International Journal of Theoretical Physics

, Volume 55, Issue 9, pp 3807–3815 | Cite as

Quantum Ramp Secret Sharing Scheme and Quantum Operations

Article
  • 138 Downloads

Abstract

In order to improve the efficiency of quantum secret sharing, quantum ramp secret sharing schemes were proposed (Ogawa et al., Phys. Rev. A 72, 032318 [2005]), which had a trade-off between security and coding efficiency. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an intermediate set, which cannot fully reconstruct the secret. This paper revisits the size of a share in the quantum ramp secret scheme based on a relation between the quantum operations and the coherent information. We also propose an optimal quantum ramp secret sharing scheme.

Keywords

Quantum secret sharing Ramp secret sharing Coherent information 

Notes

Acknowledgments

his work was supported by Postdoctoral Science Foundation of China under grant No.2015M582686 and No.2015M580805.

References

  1. Shamir, A.: Commun. ACM. 22, 612–613 (1979).MathSciNetCrossRefGoogle Scholar
  2. Hillery, M., Buzek, V., Berthiaume, A.: Phys. Rev. A. 59 (3), 1829–1834 (1999).ADSMathSciNetCrossRefGoogle Scholar
  3. Stinson, A. D.: Cryptography Theory and Practice, 3rd edn. Chapman&Hall/CRC, 2006.Google Scholar
  4. Ogawa, T., Sasaki, A., Iwamoto, M., Yamamoto, H.: Phys. Rev. A. 72, 032318 (2005).ADSCrossRefGoogle Scholar
  5. Zhang, P., Matsumoto, R.: Q. Inf. Process. 14 (2), 715–729 (2015).MathSciNetCrossRefGoogle Scholar
  6. Schumacher, B., Nielsen, M. A.: Quantum data processing and error correction. Phys. Rev. A. 54, 2629–2635 (1996).ADSMathSciNetCrossRefGoogle Scholar
  7. Holevo, A. S., Shirokov, M. E.: Problems Inf. Trans. 46 (3), 201–218 (2010).CrossRefGoogle Scholar
  8. Westmoreland, M., Schumacher, B.: Lect. Notes Comput. Sci. 1509, 285–295 (1998).MathSciNetCrossRefGoogle Scholar
  9. Araki, H., Lieb, E.: Commun. Math. Phys. 18, 160–170 (1970).ADSMathSciNetCrossRefGoogle Scholar
  10. Nielsen, M. A., Caves, C. M., Schumacher, B., Barnum, H.: Proc. R. Soc. London Series Mat. Phys. Eng. Sci. 454, 277–304 (1998).ADSMathSciNetCrossRefGoogle Scholar
  11. Lloyd, S.: Phys. Rev. A. 55, 1613–1622 (1997).ADSMathSciNetCrossRefGoogle Scholar
  12. Grishanin, B. A., Zadkov, V. N.: Phys. Rev. A. 62, 032303 (2000).ADSMathSciNetCrossRefGoogle Scholar
  13. Horodecki, M., Oppenheim, J., Winter, A.: Nature. 436 (7051), 673–676 (2005).ADSCrossRefGoogle Scholar
  14. Rietjens, K., Schoenmakers, B., Tuyls, P.: Int. Symp. Information Theory, pp. 1598–1602. Adelaide, Australia, 2005.Google Scholar
  15. Ahlswede, R., Lober, P.: IEEE Trans. Inf. Theory. 47(1), 474–478 (2001).MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.School of Electronic & Control EngineeringChang’an UniversityXi’anChina
  2. 2.Communication and Information Engineering CollegeXi’an University of Science and TechnologyXi’anChina

Personalised recommendations