Dynamic(2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication  被引量:1

Dynamic(2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication

在线阅读下载全文

作  者:赖红 Orgun A.Mehmet 肖井华 Pieprzyk Josef 薛理银 

机构地区:[1]School of Science Beijing University of Posts and Telecommunications [2]Department of Computing Macquarie University [3]School of Electrical Engineering and Computer Science,Queensland University of Technology [4]Corporate Analytics,The Australian Taxation Office

出  处:《Communications in Theoretical Physics》2015年第4期459-465,共7页理论物理通讯(英文版)

基  金:Supported in part by an International Macquarie University Research Excellence Scholarship(i MQRES),Australian Research Council Grant DP0987734;also supported by the National Basic Research Program of China(973 Program)under Grant No.2010CB923200;the National Natural Science Foundation of China under No.61377067;Fund of State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications,China,National Natural Science Foundation of China under Grant Nos.61202362,61262057,61472433;China Postdoctora Science Foundation under Grant No.2013M542560

摘  要:In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely.

关 键 词:(2 3) threshold quantum state sharing RECURRENCE distributed fountain codes EFFICIENCY Trojan horse attacks 

分 类 号:O413[理学—理论物理] TN918[理学—物理]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象