File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: How to share a quantum secret
Title | How to share a quantum secret |
---|---|
Authors | |
Issue Date | 1998 |
Citation | HP Laboratories Technical Report, 1998, n. HPL-98-205, p. 1-11 How to Cite? |
Abstract | We investigate the concept of quantum secret sharing, where a secret quantum state is distributed between n parties in such a way that certain subsets of the parties can jointly recover the secret, while other subsets of the parties can acquire absolutely no information about it. In a ((k, n)) threshold scheme, any subset of k or more parties can reconstruct the secret, while any subset of k-1 or fewer parties can obtain no information. We show that the only constraint on the existence of threshold schemes comes from the quantum `no-cloning theorem', which requires that n<2k, and, in all such cases, we give an efficient construction of a ((k, n)) threshold scheme. We also explore similarities and differences between quantum secret sharing schemes and quantum error-correcting codes. One remarkable difference is that, while most existing quantum codes encode pure states as pure states, quantum secret sharing schemes must use mixed states in some cases. For example, if k≤n<2k-1 then any ((k, n)) threshold scheme must distribute information that is globally in a mixed state. |
Persistent Identifier | http://hdl.handle.net/10722/285563 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cleve, Richard | - |
dc.contributor.author | Gottesman, Daniel | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.date.accessioned | 2020-08-18T04:56:04Z | - |
dc.date.available | 2020-08-18T04:56:04Z | - |
dc.date.issued | 1998 | - |
dc.identifier.citation | HP Laboratories Technical Report, 1998, n. HPL-98-205, p. 1-11 | - |
dc.identifier.uri | http://hdl.handle.net/10722/285563 | - |
dc.description.abstract | We investigate the concept of quantum secret sharing, where a secret quantum state is distributed between n parties in such a way that certain subsets of the parties can jointly recover the secret, while other subsets of the parties can acquire absolutely no information about it. In a ((k, n)) threshold scheme, any subset of k or more parties can reconstruct the secret, while any subset of k-1 or fewer parties can obtain no information. We show that the only constraint on the existence of threshold schemes comes from the quantum `no-cloning theorem', which requires that n<2k, and, in all such cases, we give an efficient construction of a ((k, n)) threshold scheme. We also explore similarities and differences between quantum secret sharing schemes and quantum error-correcting codes. One remarkable difference is that, while most existing quantum codes encode pure states as pure states, quantum secret sharing schemes must use mixed states in some cases. For example, if k≤n<2k-1 then any ((k, n)) threshold scheme must distribute information that is globally in a mixed state. | - |
dc.language | eng | - |
dc.relation.ispartof | HP Laboratories Technical Report | - |
dc.title | How to share a quantum secret | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-0032268057 | - |
dc.identifier.issue | HPL-98-205 | - |
dc.identifier.spage | 1 | - |
dc.identifier.epage | 11 | - |