提出了利用五个粒子纠缠GHZ态作为量子信道来完成三个粒子纠缠态的隐形传态,从而实现三个量子位的秘密共享方案,并对方案进行安全性分析,该方案充分利用GHZ态五个粒子间的相关性,通过一次Bell基测量和三次单粒子测量,并通过相应的幺正变换即可实现Alice和Charlie之间三个量子位的秘密共享.与相关文献相比,在没有增加粒子数的前提下,提高了量子位的传输,为量子密钥共享传递更多量子位提供了理论基础.
With a five-particle entanglement GHZ state as the quantum channel, a quantum secret sharing scheme is proposed, which put through the three-particle teleportation in order to realize the three-quantum secret sharing. The safety of the scheme is anajyzed. The scheme makes full use of five particles' relation-ship of the GHZ-state. It is found that a Bell-basis measurement, three single particle measurement and corresponding unitary transformation are required. Compared with the pertinent literature, it enhances the quantum transmission without increasing the number of particles, and forms a theoretical basis for transmitting more quanta in quantum secret sharing.
参考文献
[1] | Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613. |
[2] | Blakely G.Safeguarding cryptographic keys[C].Proceedings of the National Computer Conference,NewYork:AFIPS Press,1979,313-317. |
[3] | Hillery M,Buzěk V,Berthiaume A.Quantum secret sharing[J].Phys.Rev.A,1999,59:1829-1834. |
[4] | Karlsson A,Koashi M,Imoto N.Quantum entanglment for secret sharing and secret splitting[J].Phys.Rev.A,1999,59:162-169. |
[5] | Hsu L Y.Quantum secret-sharing protocol based Grover's algorithm[J].Phys.Rev.A,2003,68:022306. |
[6] | Karimipour V,Bahraminasab A,Bagherinezhad S.Entanglement swapping of generalized cat states and secrsharing[J].Phys.Rev.A,2002,65:042320. |
[7] | Bandyopadhyay S.Teleportation and secret sharing with pur entangled states[J].Phys.Rev.A,2000,62:012308. |
[8] | Guo F Z,Wen Q Y,Zhu F C.Quantum scret sharing based on multi-particle entanglement[J].Journal of China Universities of Posts and Telecommunications,2005,12(1):15219. |
[9] | Ljuuggren D,Bourennane M,Karlsson A.Authority-based user authentication in quantum key distribution[J].Phys.Rev.A,2000,62:022305. |
[10] | Zhang Z J,Yong L,Man Z X.Multiparty.quantum secret sharing[J].Phys.Rev.A,2005,71:044301. |
[11] | Aspect A,Dalibard J,Roger G.Experimental test of Bell's inequalities using time-varying analyzers[J].Phys.Rev.Lett.,1982,49:1804-1806. |
[12] | Clauser J F,Horne M A,Shimony A,et al.Proposed experiment to test local hidden-variable theories[J].Phys.Rev.Lett.,1969,23:880-884. |
[13] | Yang W.Study on quantum teleportation and quantum secret sharing[D].Master Thesis of Hunan University,2006 (in Chinese). |
[14] | Zeng G H.Quantum Cryptography(量子密码学)[M].Beijing:Science Press,2006 (in Chinese). |
[15] | Liu Y Q.Research and development tend of quantum cryptography[J].Communications Technology(通信技术),2007,40(11):324-326 (in Chinese). |
[16] | Liu Y Q,Zhang K.Quantum authentication protocols based on entanglement swapping[J].Journal of Huaiyin Teachers College (Naturat Science Edition)(淮阴师范学院学报(自然科学版)),2008,7(1):69-71 (in Chinese). |
[17] | Liu Y Q,et al.Quantum authentication protocols based on entanglement swapping in distributed network[J].Computer Engineering and Applications(计算机工程与应用),2008,44(32):90-92 (in Chinese). |
[18] | Shi J,Zhan Y B.Probabilistic remote preparation of a bipartite three-dimensional equatorial entangled state[J].Chinese Journal of Quantum Electronics(量子电子学报),2008,25(3):307-311 (in Chinese). |
- 下载量()
- 访问量()
- 您的评分:
-
10%
-
20%
-
30%
-
40%
-
50%