guo,et al. Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)] , 2006 .
[12] Xiu-Bo Chen,et al. An efficient and secure multiparty quantum secret sharing scheme based on single photons , 2008 .
[13] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[14] H. Weinfurter,et al. Experimental demonstration of four-party quantum secret sharing. , 2006, Physical review letters.
[15] Tzonelih Hwang,et al. Comment on 'Quantum secret sharing between multiparty and multiparty without entanglement' , 2006 .
[16] G. Long,et al. Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.
[17] M. Koashi,et al. Quantum entanglement for secret sharing and secret splitting , 1999 .
[18] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[19] Shengyu Zhang,et al. Set discrimination of quantum states , 2002 .
[20] Guang-Can Guo,et al. Quantum secret sharing without entanglement , 2002 .
[21] Qiaoyan Wen,et al. Cryptanalysis and improvement of multiparty quantum secret sharing schemes , 2008 .
[22] M. Bourennane,et al. Experimental quantum secret sharing using telecommunication fiber , 2008 .
[23] Jian-Wei Pan,et al. Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.
[24] Gan Gao,et al. Reexamining the security of the improved quantum secret sharing scheme , 2009 .
[25] Qiaoyan Wen,et al. Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol , 2007, 0801.2418.
[26] V. Karimipour,et al. Entanglement swapping of generalized cat states and secret sharing , 2001, quant-ph/0112050.
[27] Dominic Mayers. Unconditionally secure quantum bit commitment is impossible , 1997 .
[28] Johannes Skaar,et al. Security of quantum key distribution with bit and basis dependent detector flaws , 2008, Quantum Inf. Comput..
[29] R. Cleve,et al. Quantum fingerprinting. , 2001, Physical review letters.
[30] D. Gottesman. Theory of quantum secret sharing , 1999, quant-ph/9910067.
[31] N. Gisin,et al. Experimental demonstration of quantum secret sharing , 2001 .
[32] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[33] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[34] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[35] Fuguo Deng,et al. Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.
[36] Runyao Duan,et al. Entanglement is not necessary for perfect discrimination between unitary operations. , 2007, Physical review letters.
[37] A. Klappenecker,et al. Sharing classical secrets with Calderbank-Shor-Steane codes , 2009 .
[38] Zhan-jun Zhang,et al. Multiparty quantum secret sharing , 2004, quant-ph/0412203.
[39] Fuguo Deng,et al. Improving the security of secure direct communication based on the secret transmitting order of particles , 2006, quant-ph/0612016.
[40] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[41] Fuguo Deng,et al. Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs (4 pages) , 2005, quant-ph/0504158.
[42] W. Bowen,et al. Tripartite quantum state sharing. , 2003, Physical review letters.
[43] Shi-Jinn Horng,et al. Comment on"A special attack on the multiparty quantum secret sharing of secure direct communication using single photons" , 2010 .
[44] S. Bandyopadhyay. Teleportation and secret sharing with pure entangled states , 2000, quant-ph/0002032.
[45] Marco Lucamarini,et al. Secure deterministic communication without entanglement. , 2005, Physical review letters.
[46] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[47] R. Cleve,et al. HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.
[48] E. Knill,et al. A scheme for efficient quantum computation with linear optics , 2001, Nature.
[49] P. Hayden,et al. Security of quantum bit string commitment depends on the information measure. , 2006, Physical review letters.
[50] Sellami Ali,et al. DECOY STATE QUANTUM KEY DISTRIBUTION , 2010 .
[51] Hoi-Kwong Lo,et al. Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.
[52] Adi Shamir,et al. How to share a secret , 1979, CACM.
[53] Fei Gao,et al. Security of quantum secret sharing with two-particle entanglement against individual attacks , 2009, Quantum Inf. Comput..
[54] L. Hsu. Quantum secret-sharing protocol based on Grover's algorithm , 2003 .
[55] Fuguo Deng,et al. Bidirectional quantum key distribution protocol with practical faint laser pulses , 2004 .
[56] V. Karimipour. Reply to 'Comment on 'Quantum secret sharing based on reusable Greenberger-Horne- Zeilinger states as secure carriers'' , 2005 .
[57] A. Acín. Statistical distinguishability between unitary operations. , 2001, Physical review letters.
[58] Yi-Min Liu,et al. Multiparty quantum secret sharing of secure direct communication using single photons , 2008 .
[59] John Preskill,et al. Security of quantum key distribution using weak coherent states with nonrandom phases , 2007, Quantum Inf. Comput..
[60] D. Markham,et al. Graph states for quantum secret sharing , 2008, 0808.1532.
[61] Christian Kurtsiefer,et al. Experimental single qubit quantum secret sharing. , 2005, Physical review letters.
[62] Z. D. Wang,et al. Single qubit quantum secret sharing with improved security , 2007, Quantum Inf. Comput..