Skip to main content
Top
Published in: Quantum Information Processing 2/2020

01-02-2020

Efficient quantum secret sharing without a trusted player

Authors: Kartick Sutradhar, Hari Om

Published in: Quantum Information Processing | Issue 2/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Quantum secret sharing (QSS) is a fundamental primitive in quantum cryptography. The complex and secure multiparty quantum protocols can be built using QSS. The existing QSS protocols are either (nn) threshold 2-level or (tn) threshold d-level with a trusted player, where n denotes the number of players and t denotes the threshold number of players. Here, we propose a secure d-level QSS protocol for sharing a secret, where t players can reconstruct the secret without a trusted player. This protocol is more secure, flexible, and practical as compared to the existing QSS protocols: (nn) threshold 2-level and (tn) threshold d-level with a trusted player. Further, it does not disclose any information about the secret to players. Its security analysis shows that the intercept-resend, intercept, entangle-measure, forgery, collision and collusion attacks are not possible in this protocol.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Bao-Kui, L., Yu-Guang, Y., Qiao-Yan, W.: Threshold quantum secret sharing of secure direct communication. Chin. Phys. Lett. 26, 010302 (2009)CrossRef Bao-Kui, L., Yu-Guang, Y., Qiao-Yan, W.: Threshold quantum secret sharing of secure direct communication. Chin. Phys. Lett. 26, 010302 (2009)CrossRef
3.
go back to reference Yang, W., Huang, L., Shi, R., He, L.: Secret sharing based on quantum Fourier transform. Quantum Inf. Process. 12, 2465–2474 (2013)ADSMathSciNetCrossRef Yang, W., Huang, L., Shi, R., He, L.: Secret sharing based on quantum Fourier transform. Quantum Inf. Process. 12, 2465–2474 (2013)ADSMathSciNetCrossRef
4.
go back to reference Chen, X.-B., Sun, Y.-R., Xu, G., Yang, Y.-X.: Quantum homomorphic encryption scheme with flexible number of evaluator based on (\(k, n\))-threshold quantum state sharing. Inf. Sci. 501(10), 172–181 (2019)MathSciNetCrossRef Chen, X.-B., Sun, Y.-R., Xu, G., Yang, Y.-X.: Quantum homomorphic encryption scheme with flexible number of evaluator based on (\(k, n\))-threshold quantum state sharing. Inf. Sci. 501(10), 172–181 (2019)MathSciNetCrossRef
5.
go back to reference Changbin, L., Fuyou, M., Junpeng, H., Keju, M.: Verifiable threshold quantum secret sharing with sequential communication. Quant. Inf. Process. 17(11), 310 (2018)MathSciNetCrossRef Changbin, L., Fuyou, M., Junpeng, H., Keju, M.: Verifiable threshold quantum secret sharing with sequential communication. Quant. Inf. Process. 17(11), 310 (2018)MathSciNetCrossRef
6.
go back to reference Hoi-Kwan, L., Christian, W.: Quantum secret sharing with continuous-variable cluster states. Phys. Rev. A. 88(4), 042313 (2013)CrossRef Hoi-Kwan, L., Christian, W.: Quantum secret sharing with continuous-variable cluster states. Phys. Rev. A. 88(4), 042313 (2013)CrossRef
7.
go back to reference Hao, C., Ma, W.: (\(t, n\)) Threshold quantum state sharing scheme based on linear equations and unitary operation. IEEE Photon. J. 9(1), 1–7 (2017)CrossRef Hao, C., Ma, W.: (\(t, n\)) Threshold quantum state sharing scheme based on linear equations and unitary operation. IEEE Photon. J. 9(1), 1–7 (2017)CrossRef
8.
9.
go back to reference Gang, X., Ke, X., Zongpeng, L., Xin-Xin, R.: Controlled secure direct communication protocol via the three-qubit partially entangled set of states. CMC-Comput. Mater. Con. 58, 809–827 (2019) Gang, X., Ke, X., Zongpeng, L., Xin-Xin, R.: Controlled secure direct communication protocol via the three-qubit partially entangled set of states. CMC-Comput. Mater. Con. 58, 809–827 (2019)
10.
go back to reference Xiu-Bo, C., Ya-Lan, W., Gang, X., Yi-Xian, Y.: Quantum network communication with a novel discrete-time quantum walk. IEEE Access 7, 13634–13642 (2019)CrossRef Xiu-Bo, C., Ya-Lan, W., Gang, X., Yi-Xian, Y.: Quantum network communication with a novel discrete-time quantum walk. IEEE Access 7, 13634–13642 (2019)CrossRef
11.
go back to reference Gang, X., Xiu-Bo, C., Zhao, D., Jing, L., Xin, L., Zongpeng, L.: Novel criteria for deterministic remote state preparation via the entangled six-qubit state. Entropy 18, 267 (2016)MathSciNetCrossRef Gang, X., Xiu-Bo, C., Zhao, D., Jing, L., Xin, L., Zongpeng, L.: Novel criteria for deterministic remote state preparation via the entangled six-qubit state. Entropy 18, 267 (2016)MathSciNetCrossRef
