欢迎登录材料期刊网

材料期刊网

高级检索

提出了利用五个粒子纠缠GHZ态作为量子信道来完成三个粒子纠缠态的隐形传态,从而实现三个量子位的秘密共享方案,并对方案进行安全性分析,该方案充分利用GHZ态五个粒子间的相关性,通过一次Bell基测量和三次单粒子测量,并通过相应的幺正变换即可实现Alice和Charlie之间三个量子位的秘密共享.与相关文献相比,在没有增加粒子数的前提下,提高了量子位的传输,为量子密钥共享传递更多量子位提供了理论基础.

With a five-particle entanglement GHZ state as the quantum channel, a quantum secret sharing scheme is proposed, which put through the three-particle teleportation in order to realize the three-quantum secret sharing. The safety of the scheme is anajyzed. The scheme makes full use of five particles' relation-ship of the GHZ-state. It is found that a Bell-basis measurement, three single particle measurement and corresponding unitary transformation are required. Compared with the pertinent literature, it enhances the quantum transmission without increasing the number of particles, and forms a theoretical basis for transmitting more quanta in quantum secret sharing.

参考文献

[1] Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
[2] Blakely G.Safeguarding cryptographic keys[C].Proceedings of the National Computer Conference,NewYork:AFIPS Press,1979,313-317.
[3] Hillery M,Buzěk V,Berthiaume A.Quantum secret sharing[J].Phys.Rev.A,1999,59:1829-1834.
[4] Karlsson A,Koashi M,Imoto N.Quantum entanglment for secret sharing and secret splitting[J].Phys.Rev.A,1999,59:162-169.
[5] Hsu L Y.Quantum secret-sharing protocol based Grover's algorithm[J].Phys.Rev.A,2003,68:022306.
[6] Karimipour V,Bahraminasab A,Bagherinezhad S.Entanglement swapping of generalized cat states and secrsharing[J].Phys.Rev.A,2002,65:042320.
[7] Bandyopadhyay S.Teleportation and secret sharing with pur entangled states[J].Phys.Rev.A,2000,62:012308.
[8] Guo F Z,Wen Q Y,Zhu F C.Quantum scret sharing based on multi-particle entanglement[J].Journal of China Universities of Posts and Telecommunications,2005,12(1):15219.
[9] Ljuuggren D,Bourennane M,Karlsson A.Authority-based user authentication in quantum key distribution[J].Phys.Rev.A,2000,62:022305.
[10] Zhang Z J,Yong L,Man Z X.Multiparty.quantum secret sharing[J].Phys.Rev.A,2005,71:044301.
[11] Aspect A,Dalibard J,Roger G.Experimental test of Bell's inequalities using time-varying analyzers[J].Phys.Rev.Lett.,1982,49:1804-1806.
[12] Clauser J F,Horne M A,Shimony A,et al.Proposed experiment to test local hidden-variable theories[J].Phys.Rev.Lett.,1969,23:880-884.
[13] Yang W.Study on quantum teleportation and quantum secret sharing[D].Master Thesis of Hunan University,2006 (in Chinese).
[14] Zeng G H.Quantum Cryptography(量子密码学)[M].Beijing:Science Press,2006 (in Chinese).
[15] Liu Y Q.Research and development tend of quantum cryptography[J].Communications Technology(通信技术),2007,40(11):324-326 (in Chinese).
[16] Liu Y Q,Zhang K.Quantum authentication protocols based on entanglement swapping[J].Journal of Huaiyin Teachers College (Naturat Science Edition)(淮阴师范学院学报(自然科学版)),2008,7(1):69-71 (in Chinese).
[17] Liu Y Q,et al.Quantum authentication protocols based on entanglement swapping in distributed network[J].Computer Engineering and Applications(计算机工程与应用),2008,44(32):90-92 (in Chinese).
[18] Shi J,Zhan Y B.Probabilistic remote preparation of a bipartite three-dimensional equatorial entangled state[J].Chinese Journal of Quantum Electronics(量子电子学报),2008,25(3):307-311 (in Chinese).
上一张 下一张
上一张 下一张
计量
  • 下载量()
  • 访问量()
文章评分
  • 您的评分:
  • 1
    0%
  • 2
    0%
  • 3
    0%
  • 4
    0%
  • 5
    0%