File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: How to share a quantum secret

TitleHow to share a quantum secret
Authors
Issue Date1998
Citation
HP Laboratories Technical Report, 1998, n. HPL-98-205, p. 1-11 How to Cite?
AbstractWe investigate the concept of quantum secret sharing, where a secret quantum state is distributed between n parties in such a way that certain subsets of the parties can jointly recover the secret, while other subsets of the parties can acquire absolutely no information about it. In a ((k, n)) threshold scheme, any subset of k or more parties can reconstruct the secret, while any subset of k-1 or fewer parties can obtain no information. We show that the only constraint on the existence of threshold schemes comes from the quantum `no-cloning theorem', which requires that n<2k, and, in all such cases, we give an efficient construction of a ((k, n)) threshold scheme. We also explore similarities and differences between quantum secret sharing schemes and quantum error-correcting codes. One remarkable difference is that, while most existing quantum codes encode pure states as pure states, quantum secret sharing schemes must use mixed states in some cases. For example, if k≤n<2k-1 then any ((k, n)) threshold scheme must distribute information that is globally in a mixed state.
Persistent Identifierhttp://hdl.handle.net/10722/285563

 

DC FieldValueLanguage
dc.contributor.authorCleve, Richard-
dc.contributor.authorGottesman, Daniel-
dc.contributor.authorLo, Hoi Kwong-
dc.date.accessioned2020-08-18T04:56:04Z-
dc.date.available2020-08-18T04:56:04Z-
dc.date.issued1998-
dc.identifier.citationHP Laboratories Technical Report, 1998, n. HPL-98-205, p. 1-11-
dc.identifier.urihttp://hdl.handle.net/10722/285563-
dc.description.abstractWe investigate the concept of quantum secret sharing, where a secret quantum state is distributed between n parties in such a way that certain subsets of the parties can jointly recover the secret, while other subsets of the parties can acquire absolutely no information about it. In a ((k, n)) threshold scheme, any subset of k or more parties can reconstruct the secret, while any subset of k-1 or fewer parties can obtain no information. We show that the only constraint on the existence of threshold schemes comes from the quantum `no-cloning theorem', which requires that n<2k, and, in all such cases, we give an efficient construction of a ((k, n)) threshold scheme. We also explore similarities and differences between quantum secret sharing schemes and quantum error-correcting codes. One remarkable difference is that, while most existing quantum codes encode pure states as pure states, quantum secret sharing schemes must use mixed states in some cases. For example, if k≤n<2k-1 then any ((k, n)) threshold scheme must distribute information that is globally in a mixed state.-
dc.languageeng-
dc.relation.ispartofHP Laboratories Technical Report-
dc.titleHow to share a quantum secret-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-0032268057-
dc.identifier.issueHPL-98-205-
dc.identifier.spage1-
dc.identifier.epage11-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats