80
Views
3
CrossRef citations to date
0
Altmetric
Articles

A quantum secret sharing scheme on access structure

, &
Pages 186-191 | Received 13 Aug 2014, Accepted 17 Jan 2015, Published online: 17 Sep 2015

References

  • Dehkordi, M. H., and E. Fattahi. 2013. “Threshold Quantum Secret Sharing between Multiparty and Multiparty Using Greenberger–Horne–Zeilinger State.” Quantum Information Processing 12 (2): 1299–1306. doi:10.1007/s11128-012-0471-y.
  • Han, L.-F., Y.-M. Liu, J. Liu, and Z.-J. Zhang. 2008. “Multiparty Quantum Secret Sharing of Secure Direct Communication Using Single Photons.” Optics Communications 281 (9): 2690–2694. doi:10.1016/j.optcom.2007.12.045.
  • Hillery, M., V. Buzek, and A. Berthiaume. 1999. “Quantum Secret Sharing.” Physical Review A59: 1829–1834. doi:10.1103/PhysRevA.59.1829.
  • Hsu, J.-L., S.-K. Chong, T. Hwang, and C.-W. Tsai. 2013. “Dynamic Quantum Secret Sharing.” Quantum Information Processing 12 (1): 331–344. doi:10.1007/s11128-012-0380-0.
  • Ito, M., A. Saito, and T. Nishizeki. 1987. “Secret Sharing Schemes Realizing General Access Structure.” In Proceedings of IEEE Global Telecommunication Conference, Tokyo, November 1987: 99–102. New York: IEEE.
  • Li, Q., D.-Y. Long, W.-H. Chan, and D.-W. Qiu. 2011. “Sharing a Quantum Secret without a Trusted Party.” Quantum Information Processing 10 (1): 97–106. doi:10.1007/s11128-010-0180-3.
  • Sarvepalli, P. K., and A. Klappenecker. 2009. “Sharing Classical Secrets with Calderbank-Shor-Steane Codes.” Physical Review A80: 022321. doi:10.1103/PhysRevA.80.022321.
  • Shamir, A. 1979. “How to Share a Secret.” Communications of the ACM 22 (11): 612–613. doi:10.1145/359168.359176.
  • Shi, R.-H., G.-L. Lv, Y. Wang, D.-Z. Huang, and Y. Guo. 2013. “On Quantum Secret Sharing via Chinese Remainder Theorem with the Non-maximally Entanglement State Analysis.” International Journal of Theoretical Physics 52 (2): 539–548. doi:10.1007/s10773-012-1358-5.
  • Sun, Y., S.-W. Xu, X.-B. Chen, X.-X. Niu, and Y.-X. Yang. 2013. “Expansible Quantum Secret Sharing Network.” Quantum Information Processing 12 (8): 2877–2888. doi:10.1007/s11128-013-0570-4.
  • Yang, Y.-G., X. Jia, H.-Y. Wang, and H. Zhang. 2012. “Verifiable Quantum (k, n)-Threshold Secret Sharing.” Quantum Information Processing 11 (6): 1619–1625. doi:10.1007/s11128-011-0323-1.
  • Yang, W., L.-S. Huang, R.-H. Shi, and L.-B. He. 2013. “Secret Sharing Based on Quantum Fourier Transform.” Quantum Information Processing 12 (7): 2465–2474. doi:10.1007/s11128-013-0534-8.
  • Yang, Y.-G., Y.-W. Teng, H.-P. Chai, and Q.-Y. Wen. 2011. “Verifiable Quantum (k, n)-Threshold Secret Key Sharing.” International Journal of Theoretical Physics 50 (3): 792–798. doi:10.1007/s10773-010-0616-7.
  • Yang, Y.-G., Y. Wang, H.-P. Chai, Y.-W. Teng, and H. Zhang. 2011. “Member Expansion in Quantum (t, n) Threshold Secret Sharing Schemes.” Optics Communications 284 (13): 3479–3482. doi:10.1016/j.optcom.2011.03.017.
  • Zhang, Z.-J., Y. Li, and Z.-X. Man. 2005. “Multiparty Quantum Secret Sharing.” Physical Review A71: 044301. doi:10.1103/PhysRevA.71.044301.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.