Entity

Time filter

Source Type

Hefei, China

He L.-B.,NHPCC | Huang L.-S.,Suzhou Institute for Advanced Study | Yang W.,Suzhou Institute for Advanced Study | Xu R.,Suzhou Institute for Advanced Study | Han D.-Q.,Suzhou Institute for Advanced Study
Quantum Information Processing | Year: 2012

We investigate the quantum sealed-bid auction protocol proposed by Zhao et al. (Opt Commun 283:1394, 2010). It uses M groups n-particle GHZ states to represent bids and a post-confirmation mechanism to guarantee the honesty of the quantum sealed-bid auction. However, in our opinion the protocol still does not complete the task of a sealed-bid auction fairly. It is shown that a large group of dishonest bidders can collude to obtain all the other one's secret bids before the opening phase of the auction with a probability polynomially close to one. Moreover, a simple feasible improvement of the protocol is proposed. © Springer Science+Business Media, LLC 2011. Source


Shi R.-h.,NHPCC | Shi R.-h.,Anhui Science and Technology University | Huang L.-s.,NHPCC | Huang L.-s.,Suzhou Institute for Advanced Study | And 3 more authors.
Optics Communications | Year: 2010

We present a multiparty quantum secret sharing scheme and analyze its security. In this scheme, the sender Alice takes EPR pairs in Bell states as quantum resources. In order to obtain the shared key, all participants only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is not necessary except for the eavesdropping checks. © 2010 Elsevier B.V. All rights reserved. Source


Shi R.-H.,NHPCC | Shi R.-H.,Anhui Science and Technology University | Huang L.-S.,NHPCC | Huang L.-S.,Suzhou Institute for Advanced Study | And 3 more authors.
Optics Communications | Year: 2010

We present an efficient scheme for sharing an arbitrary two-qubit quantum state with n agents. In this scheme, the sender Alice first prepares an n+2-particle GHZ state and introduces a Controlled-Not (CNOT) gate operation. Then, she utilizes the n+2-particle entangled state as the quantum resource. After setting up the quantum channel, she performs one Bell-state measurement and another single-particle measurement, rather than two Bell-state measurements. In addition, except that the designated recover of the quantum secret just keeps two particles, almost all agents only hold one particle in their hands respectively, and thus they only need to perform a single-particle measurement on the respective particle with the basis X. Compared with other schemes based on entanglement swapping, our scheme needs less qubits as the quantum resources and exchanges less classical information, and thus obtains higher communication efficiency. © 2010 Elsevier B.V. All rights reserved. Source


Shi R.-H.,NHPCC | Shi R.-H.,Anhui Science and Technology University | Huang L.-S.,NHPCC | Huang L.-S.,Suzhou Institute for Advanced Study | And 3 more authors.
Quantum Information Processing | Year: 2011

We present a newscheme for sharing an arbitrary two-qubit quantum state with n agents our scheme, the sender Alice first shares n Einsein-Podolsky-Rosen (EPR) pairs in Bell states with n agents. After setting up the secure quantum channel, Alice first applies (n ?2) Controlled-Not (CNOT) gate operations, and then performs two Bell-state measurements and (n ? 2) single-particle measurements (n <2) addition, all controllers only hold one particle in their hands, respectively, and thus they only need to perform a single-particle measurement on the respective particle with the basis {|0}, |1}}. Compared with other schemes with Bell states, our scheme needs less qubits as the quantum resources and exchanges less classical information, and thus obtains higher total efficiency. © Springer Science+Business Media, LLC 2010. Source


Shi R.H.,NHPCC | Shi R.H.,Anhui Science and Technology University | Huang L.S.,NHPCC | Huang L.S.,Suzhou Institute for Advanced Study | And 3 more authors.
European Physical Journal D | Year: 2010

We present an asymmetric scheme for five-party quantum state sharing of an arbitrary m-qubit state with the maximally entangled states of two-particle and three-particle. It involves two-particle Bell-basis or three-particle GHZ-basis measurements, rather than five-particle entanglements and five-particle joint measurements, which makes it more convenient in a practical application than some previous schemes. In addition, except that the designated recover of the quantum secret just keeps m particles, other agents only hold one particle in their hands respectively, and thus they only need perform a single-particle measurement on the respective particle with the basis X. Its intrinsic efficiency for qubits approaches 100%, and the total efficiency really approaches the maximal value. © 2010 EDP Sciences, SIF, Springer-Verlag Berlin Heidelberg. Source

Discover hidden collaborations