Information Flow in Secret Sharing Protocols
The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC), error correction and secret sharing amongst others. In addition they are at the...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Open Publishing Association
2009-11-01
|
Series: | Electronic Proceedings in Theoretical Computer Science |
Online Access: | http://arxiv.org/pdf/0909.4479v2 |
id |
doaj-f8a680173979473fb17ee03b7a1fc55c |
---|---|
record_format |
Article |
spelling |
doaj-f8a680173979473fb17ee03b7a1fc55c2020-11-24T21:14:37ZengOpen Publishing AssociationElectronic Proceedings in Theoretical Computer Science2075-21802009-11-019Proc. DCM 2009879710.4204/EPTCS.9.10Information Flow in Secret Sharing ProtocolsElham KashefiDamian MarkhamMehdi MhallaSimon PerdrixThe entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC), error correction and secret sharing amongst others. In addition they are at the forefront in terms of implementations. As such they represent an excellent opportunity to move towards integrated protocols involving many of these elements. In this paper we look at expressing and extending graph state secret sharing and MBQC in a common framework and graphical language related to flow. We do so with two main contributions. First we express in entirely graphical terms which set of players can access which information in graph state secret sharing protocols. These succinct graphical descriptions of access allow us to take known results from graph theory to make statements on the generalisation of the previous schemes to present new secret sharing protocols. Second, we give a set of necessary conditions as to when a graph with flow, i.e. capable of performing a class of unitary operations, can be extended to include vertices which can be ignored, pointless measurements, and hence considered as unauthorised players in terms of secret sharing, or error qubits in terms of fault tolerance. This offers a way to extend existing MBQC patterns to secret sharing protocols. Our characterisation of pointless measurements is believed also to be a useful tool for further integrated measurement based schemes, for example in constructing fault tolerant MBQC schemes. http://arxiv.org/pdf/0909.4479v2 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Elham Kashefi Damian Markham Mehdi Mhalla Simon Perdrix |
spellingShingle |
Elham Kashefi Damian Markham Mehdi Mhalla Simon Perdrix Information Flow in Secret Sharing Protocols Electronic Proceedings in Theoretical Computer Science |
author_facet |
Elham Kashefi Damian Markham Mehdi Mhalla Simon Perdrix |
author_sort |
Elham Kashefi |
title |
Information Flow in Secret Sharing Protocols |
title_short |
Information Flow in Secret Sharing Protocols |
title_full |
Information Flow in Secret Sharing Protocols |
title_fullStr |
Information Flow in Secret Sharing Protocols |
title_full_unstemmed |
Information Flow in Secret Sharing Protocols |
title_sort |
information flow in secret sharing protocols |
publisher |
Open Publishing Association |
series |
Electronic Proceedings in Theoretical Computer Science |
issn |
2075-2180 |
publishDate |
2009-11-01 |
description |
The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC), error correction and secret sharing amongst others. In addition they are at the forefront in terms of implementations. As such they represent an excellent opportunity to move towards integrated protocols involving many of these elements. In this paper we look at expressing and extending graph state secret sharing and MBQC in a common framework and graphical language related to flow. We do so with two main contributions. First we express in entirely graphical terms which set of players can access which information in graph state secret sharing protocols. These succinct graphical descriptions of access allow us to take known results from graph theory to make statements on the generalisation of the previous schemes to present new secret sharing protocols. Second, we give a set of necessary conditions as to when a graph with flow, i.e. capable of performing a class of unitary operations, can be extended to include vertices which can be ignored, pointless measurements, and hence considered as unauthorised players in terms of secret sharing, or error qubits in terms of fault tolerance. This offers a way to extend existing MBQC patterns to secret sharing protocols. Our characterisation of pointless measurements is believed also to be a useful tool for further integrated measurement based schemes, for example in constructing fault tolerant MBQC schemes. |
url |
http://arxiv.org/pdf/0909.4479v2 |
work_keys_str_mv |
AT elhamkashefi informationflowinsecretsharingprotocols AT damianmarkham informationflowinsecretsharingprotocols AT mehdimhalla informationflowinsecretsharingprotocols AT simonperdrix informationflowinsecretsharingprotocols |
_version_ |
1716746491700183040 |