Abstract | ||
---|---|---|
Two quantum information splitting protocols are proposed, that one is based on Bell states and another is based on cluster states. Two protocols provide two different ways to complete the process of quantum information splitting. The measurement results of Alice represent the secret information in the first protocol which is n,n protocol. The secret information is encoded into Pauli operations in the second protocol which is 2,﾿2 protocol. The original secret information is recovered when all participants are honest cooperation according to the principle of quantum information splitting. Two protocols take full advantages of the entanglement properties of Bell states and cluster states in different basis to check eavesdropping, that are secure against the intercept and resend attack and entangled ancilla particles attack. We also analyse the efficiency of these two protocols. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/978-3-662-49017-4_10 | Trans. Computational Collective Intelligence |
Keywords | Field | DocType |
Quantum information splitting, Bell states, Cluster states, Intercept and resend attack, Entangled ancilla particles attack, Efficiency analysis | Eavesdropping,Quantum entanglement,Computer science,Bell state,Theoretical computer science,Cluster state,Quantum teleportation,Quantum information,No-communication theorem,Pauli exclusion principle | Journal |
Volume | ISSN | Citations |
19 | 0302-9743 | 0 |
PageRank | References | Authors |
0.34 | 6 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xiaoqing Tan | 1 | 2 | 1.83 |
Peipei Li | 2 | 2 | 4.42 |
Xiaoqian Zhang | 3 | 7 | 4.55 |
Zhihong Feng | 4 | 0 | 0.34 |