The need for secrecy and security is essential in communication. Secret sharing is a conventional protocol to distribute a secret message to a group of parties, who cannot access it individually but need to cooperate in order to decode it. While several variants of this protocol have been investigated, including realizations using quantum systems, the security of quantum secret sharing schemes still remains unproven almost two decades after their original conception. Here we establish an unconditional security proof for entanglement-based continuous-variable quantum secret sharing schemes, in the limit of asymptotic keys and for an arbitrary number of players. We tackle the problem by resorting to the recently developed one-sided device-ind...
International audienceWe consider a protocol for sharing quantum states using continuous variable sy...
We discuss a quantum key distribution scheme in which small phase and amplitude modulations of cw li...
<p>Cryptographic protocols are the backbone of our information society. This includes two-party prot...
The need for secrecy and security is essential in communication. Secret sharing is a conventional pr...
The need for secrecy and security is essential in communication. Secret sharing is a conventional pr...
The need for secrecy and security is essential in communication. Secret sharing is a conventional pr...
The ability to distribute secret keys between two parties with information-theoretic security, that ...
The ability to distribute secret keys between two parties with information-theoretic security, that ...
International audienceThe ability to distribute secret keys between two parties with information-the...
We discuss quantum key distribution protocols using quantum continuous variables. We show that such ...
ii Quantum secret sharing concerns secure and reliable distribution of classical or quantum informat...
In this paper, the perfect secret sharing in quantum cryptography is investigated. On one hand, the ...
We propose a quantum secret sharing protocol between multi-party ($m$ members in Group 1) and multi-...
International audience<p>In this work we address the issue of sharing a quantum secret over untruste...
International audienceWe consider a protocol for sharing quantum states using continuous variable sy...
International audienceWe consider a protocol for sharing quantum states using continuous variable sy...
We discuss a quantum key distribution scheme in which small phase and amplitude modulations of cw li...
<p>Cryptographic protocols are the backbone of our information society. This includes two-party prot...
The need for secrecy and security is essential in communication. Secret sharing is a conventional pr...
The need for secrecy and security is essential in communication. Secret sharing is a conventional pr...
The need for secrecy and security is essential in communication. Secret sharing is a conventional pr...
The ability to distribute secret keys between two parties with information-theoretic security, that ...
The ability to distribute secret keys between two parties with information-theoretic security, that ...
International audienceThe ability to distribute secret keys between two parties with information-the...
We discuss quantum key distribution protocols using quantum continuous variables. We show that such ...
ii Quantum secret sharing concerns secure and reliable distribution of classical or quantum informat...
In this paper, the perfect secret sharing in quantum cryptography is investigated. On one hand, the ...
We propose a quantum secret sharing protocol between multi-party ($m$ members in Group 1) and multi-...
International audience<p>In this work we address the issue of sharing a quantum secret over untruste...
International audienceWe consider a protocol for sharing quantum states using continuous variable sy...
International audienceWe consider a protocol for sharing quantum states using continuous variable sy...
We discuss a quantum key distribution scheme in which small phase and amplitude modulations of cw li...
<p>Cryptographic protocols are the backbone of our information society. This includes two-party prot...