=. ,

=. ,

=. ,

G. Est, De plus, le sous-graphe induit par A 2 ? A 4 est le double biparti de G (i.e. un graphe biparti constitué de deux copies de G dont les arêtes correspondentàcorrespondentà celles de G), tandis que A 2 ? A 5 est le double biparti de G augmenté d'un couplage. On a bien G ? biparti chacun des A i ´ etant un stable.-Si (G, k) est une instance positive de Degré minimum par complémentation locale il existe un sous ensemble de sommets D ? V (G) tel que D = ? et |D ? Odd G (D)| ? k + 1

D. Donc and ?. Fait-de-(g-?-,-k,

(. Si, est une instance positive de Ensemble pair il existe D ? A 1 ? A 2 ? A 3 tel que |D| ? k ? et Odd G ? (D) = ?

, Degré minimum par complémentation locale appartientà appartientà

, CetétatCetétat de fait contraste avec la classe desprobì emeséquivalentsàemeséquivalentsemeséquivalentsà Ensemble impair qui appartiennent aussì a W [2] mais qui en plus sont difficiles pour W [1] [11], cette classe contenant d'autresprobì emes liés auxétatsauxétats-graphes comme Plus grand ensemble WOD et Seuil quantique, vol.11

, Remerciments Je remercie mes ma??tresma??tres de thèse Pablo Arrighi et Simon Perdrix ainsi que

, Je tiens aussì a remercier Laurent Besacier, Christian Boitet et Rachid Echahed qui m'ont apporté aide et soutien durant ma thèse. Enfin je remercie Spin et Anne-So pour avoir relu ma thèse ainsi que mes parents pour leur soutien, Mehdi Mhalla pour m'avoir guidé tout au long de ma thèse

. Bibliographie,

S. Beigi, I. Chuang, M. Grassl, P. Shor, and B. Zeng, Graph concatenation for quantum codes, Journal of Mathematical Physics, vol.52, issue.2, 2011.
DOI : 10.1063/1.3534799

URL : http://arxiv.org/pdf/0910.4129

S. Beigi, I. Chuang, M. Grassl, P. Shor, and B. Zeng, Graph concatenation for quantum codes, Journal of Mathematical Physics, vol.52, issue.2, p.22201, 2011.
DOI : 10.1063/1.3534799

URL : http://arxiv.org/pdf/0910.4129

C. H. Bennett, Quantum cryptography : Public key distribution and coin tossing, International Conference on Computer System and Signal Processing, pp.175-179, 1984.
DOI : 10.1016/j.tcs.2014.05.025

URL : https://doi.org/10.1016/j.tcs.2014.05.025

G. R. Blakley, Safeguarding cryptographic keys, Proc. of the National Computer Conference1979, vol.48, pp.313-317, 1979.

L. Hans, D. Bodlaender, and . Kratsch, A note on fixed parameter intractability of some domination-related problems

A. Bouchet, Graphic presentations of isotropic systems, Journal of Combinatorial Theory, Series B, vol.45, issue.1, pp.58-76, 1988.
DOI : 10.1016/0095-8956(88)90055-x

URL : https://doi.org/10.1016/0095-8956(88)90055-x

A. Bouchet, Connectivity of isotropic systems, Annals of the New York Academy of Sciences, vol.555, issue.1, pp.81-93, 1989.

, André Bouchet. ?-transformations, local complementations and switching, Cycles and Rays, pp.41-50, 1990.

A. Bouchet, Circle graph obstructions, Journal of Combinatorial Theory, Series B, vol.60, issue.1, pp.107-144, 1994.
DOI : 10.1006/jctb.1994.1008

URL : https://doi.org/10.1006/jctb.1994.1008

A. Broadbent, J. Fitzsimons, and E. Kashefi, Universal blind quantum computation, Foundations of Computer Science, 2009. FOCS'09. 50th Annual IEEE Symposium on, pp.517-526, 2009.
DOI : 10.1109/focs.2009.36

URL : http://arxiv.org/pdf/0807.4154

D. Cattanéo and S. Perdrix, Parameterized complexity of weak odd domination problems, International Symposium on Fundamentals of Computation Theory, pp.107-120, 2013.

