On weak odd domination and graph-based quantum secret sharing

A weak odd dominated (WOD) set in a graph is a subset B of vertices for which there exists a distinct set of vertices C such that every vertex in B has an odd number of neighbors in C. We point out the connections of weak odd domination with odd domination, ? , ? -domination, and perfect codes. We introduce bounds on ? ( G ) , the maximum size of WOD sets of a graph G, and on ? ' ( G ) , the minimum size of non-WOD sets of G. Moreover, we prove that the corresponding decision problems are NP-complete.The study of weak odd domination is mainly motivated by the design of graph-based quantum secret sharing protocols: a graph G of order n corresponds to a secret sharing protocol whose threshold is ? Q ( G ) = max ? ( ? ( G ) , n - ? ' ( G ) ) . These graph-based protocols are very promising in terms of physical implementation, however all such graph-based protocols studied in the literature have quasi-unanimity thresholds (i.e. ? Q ( G ) = n - o ( n ) where n is the order of the graph G underlying the protocol). In this paper, we show using probabilistic methods the existence of graphs with smaller ? Q (i.e. ? Q ( G ) ? 0.811 n where n is the order of G). We also prove that deciding for a given graph G whether ? Q ( G ) ? k is NP-complete, which means that one cannot efficiently double check that a graph randomly generated has actually a ? Q smaller than 0.811n.

[1]  Zhi Ma,et al.  A finite Gilbert-Varshamov bound for pure stabilizer quantum codes , 2004, IEEE Transactions on Information Theory.

[2]  Peter J. Slater,et al.  Parity dimension for graphs , 1998, Discret. Math..

[3]  E. Kashefi,et al.  Determinism in the one-way model , 2005, quant-ph/0506062.

[4]  Mehdi Mhalla,et al.  Classical versus Quantum Graph-based Secret Sharing , 2011, 1109.4731.

[5]  D. Gottesman Theory of quantum secret sharing , 1999, quant-ph/9910067.

[6]  Mehdi Mhalla,et al.  New Protocols and Lower Bounds for Quantum Secret Sharing with Graph States , 2011, TQC.

[7]  R Raussendorf,et al.  A one-way quantum computer. , 2001, Physical review letters.

[8]  Damian Markham,et al.  Information Flow in Secret Sharing Protocols , 2009, DCM.

[9]  Jan Kratochvíl,et al.  Mod-2 Independence and Domination in Graphs , 2000, Int. J. Found. Comput. Sci..

[10]  Salman Beigi,et al.  Graph concatenation for quantum codes , 2009, 0910.4129.

[11]  Jan Kratochvíl,et al.  Mod-2 Independence and Domination in Graphs , 1999, WG.

[12]  P. Sarvepalli Nonthreshold quantum secret-sharing schemes in the graph-state formalism , 2012, 1202.3433.

[13]  S. Klavžar,et al.  1-perfect codes in Sierpiński graphs , 2002, Bulletin of the Australian Mathematical Society.

[14]  Gábor Tardos,et al.  A constructive proof of the general lovász local lemma , 2009, JACM.

[15]  Wolfgang Dür,et al.  Universal resources for measurement-based quantum computation. , 2006, Physical review letters.

[16]  Klaus Sutner,et al.  Linear cellular automata and the garden-of-eden , 1989 .

[17]  Dirk Schlingemann,et al.  Quantum error-correcting codes associated with graphs , 2000, ArXiv.

[18]  Sunil Arya,et al.  Space-time tradeoffs for approximate nearest neighbor searching , 2009, JACM.

[19]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[20]  A. Zeilinger,et al.  Experimental one-way quantum computing , 2005, Nature.

[21]  P. Erdos-L Lovász Problems and Results on 3-chromatic Hypergraphs and Some Related Questions , 2022 .

[22]  Mehdi Mhalla,et al.  Finding Optimal Flows Efficiently , 2007, ICALP.

[23]  Barry C. Sanders,et al.  Erratum: Graph states for quantum secret sharing [Phys. Rev. A 78, 042309 (2008)] , 2011 .

[24]  R. Prevedel,et al.  High-speed linear optics quantum computing using active feed-forward , 2007, Nature.

[25]  E. Kashefi,et al.  Generalized flow and determinism in measurement-based quantum computation , 2007, quant-ph/0702212.

[26]  Giuliano Benenti,et al.  Quantum Computers, Algorithms and Chaos , 2006 .

[27]  D. Markham,et al.  Quantum secret sharing with qudit graph states , 2010, 1004.4619.

[28]  Mehdi Mhalla,et al.  Which Graph States are Useful for Quantum Information Processing? , 2010, TQC.

[29]  Jan Arne Telle,et al.  Complexity of Domination-Type Problems in Graphs , 1994, Nord. J. Comput..

[30]  Klaus Sutner,et al.  The σ-game and cellular automata , 1990 .

[31]  J. Eisert,et al.  Entanglement in Graph States and its Applications , 2006, quant-ph/0602096.

[32]  D. Markham,et al.  Graph states for quantum secret sharing , 2008, 0808.1532.