Quantum secret sharing between multiparty and multiparty with entanglement swapping

来源 :中国邮电高校学报(英文版) | 被引量 : 0次 | 上传用户:zhanghongyingyxl
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
A quantum secret sharing (QSS) protocol between multiparty and multiparty is proposed, based on Greenberger-Horne- Zeilinger (GHZ) state. The protocol utilizes quantum Fourier transform and entanglement swapping to achieve a high intrinsic efficiency and source capacity. Then, the security of this protocol against some possible eavesdropping strategies has been analyzed. Furthermore, the presented protocol is generalized to the d-level case.
其他文献
This study focuses on experiments of Au and Cu dissolved in vapor phase in hydrothernmlfluids. Experiments prove that Au and Cu can re-distribute in vapor phase
To investigate the invasive ability of the residual tumor cells after immunotherapy and explore the feasible approach suppressing the invasion, mice were inocul
Configuration information acquisition and matching are two important steps in the self-reconfiguring process of self-reconfigurable robots. The process of confi
The paper presents a multi-scale modelling approach for simulating macromolecules in fluid flows. Macromolecule transport at low number densities is frequently
Due to their low cost,flexibility,and convenience for long distance data transfer,plastic scintillation fibers (PSF) have been increasingly used in building det
The rate of elapsed polymerization of polyhydroxyethylacrylate in gelatin has been studied to investigate the effect of co-monomers consumption at a given dose.
Digital power supply controller is one of the key parts of SSRF high resolution high stability magnet power supply system.It is very essential to keep any degra
Titanium carbide coatings are widely used as various wear-resistant material.The hydrogen erosion resistance of TiC-C films and the effect of hydrogen participa
An efficient algorithm for facial features extractions is proposed. The facial features we segment are the two eyes, nose and mouth. The algorithm is based on a