D. Cattanéo and S. Perdrix, The parameterized complexity of domination-type problems and application to linear codes, Theory and Applications of Models of Computation-11th Annual Conference, pp.86-103, 2014.

D. Cattanéo and S. Perdrix, Minimum degree up to local complementation : Bounds, parameterized complexity, and exact algorithms, International Symposium on Algorithms and Computation, pp.259-270

. Springer, , 2015.

M. Cesati, Perfect Code is W[1]-complete, Inf. Proc. Let, vol.81, pp.163-168, 2002.

M. Cesati, The Turing way to parameterized complexity, Journal of Computer and System Sciences, vol.67, pp.654-685, 2003.

M. Cesati, Compendium of parameterized problems, vol.22, 2006.

M. Chapelle, Parameterized Complexity of Generalized Domination Problems on Bounded Tree-Width Graphs, 2010.

J. Cheetham, F. Dehne, A. Rau-chaplin, U. Stege, and P. Taillon, Solving large fpt problems on coarse-grained parallel machines, Journal of Computer and System Sciences, vol.67, issue.4, pp.691-706, 2003.

J. Chen, A. Iyad, W. Kanj, and . Jia, Vertex cover : further observations and further improvements, Journal of Algorithms, vol.41, issue.2, pp.280-301, 2001.

R. Cleve, D. Gottesman, and H. Lo, How to share a quantum secret, Physical Review Letters, vol.83, issue.3, p.648, 1999.

J. Cullinan and F. Hajir, Primes of prescribed congruence class in short intervals, Integers, vol.12, p.56, 2012.

F. Hubert-de, Local complementation and interlacement graphs, Discrete Mathematics, vol.33, issue.1, pp.29-35, 1981.

G. Rod, M. Downey, and . Fellows, Fixed-parameter tractability and completeness III : Some structural aspects of the W hierarchy, pp.191-225, 1993.

R. G. Downey and M. R. Fellows, Fixed-Parameter Tractability and Completeness I : Basic Results, SIAM Journal on Computing, vol.24, pp.873-921, 1995.

G. Rod, M. Downey, and . Fellows, Fixed-parameter tractability and completeness ii : On completeness for, Theoretical Computer Science, vol.141, issue.1, pp.109-131, 1995.

G. Rod, . Downey, R. Michael, A. Fellows, G. Vardy et al., The parametrized complexity of some fundamental problems in coding theory, SIAM Journal on Computing, vol.29, issue.2, pp.545-570, 1999.

. Artur-k-ekert, Quantum cryptography based on bell's theorem. Physical review letters, vol.67, p.661, 1991.

M. R. Fellows, Parameterized Complexity : The Main Ideas and Some Research Frontiers, pp.291-307, 2001.

. Michael-r-fellows, Blow-ups, win/win's, and crown rules : Some new directions in fpt, International Workshop on Graph-Theoretic Concepts in Computer Science, pp.1-12, 2003.

R. Michael, M. A. Fellows, and . Langston, Nonconstructive advances in polynomial-time complexity, Information Processing Letters, vol.26, issue.3, pp.157-162, 1987.

. Dg-fon-der-flaass, Local complementations of simple and directed graphs, Discrete analysis and operations research, pp.15-34, 1996.

G. Galbiati, F. Maffioli, and A. Morzenti, A short note on the approximability of the maximum leaves spanning tree problem. Information Processing Letters, vol.52, pp.45-49, 1994.

P. A. Golovach and J. Kratochv, Kratochv`?l, and Ondrej Such`Such`y. Parameterized complexity of generalized domination problems, Discrete Applied Mathematics, vol.160, issue.6, pp.780-792, 2009.

J. Sylvain-gravier, M. Javelle, S. Mhalla, and . Perdrix, Quantum secret sharing with graph states, In International Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, pp.15-31, 2012.

J. Sylvain-gravier, M. Javelle, S. Mhalla, and . Perdrix, On weak odd domination and graph-based quantum secret sharing, Theoretical Computer Science, vol.598, pp.129-137, 2015.

K. Lov and . Grover, Quantum mechanics helps in searching for a needle in a haystack, Physical review letters, vol.79, issue.2, p.325, 1997.