12.
go back to reference Nielsen, M.A., Chuang, I., Grover, L.K.: Quantum computation and quantum information. Am. J. Phys. 70, 558 (2002)ADSCrossRef Nielsen, M.A., Chuang, I., Grover, L.K.: Quantum computation and quantum information. Am. J. Phys. 70, 558 (2002)ADSCrossRef
13.
go back to reference Qin, H., Zhu, X., Dai, Y.: (t, n) Threshold quantum secret sharing using the phase shift operation. Quantum Inf. Process. 14, 2997–3004 (2015)ADSMathSciNetCrossRef Qin, H., Zhu, X., Dai, Y.: (t, n) Threshold quantum secret sharing using the phase shift operation. Quantum Inf. Process. 14, 2997–3004 (2015)ADSMathSciNetCrossRef
14.
go back to reference Song, X., Liu, Y., Deng, H., Xiao, Y.: (t, n) Threshold d-level quantum secret sharing. Sci. Rep. 7, 6366 (2017)ADSCrossRef Song, X., Liu, Y., Deng, H., Xiao, Y.: (t, n) Threshold d-level quantum secret sharing. Sci. Rep. 7, 6366 (2017)ADSCrossRef
15.
go back to reference Eastlake, D., Jones, P.: US Secure hash Algorithm 1 (SHA1). (2001) Eastlake, D., Jones, P.: US Secure hash Algorithm 1 (SHA1). (2001)
16.
go back to reference Kao, S.-H., Hwang, T.: Comment on (t,n) threshold d-level quantum secret sharing. (2018) Kao, S.-H., Hwang, T.: Comment on (t,n) threshold d-level quantum secret sharing. (2018)
17.
go back to reference Qin, H., Tso, R., Dai, Y.: Multi-dimensional quantum state sharing based on quantum Fourier transform. Quntum Inf. Process. 17, 48 (2018)ADSMathSciNetCrossRef Qin, H., Tso, R., Dai, Y.: Multi-dimensional quantum state sharing based on quantum Fourier transform. Quntum Inf. Process. 17, 48 (2018)ADSMathSciNetCrossRef
19.
go back to reference Weinstein, Y.S., Pravia, M.A., Fortunato, E.M., Lloyd, S., Cory, D.G.: Implementation of the quantum fourier transform. Phys. Rev. Lett. 86(9), 1889–1891 (2001)ADSCrossRef Weinstein, Y.S., Pravia, M.A., Fortunato, E.M., Lloyd, S., Cory, D.G.: Implementation of the quantum fourier transform. Phys. Rev. Lett. 86(9), 1889–1891 (2001)ADSCrossRef
21.
go back to reference Bennett, C., Brassard, G.: An update on quantum cryptography. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 475-480 (1984) Bennett, C., Brassard, G.: An update on quantum cryptography. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 475-480 (1984)
22.
go back to reference Cai, X.-Q., Wang, T.-Y., Wei, C.-Y., Gao, F.: Cryptanalysis of multiparty quantum digital signatures. Quant. Inf. Process. 18, 252 (2019)ADSMathSciNetCrossRef Cai, X.-Q., Wang, T.-Y., Wei, C.-Y., Gao, F.: Cryptanalysis of multiparty quantum digital signatures. Quant. Inf. Process. 18, 252 (2019)ADSMathSciNetCrossRef
23.
go back to reference Song, T.-T., Zhang, J., Gao, F., Wen, Q.-Y., Zhu, F.-C.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18(4), 1333–1337 (2009)ADSCrossRef Song, T.-T., Zhang, J., Gao, F., Wen, Q.-Y., Zhu, F.-C.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18(4), 1333–1337 (2009)ADSCrossRef
24.
go back to reference Wang, T.-Y., Wen, Q.-Y., Gao, F., Lin, S., Zhu, F.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)ADSCrossRef Wang, T.-Y., Wen, Q.-Y., Gao, F., Lin, S., Zhu, F.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)ADSCrossRef
25.
go back to reference Wang, T.-Y., Wen, Q.-Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. Comput. 11(5–6), 434–443 (2011)MathSciNetMATH Wang, T.-Y., Wen, Q.-Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. Comput. 11(5–6), 434–443 (2011)MathSciNetMATH
26.
27.
go back to reference Wang, T.-Y., Liu, Y.-Z., Wei, C.-Y., Cai, X.-Q., Ma, J.-F.: Security of a kind of quantum secret sharing with entangled states. Sci. Rep. 7, 2485 (2017)ADSCrossRef Wang, T.-Y., Liu, Y.-Z., Wei, C.-Y., Cai, X.-Q., Ma, J.-F.: Security of a kind of quantum secret sharing with entangled states. Sci. Rep. 7, 2485 (2017)ADSCrossRef
Metadata
Title
Efficient quantum secret sharing without a trusted player
Authors
Kartick Sutradhar
Hari Om
Publication date
01-02-2020
Publisher
Springer US
Published in
Quantum Information Processing / Issue 2/2020
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-019-2571-4

Other articles of this Issue 2/2020

Quantum Information Processing 2/2020 Go to the issue