Unified criterion for security of secret sharing in terms of violation of Bell inequality

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

7 pages, no figures, RevTeX4

Scientific paper

10.1103/PhysRevA.68.032309

In secret sharing protocols, a secret is to be distributed among several partners so that leaving out any number of them, the rest do not have the complete information. Strong multiqubit correlations in the state by which secret sharing is carried out, had been proposed as a criterion for security of such protocols against individual attacks by an eavesdropper. However we show that states with weak multiqubit correlations can also be used for secure secret sharing. That our state has weak multiqubit correlations, is shown from the perspective of violation of local realism, and also by showing that its higher order correlations are described by lower ones. We then present a unified criterion for security of secret sharing in terms of violation of local realism, which works when the secret sharing state is the Greenberger-Horne-Zeilinger state (with strong multiqubit correlations), as well as states of a different class (with weak multiqubit correlations).

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Unified criterion for security of secret sharing in terms of violation of Bell inequality does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Unified criterion for security of secret sharing in terms of violation of Bell inequality, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Unified criterion for security of secret sharing in terms of violation of Bell inequality will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-483254

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.