Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hsu, LY | en_US |
dc.contributor.author | Li, CM | en_US |
dc.date.accessioned | 2019-04-03T06:39:02Z | - |
dc.date.available | 2019-04-03T06:39:02Z | - |
dc.date.issued | 2005-02-01 | en_US |
dc.identifier.issn | 2469-9926 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1103/PhysRevA.71.022321 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/14016 | - |
dc.description.abstract | This study proposes quantum secret sharing protocols using product states. The first two protocols adopt the quantum key distribution protocol using product states [Guo Phys. Rev. A 64, 042301 (2001)]. In these two protocols, the sender does not reveal any information about the qutrits until confirming that each receiver has received a qutrit. This study also considers the security and some possible eavesdropping strategies. In the third proposed protocol, three-level Bell states are exploited for qutrit preparation via nonlocality swapping. | en_US |
dc.language.iso | en_US | en_US |
dc.title | Quantum secret sharing using product states | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1103/PhysRevA.71.022321 | en_US |
dc.identifier.journal | PHYSICAL REVIEW A | en_US |
dc.citation.volume | 71 | en_US |
dc.citation.issue | 2 | en_US |
dc.citation.spage | 0 | en_US |
dc.citation.epage | 0 | en_US |
dc.contributor.department | 電子物理學系 | zh_TW |
dc.contributor.department | Department of Electrophysics | en_US |
dc.identifier.wosnumber | WOS:000227483900045 | en_US |
dc.citation.woscount | 90 | en_US |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.