• Acta Photonica Sinica
  • Vol. 41, Issue 9, 1113 (2012)
YE Tianyu* and JIANG Lizhen
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3788/gzxb20124109.1113 Cite this Article
    YE Tianyu, JIANG Lizhen. False Alarm Probability of Eavesdropping Checks for Controllable Quantum Secret Sharing[J]. Acta Photonica Sinica, 2012, 41(9): 1113 Copy Citation Text show less
    References

    [1] BENNETT C H, BRASSARD G. Quantum cryptography: publickey distribution and coin tossing[C]. Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, 1984, 11: 175179.

    [2] LONG G L, LIU X S. Theoretically efficient highcapacity quantumkeydistribution scheme[J].Physical Review A, 2002, 65: 032302.

    [3] HILLERY M, BUZEK V, BERTHIAUME A. Quantum secret sharing[J]. Physical Review A, 1999, 59(3): 18291834.

    [4] SUN Ying, QIN Sujuan, WEN Qiaoyan, et al. Controllable quantum secret sharing using GHZ states[J]. The Journal of Beijing University of Posts and Telecommunications, 2008, 31(1): 913.

    [5] HSU L Y. Quantum secretsharing protocol based on Grover′s algorithm[J].Physical Review A, 2003, 68: 022306.

    [6] HAO L, LI J L, LONG G L. Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution[J]. Science China: Physics, Mechanics & Astronomy, 2010, 53(3): 491495.

    [7] HAO L, WANG C, LONG G L. Quantum secret sharing protocol with four state Grover algorithm and its proofofprinciple experimental demonstration[J].Optics Communications, 2011, 284(14): 36393642.

    [8] KARLSSON A, KOASHI M, IMOTO N. Quantum entanglement for secret sharing and secret splitting[J]. Physical Review A, 1999, 59: 162.

    [9] DENG F G, LI X H, ZHOU H Y, et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack[J]. Physical Review A, 2005, 72: 044302.

    [10] BEIGE A, ENGLERT B G, KURTSIEFER C,et al. Secure communication with a publicly known key[J].Acta Physica Polonica A, 2002, 101: 357.

    [11] DENG F G, LONG G L, LIU X S. Twostep quantum direct communication protocol using the EinsteinPodolskyRosen pair block[J]. Physical Review A, 2003, 68: 042317.

    [12] ZHAN Youbang, ZHANG Lingling, ZHANG Qunyong. Quantum secure direct communication by entangled qutrits and entanglement swapping[J].Optics Communications, 2009, 282(23): 46334636.

    [13] QIN Sujuan, GAO Fei, WEN Qiaoyan, et al. Improving the quantum secure direct communication by entangled qutrits and entanglement swapping against interceptandresend attack[J]. Optics Communications, 2010, 283(7): 15661568.

    CLP Journals

    [1] NIE Yi-you, XU Wei, ZHANG Qin-nan, LI Yuan-hua, SANG Ming-huang. Controlled Quantum Secure Direct Communication by Using Five-particle Cluster States[J]. Acta Photonica Sinica, 2014, 43(1): 127001

    [2] NIE Yi-you, XU Wei, ZHANG Qin-nan, LI Yuan-hua, SANG Ming-huang. Controlled Quantum Secure Direct Communication by Using Five-particle Cluster States[J]. Acta Photonica Sinica, 2014, 43(1): 127001

    YE Tianyu, JIANG Lizhen. False Alarm Probability of Eavesdropping Checks for Controllable Quantum Secret Sharing[J]. Acta Photonica Sinica, 2012, 41(9): 1113
    Download Citation