Full metadata record
DC FieldValueLanguage
dc.contributor.authorHsu, LYen_US
dc.contributor.authorLi, CMen_US
dc.date.accessioned2019-04-03T06:39:02Z-
dc.date.available2019-04-03T06:39:02Z-
dc.date.issued2005-02-01en_US
dc.identifier.issn2469-9926en_US
dc.identifier.urihttp://dx.doi.org/10.1103/PhysRevA.71.022321en_US
dc.identifier.urihttp://hdl.handle.net/11536/14016-
dc.description.abstractThis study proposes quantum secret sharing protocols using product states. The first two protocols adopt the quantum key distribution protocol using product states [Guo Phys. Rev. A 64, 042301 (2001)]. In these two protocols, the sender does not reveal any information about the qutrits until confirming that each receiver has received a qutrit. This study also considers the security and some possible eavesdropping strategies. In the third proposed protocol, three-level Bell states are exploited for qutrit preparation via nonlocality swapping.en_US
dc.language.isoen_USen_US
dc.titleQuantum secret sharing using product statesen_US
dc.typeArticleen_US
dc.identifier.doi10.1103/PhysRevA.71.022321en_US
dc.identifier.journalPHYSICAL REVIEW Aen_US
dc.citation.volume71en_US
dc.citation.issue2en_US
dc.citation.spage0en_US
dc.citation.epage0en_US
dc.contributor.department電子物理學系zh_TW
dc.contributor.departmentDepartment of Electrophysicsen_US
dc.identifier.wosnumberWOS:000227483900045en_US
dc.citation.woscount90en_US
Appears in Collections:Articles


Files in This Item:

  1. 9cc4533fdf55b3d2f752461140647c45.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.