Security of quantum secret sharing with two-particle entanglement against individual attacks
暂无分享,去创建一个
Fei Gao | Qiaoyan Wen | Su-Juan Qin | Fu-Chen Zhu | S. Qin | F. Zhu | Q. Wen | F. Gao
[1] N. Gisin,et al. OPTIMAL EAVESDROPPING IN QUANTUM CRYPTOGRAPHY. I. INFORMATION BOUND AND OPTIMAL STRATEGY , 1997 .
[2] Yeshaiahu Fainman,et al. Security of quantum cryptography against individual attacks , 1998 .
[3] Jian-Wei Pan,et al. Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.
[4] Fuguo Deng,et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.
[5] Adam D. Smith. Quantum secret sharing for general access structures , 2000 .
[6] Guang-Can Guo,et al. Quantum secret sharing without entanglement , 2002 .
[7] R. Cleve,et al. HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.
[8] Yeshaiahu Fainman,et al. Security of quantum cryptography against individual attacks , 1998, Other Conferences.
[9] Fei Gao,et al. A simple participant attack on the brádler-dušek protocol , 2007, Quantum Inf. Comput..
[10] D. Gottesman. Theory of quantum secret sharing , 1999, quant-ph/9910067.
[11] N. Gisin,et al. Experimental demonstration of quantum secret sharing , 2001 .
[12] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[13] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.
[14] H. Yuen. Quantum detection and estimation theory , 1978, Proceedings of the IEEE.
[15] D. Bruß,et al. Optimal eavesdropping in cryptography with three-dimensional quantum states. , 2001, Physical review letters.
[16] M. Koashi,et al. Quantum entanglement for secret sharing and secret splitting , 1999 .
[17] Adi Shamir,et al. How to share a secret , 1979, CACM.
[18] Pérès,et al. Quantum-state disturbance versus information gain: Uncertainty relations for quantum information. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[19] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[20] Qiaoyan Wen,et al. Improving the security of multiparty quantum secret sharing against an attack with a fake signal , 2006 .
[21] L. Hsu,et al. Quantum secret sharing using product states , 2005 .