ترغب بنشر مسار تعليمي؟ اضغط هنا

Reply to: Comment on (t, n) Threshold d-level Quantum Secret Sharing

74   0   0.0 ( 0 )
 نشر من قبل Chuang Li
 تاريخ النشر 2021
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

A corresponding comment, raised by Kao and Hwang, claims that the reconstructor Bob1 is unable to obtain the expected secret information in (t, n) Threshold d-level Quantum Secret Sharing (TDQSS)[Scientific Reports, Vol. 7, No. 1 (2017), pp.6366] . In this reply, we show the TDQSS scheme can obtain the dealers secret information in the condition of adding a step on disentanglement.



قيم البحث

اقرأ أيضاً

We develop a three-party quantum secret sharing protocol based on arbitrary dimensional quantum states. In contrast to the previous quantum secret sharing protocols, the sender can always control the state, just using local operations, for adjusting the correlation of measurement directions of three parties and thus there is no waste of resource due to the discord between the directions. Moreover, our protocol contains the hidden value which enables the sender to leak no information of secret key to the dishonest receiver until the last steps of the procedure.
In this Reply we propose a modified security proof of the Quantum Dense Key Distribution protocol detecting also the eavesdropping attack proposed by Wojcik in his Comment.
In their Comment, Borasoy et al. [arXiv:hep-ph/0512279], criticize our results [PRL 95 (2005) 172502] that accommodate both scattering data and the new accurate measurement by DEAR of the shift and width of kaonic hydrogen. In our calculations we hav e employed unitary chiral perturbation theory (UCHPT). We discuss why their arguments are irrelevant or do not hold.
408 - Guang Ping He , Z. D. Wang , 2008
It was indicated [Yu 2007 Phys. Rev. A 75 066301] that a previous proposed quantum secret sharing (QSS) protocol based on Smolin states [Augusiak 2006 Phys. Rev. A 73 012318] is insecure against an internal cheater. Here we build a different QSS prot ocol with Smolin states alone, and prove it to be secure against known cheating strategies. Thus we open a promising venue for building secure QSS using merely Smolin states, which is a typical kind of bound entangled states. We also propose a feasible scheme to implement the protocol experimentally.
We stand by our findings in Phys. Rev A. 96, 022126 (2017). In addition to refuting the invalid objections raised by Peleg and Vaidman, we report a retrocausation problem inherent in Vaidmans definition of the past of a quantum particle.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا