scispace - formally typeset
Search or ask a question
Author

Han Lian-Fang

Bio: Han Lian-Fang is an academic researcher from Anhui University. The author has contributed to research in topics: Secret sharing & Bell state. The author has an hindex of 4, co-authored 4 publications receiving 70 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: A tripartite scheme for securely sharing an arbitrary unknown two-qutrit state is proposed, where two generalized Greenberger–Horne–Zeilinger (GHZ) states serve as the quantum channel linking the three legitimate parties.
Abstract: A tripartite scheme for securely sharing an arbitrary unknown two-qutrit state is proposed, where two generalized Greenberger–Horne–Zeilinger (GHZ) states serve as the quantum channel linking the three legitimate parties. The quantum information (i.e., the arbitrary unknown two-qutrit state) from the sender can be split in such a way that it can be reconstructed deterministically by any agent via a proper unitary operation provided that both agents collaborates together. Moreover, the generalization of the tripartite scheme to more-party case is also outlined.

29 citations

Journal ArticleDOI
TL;DR: The continuous variable operations are employed in the extended scheme to replace the specific discrete unitary operations used in the original scheme to ensure the security of secret sharing.
Abstract: The one-to-multiparty quantum secret sharing scheme [Phys. Rev. A 71 (2005) 044301] proposed recently is extended to a multiparty-to-multiparty case. Furthermore, the continuous variable operations are employed in the extended scheme to replace the specific discrete unitary operations used in the original scheme. The complete randomicity of the continuous variable characterizing the unitary operations can ensure the security of secret sharing. Moreover, the present scheme is compared with the recent similar scheme [Phys. Rev. A 72 (2005) 012304]. It is found that the efficiency of the present scheme is n times of that of the previous one.

27 citations

Journal ArticleDOI
TL;DR: A probabilistic teleportation scheme for atomic state via cavity QED [Phys. Rev. A 70 (2004) 054303] is revisited and accordingly some improvements are made.
Abstract: A probabilistic teleportation scheme for atomic state via cavity QED [Phys. Rev. A 70 (2004) 054303] is revisited and accordingly some improvements are made.

9 citations

Journal ArticleDOI
TL;DR: An experimental feasible scheme of multiparty secret sharing of classical messages is proposed, based on a cavity quantum electrodynamic system, which is insensitive to the cavity decay and the thermal field, and usual joint Bell-state measurements are unnecessary.
Abstract: An experimental feasible scheme of multiparty secret sharing of classical messages is proposed, based on a cavity quantum electrodynamic system. The secret messages are imposed at atomic Bell states initially in the sender's possession by local unitary operations. By swapping quantum entanglement of atomic Bell states, the secret messages are split into several parts and each part is distributed to a separate party. In this case, any subset of the entire party group can not read out the secret message but the entirety via mutual cooperations. In this scheme, to discriminate atomic Bell states. This scheme is insensitive to the cavity decay and the thermal field, and usual joint Bell-state measurements are unnecessary.

6 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this paper, a bidirectional quantum controlled teleportation scheme using a seven-qubit maximally entangled state as quantum channel is proposed, where Alice can transmit an arbitrary single qubit state of qubit a to Bob and Bob can transmit a single qubits to Alice via the control of the supervisor Charlie.
Abstract: A bidirectional quantum controlled teleportation scheme using a seven-qubit maximally entangled state as quantum channel is proposed. This means that Alice can transmit an arbitrary single qubit state of qubit a to Bob and Bob can transmit an arbitrary single qubit state of qubit b to Alice via the control of the supervisor Charlie.

100 citations

Journal ArticleDOI
TL;DR: A quantum protocol for the solution of a two-party comparison task with the help of a semi-honest third party, which can be used to solve the millionaire problem.

79 citations

Journal ArticleDOI
TL;DR: A controlled quantum secure direct communication and authentication protocol is proposed with a quantum one-time pad based on five-particle cluster state that detects eavesdropping detection and identity authentication by previously shared reusable base identity-strings.
Abstract: A controlled quantum secure direct communication and authentication protocol is proposed with a quantum one-time pad based on five-particle cluster state. Photon 4 in each five-particle cluster state is sent to the controller as permission. Unitary operation I (U) on photon 4 according to identity-string of the receiver is used to forbid the controller to deduce secret message. The classical XOR operation serving as a one-time-pad is used to forbid external eavesdroppers to eavesdrop. Eavesdropping detection and identity authentication are implemented by previously shared reusable base identity-strings. In one transmission, one qubit of each five-particle cluster state is used as controller’s permission, and two qubits are used to transmit two classical bit information.

74 citations

Journal ArticleDOI
TL;DR: The protocol in this study sends photons once in one transmission and defends most attacks including ‘man-in-the-middle’ attack and quantum teleportation attack efficiently.
Abstract: A quantum secure direct communication and authentication protocol is proposed by using single photons. An information transmission is completed by sending photons once in quantum channel, which improves the efficiency without losing the security. The protocol encodes identity-string of the receiver as single photons sequence, which acts as detection sequence and implements authentication. Before secret message is encoded as single photons sequence, it is encrypted with identity-string of the sender by using XOR operation, which defends quantum teleportation attack efficiently. The base identity-strings of the sender and the receiver are reused unconditionally secure even in noisy channel. Compared with the protocol proposed by Wang et al. (Phys Lett A, 2006, 358: 256–258), the protocol in this study sends photons once in one transmission and defends most attacks including ‘man-in-the-middle’ attack and quantum teleportation attack efficiently.

73 citations

Journal ArticleDOI
TL;DR: In the proposed DQSS protocol, an agent can obtain a shadow of the secret key by simply performing a measurement on single photons by using the measurement property of Greenberger–Horne–Zeilinger state and the controlled-NOT gate.
Abstract: This work proposes a new dynamic quantum secret sharing (DQSS) protocol using the measurement property of Greenberger---Horne---Zeilinger state and the controlled-NOT gate. In the proposed DQSS protocol, an agent can obtain a shadow of the secret key by simply performing a measurement on single photons. In comparison with the existing DQSS protocols, it provides better qubit efficiency and has an easy way to add a new agent. The proposed protocol is also free from the eavesdropping attack, the collusion attack, and can have an honesty check on a revoked agent.

66 citations