G. Gutin, T. Kloks, A. Chuan-min-lee, and . Yeo, Kernels in planar digraphs, Journal of Computer and System Sciences, vol.71, issue.2, pp.174-184, 2005.

M. Hein, J. Eisert, and H. J. Briegel, Multiparty entanglement in graph states, Phys. Rev. A, vol.69, p.62311, 2004.

M. Hein, J. Eisert, and H. Briegel, Multiparty entanglement in graph states, Physical Review A, vol.69, issue.6, p.62311, 2004.

M. Hillery, V. Bu?ek, and A. Berthiaume, Quantum secret sharing, Physical Review A, vol.59, issue.3, p.1829, 1999.

P. Høyer, M. Mhalla, and S. Perdrix, Resources required for preparing graph states, International Symposium on Algorithms and Computation, pp.638-649, 2006.

J. Javelle, Cryptographie Quantique : Protocoles et Graphes, 2014.
URL : https://hal.archives-ouvertes.fr/tel-01215912

J. Javelle, M. Mhalla, and S. Perdrix, On the Minimum Degree Up to Local Complementation : Bounds and Complexity, pp.138-147
URL : https://hal.archives-ouvertes.fr/hal-00933720

H. Springer-berlin, , 2012.

Z. Ji, J. Chen, Z. Wei, and M. Ying, The lu-lc conjecture is false, 2007.

T. Kloks and L. Cai, Parameterized tractability of some (efficient) ydomination variants for planar graphs and t-degenerate graphs, International Computer Symposium (ICS), 2000.

A. Kotzig, Eulerian lines in finite 4-valent graphs and their transformations, Journal of the ACM (JACM), pp.219-230, 1968.

O. Krueger and . Werner, Some open problems in quantum information theory, 2005.

E. Richard and . Ladner, On the structure of polynomial time reducibility, Journal of the ACM (JACM), vol.22, issue.1, pp.155-171, 1975.

D. Markham, C. Barry, and . Sanders, Graph states for quantum secret sharing, Physical Review A, vol.78, issue.4, p.42309, 2008.

H. Moser and D. M. Thilikos, Parameterized complexity of finding regular induced subgraphs, Journal of Discrete Algorithms, vol.7, pp.181-190, 2009.

H. Moser and D. M. Thilikos, Parameterized complexity of finding regular induced subgraphs, Journal of Discrete Algorithms, vol.7, issue.2, pp.181-190, 2006.

R. Niedermeier, Invitation to fixed-parameter algorithms, 2006.

A. Michael, I. Nielsen, and . Chuang, Quantum computation and quantum information, 2002.

S. Oum, Approximating rank-width and clique-width quickly, ACM Transactions on Algorithms (TALG), vol.5, issue.1, p.10, 2008.

C. Papadimitriou and M. Yannakakis, Optimization, approximation, and complexity classes, Proceedings of the twentieth annual ACM symposium on Theory of computing, pp.229-234, 1988.

M. Plotkin, Binary codes with specified minimum distance, IRE Transactions on Information Theory, vol.6, issue.4, pp.445-450, 1960.

P. Raghavan, Probabilistic construction of deterministic algorithms : approximating packing integer programs, Journal of Computer and System Sciences, vol.37, issue.2, pp.130-143, 1988.

R. Raussendorf, . Hans, and . Briegel, A one-way quantum computer, Physical Review Letters, vol.86, issue.22, p.5188, 2001.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.

W. Peter and . Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM review, vol.41, issue.2, pp.303-332, 1999.

J. A. Telle and A. Proskurowski, Algorithms for Vertex Partitioning Problems on Partial k-Trees, SIAM Journal on Discrete Mathematics, vol.10, pp.529-550, 1997.

J. A. Telle, Complexity of domination-type problems in graphs, Nordic J. of Computing, vol.1, issue.1, pp.157-171, 1994.

, Maarten Van den Nest. Local equivalence of stabilizer states and codes, 2005.

M. Van-den-nest, J. Dehaene, and B. D. Moor, Graphical description of the action of local clifford transformations on graph states, Physical Review A, vol.69, issue.2, p.22316, 2004.

B. Zeng, H. Chung, A. W. Cross, and I. Chuang, Local unitary versus local clifford equivalence of stabilizer and graph states, Physical Review A, vol.75, issue.3, p.32325, 2007.