Threshold quantum cryptograph based on Grover's algorithm
From MaRDI portal
Publication:601476
DOI10.1016/J.PHYSLETA.2006.11.024zbMATH Open1197.81104arXivquant-ph/0606136OpenAlexW2089220483MaRDI QIDQ601476FDOQ601476
Authors: Jian-Zhong Du, Su-Juan Qin, Qiaoyan Wen, Fuchen Zhu
Publication date: 28 October 2010
Published in: Physics Letters. A (Search for Journal in Brave)
Abstract: Grover's operator in the two-qubit case can transform a basis into its conjugated basis. A permutation operator can transform a state in the two conjugated bases into its orthogonal state. These properties are included in a threshold quantum protocol. The proposed threshold quantum protocol is secure based the proof that the legitimate participators can only eavesdrop 2 bits of 3 bits operation information on one two-qubit with error probability 3/8. We propose a scheme to detect the Trojan horse attack without destroying the legal qubit.
Full work available at URL: https://arxiv.org/abs/quant-ph/0606136
Recommendations
- scientific article; zbMATH DE number 2112484
- Threshold secret sharing scheme based on quantum circuit
- Controlled deterministic secure quantum communication based on quantum search algorithm
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
- Two quantum direct communication protocols based on quantum search algorithm
Cites Work
Cited In (3)
This page was built for publication: Threshold quantum cryptograph based on Grover's algorithm
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q601476)