Splitting information securely with entanglement
From MaRDI portal
Recommendations
- Splitting a quantum secret without the assistance of entanglements
- On the information-splitting essence of two types of quantum key distribution protocols
- Schemes for splitting quantum information via tripartite entangled states
- THRESHOLD MULTIPARTY QUANTUM-INFORMATION SPLITTING VIA QUANTUM CHANNEL ENCRYPTION
- Quantum information splitting by using asymmetric multi-particle state
- Non-threshold quantum information splitting scheme
- Multiparty quantum secret splitting and quantum state sharing
- Improving the security of multiparty quantum secret splitting and quantum state sharing
- QUANTUM INFORMATION SPLITTING OF TWO-QUBIT STATE WITH MINIMAL CLASSICAL COMMUNICATION AND MEASUREMENT COMPLEXITY
- Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps
Cites work
- scientific article; zbMATH DE number 1579275 (Why is no real title available?)
- scientific article; zbMATH DE number 1256737 (Why is no real title available?)
- scientific article; zbMATH DE number 1393316 (Why is no real title available?)
- A proof of the security of quantum key distribution (extended abstract)
- Mixed-state entanglement and quantum error correction
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography: public key distribution and coin tossing
- Quantum entanglement and communication complexity
- Quantum secret sharing
- Unconditional security in quantum cryptography
Cited in
(5)- Quantum information cannot be split into complementary parts
- BASIC OPERATIONS AMONG ENTANGLED STATES AND THEIR APPLICATIONS TO QUANTUM PROTOCOLS
- Splitting a quantum secret without the assistance of entanglements
- Quantum protocols for untrusted computations
- Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps
This page was built for publication: Splitting information securely with entanglement
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1887141)