Quantum memories at finite temperature
To use quantum systems for technological applications one first needs to preserve their
coherence for macroscopic time scales, even at finite temperature. Quantum error correction …
coherence for macroscopic time scales, even at finite temperature. Quantum error correction …
(t, n) Threshold quantum secret sharing using the phase shift operation
H Qin, X Zhu, Y Dai - Quantum Information Processing, 2015 - Springer
A (t, n) threshold quantum secret sharing scheme is proposed, in which the secret is a
quantum state, and the dealer encodes the secret through the phase shift operation. The …
quantum state, and the dealer encodes the secret through the phase shift operation. The …
Symbolic model checking quantum circuits in maude
This article presents a symbolic approach to model checking quantum circuits using a set of
laws from quantum mechanics and basic matrix operations with Dirac notation. We use …
laws from quantum mechanics and basic matrix operations with Dirac notation. We use …
Quantum teleportation based on non-maximally entangled graph states
Y Ding, Y Wei, Z Li, M Jiang - Quantum Information Processing, 2023 - Springer
In recent years, the development of graph states has opened a bright prospect for the
generation of multipartite entangled states. However, due to the influences of noises in the …
generation of multipartite entangled states. However, due to the influences of noises in the …
Verifiable (t, n) threshold quantum secret sharing using d-dimensional Bell state
H Qin, Y Dai - Information Processing Letters, 2016 - Elsevier
A verifiable (t, n) threshold quantum secret sharing scheme is proposed by using the d-
dimensional Bell state and the Lagrange interpolation. In the proposed scheme, the dealer …
dimensional Bell state and the Lagrange interpolation. In the proposed scheme, the dealer …
Three-party quantum summation without a trusted third party
C Zhang, ZW Sun, X Huang, DY Long - International Journal of …, 2015 - World Scientific
In this paper, we propose a quantum summation protocol, in which the genuinely maximally
entangled six-qubit states found by Borras et al., are employed. Because of the excellent …
entangled six-qubit states found by Borras et al., are employed. Because of the excellent …
Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer
Quantum secret sharing is a way to share secret messages among the clients in a group
with complete security. For the first time, Hillery et al.(Phys Rev A 59: 1829, 1999) proposed …
with complete security. For the first time, Hillery et al.(Phys Rev A 59: 1829, 1999) proposed …
(t, n) Threshold d-Level Quantum Secret Sharing
XL Song, YB Liu, HY Deng, YG **ao - Scientific reports, 2017 - nature.com
Abstract Most of Quantum Secret Sharing (QSS) are (n, n) threshold 2-level schemes, in
which the 2-level secret cannot be reconstructed until all n shares are collected. In this …
which the 2-level secret cannot be reconstructed until all n shares are collected. In this …
Unified approach to secret sharing and symmetric private information retrieval with colluding servers in quantum systems
This paper unifiedly addresses two kinds of key quantum secure tasks, ie, quantum versions
of secret sharing (SS) and symmetric private information retrieval (SPIR) by using multi …
of secret sharing (SS) and symmetric private information retrieval (SPIR) by using multi …
A novel semi-quantum secret sharing scheme based on Bell states
A Yin, Z Wang, F Fu - Modern Physics Letters B, 2017 - World Scientific
A semi-quantum secret sharing (SQSS) scheme based on Bell states is proposed in this
paper. The sender who can perform any relevant quantum operations uses Bell states to …
paper. The sender who can perform any relevant quantum operations uses Bell states to …