Skip to main content
Top
Published in: Quantum Information Processing 11/2018

01-11-2018

Restricted (kn)-threshold quantum secret sharing scheme based on local distinguishability of orthogonal multiqudit entangled states

Authors: Chen-Ming Bai, Zhi-Hui Li, Jing-Tao Wang, Cheng-Ji Liu, Yong-Ming Li

Published in: Quantum Information Processing | Issue 11/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this work, we study a restricted (kn)-threshold access structure. According to this structure, we construct a group of orthogonal multipartite entangled states in d-dimensional system and investigate the distinguishability of these entangled states under restricted local operations and classical communication. Based on these properties, we propose a restricted (kn)-threshold quantum secret sharing scheme (called LOCC-QSS scheme). The k cooperating players in the restricted threshold scheme come from all disjoint groups. In the proposed protocol, the participants distinguish these orthogonal states by the computational basis measurement and classical communication to reconstruct the original secret. Furthermore, we also analyze the security of our scheme in three primary quantum attacks and give a simple encoding method in order to better prevent the participant conspiracy attack.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bennet, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the International Conference on Computers, Systems and Signal Processing (1984) Bennet, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the International Conference on Computers, Systems and Signal Processing (1984)
2.
go back to reference Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)ADSCrossRef Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)ADSCrossRef
3.
go back to reference Amiri, R., Arrazola, J.M.: Quantum money with nearly optimal error tolerance. Phys. Rev. A 95, 062334 (2017)ADSCrossRef Amiri, R., Arrazola, J.M.: Quantum money with nearly optimal error tolerance. Phys. Rev. A 95, 062334 (2017)ADSCrossRef
4.
go back to reference Gao, F.: Postprocessing of the oblivious key in quantum private query. IEEE J. Sel. Top. Quant. 21, 6600111 (2015)ADS Gao, F.: Postprocessing of the oblivious key in quantum private query. IEEE J. Sel. Top. Quant. 21, 6600111 (2015)ADS
5.
go back to reference Wei, C.Y., et al.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93, 042318 (2016)ADSCrossRef Wei, C.Y., et al.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93, 042318 (2016)ADSCrossRef
6.
go back to reference Wei, C.Y., Cai, X.Q., Liu, B.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67, 2–8 (2018)MathSciNetCrossRef Wei, C.Y., Cai, X.Q., Liu, B.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67, 2–8 (2018)MathSciNetCrossRef
7.
go back to reference Shi, R.H., et al.: Quantum oblivious set-member decision protocol. Phys. Rev. A 92, 022309 (2015)ADSCrossRef Shi, R.H., et al.: Quantum oblivious set-member decision protocol. Phys. Rev. A 92, 022309 (2015)ADSCrossRef
8.
go back to reference Shi, R., Mu, Y., Zhong, H., et al.: Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 370, 147–158 (2016)CrossRef Shi, R., Mu, Y., Zhong, H., et al.: Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 370, 147–158 (2016)CrossRef
10.
go back to reference Blakley, G.R.: In: Proceedings of the National Computer Conference (AFIPS, 1979), pp. 313–317 (1979) Blakley, G.R.: In: Proceedings of the National Computer Conference (AFIPS, 1979), pp. 313–317 (1979)
12.
go back to reference Cleve, R., Gottesman, D., Lo, H.-K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)ADSCrossRef Cleve, R., Gottesman, D., Lo, H.-K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)ADSCrossRef
14.
15.
go back to reference Zukowski, M., Zeilinger, A., Horne, M.A., et al.: Quest for GHZ states. Acta Phys. Pol. A 93, 187 (1998)CrossRef Zukowski, M., Zeilinger, A., Horne, M.A., et al.: Quest for GHZ states. Acta Phys. Pol. A 93, 187 (1998)CrossRef
16.
go back to reference Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162 (1999)ADSCrossRef Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162 (1999)ADSCrossRef
17.
go back to reference Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004)ADSCrossRef Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004)ADSCrossRef
18.
go back to reference Hsu, L.Y., Li, C.M.: Quantum secret sharing using product states. Phys. Rev. A 71, 022321 (2005)ADSCrossRef Hsu, L.Y., Li, C.M.: Quantum secret sharing using product states. Phys. Rev. A 71, 022321 (2005)ADSCrossRef
19.
go back to reference Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)ADSCrossRef Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)ADSCrossRef
20.
go back to reference Wei, K.J., Ma, H.Q., Yang, J.H.: Experimental circular quantum secret sharing over telecom fiber network. Opt. Express 21(14), 16663–16669 (2013)ADSCrossRef Wei, K.J., Ma, H.Q., Yang, J.H.: Experimental circular quantum secret sharing over telecom fiber network. Opt. Express 21(14), 16663–16669 (2013)ADSCrossRef
21.
go back to reference Lance, A.M., Symul, T., Bowen, W.P., Sanders, B.C., Lam, P.K.: Tripartite quantum state sharing. Phys. Rev. Lett. 92, 177903 (2004)ADSCrossRef Lance, A.M., Symul, T., Bowen, W.P., Sanders, B.C., Lam, P.K.: Tripartite quantum state sharing. Phys. Rev. Lett. 92, 177903 (2004)ADSCrossRef
22.
go back to reference Deng, F.G., Li, X.H., Li, C.Y., Zhou, P., Zhou, H.Y.: Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein–Podolsky–Rosen pairs. Phys. Rev. A 72, 044301 (2005)ADSCrossRef Deng, F.G., Li, X.H., Li, C.Y., Zhou, P., Zhou, H.Y.: Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein–Podolsky–Rosen pairs. Phys. Rev. A 72, 044301 (2005)ADSCrossRef
23.
go back to reference Gordon, G., Rigolin, G.: Generalized quantum-state sharing. Phys. Rev. A 73, 062316 (2006)ADSCrossRef Gordon, G., Rigolin, G.: Generalized quantum-state sharing. Phys. Rev. A 73, 062316 (2006)ADSCrossRef
24.
go back to reference Bai, C.M., Li, Z.H., Xu, T.T., Li, Y.M.: A generalized information theoretical model for quantum secret sharing. Int. J. Theor. Phys. 55, 4972–4986 (2016)CrossRef Bai, C.M., Li, Z.H., Xu, T.T., Li, Y.M.: A generalized information theoretical model for quantum secret sharing. Int. J. Theor. Phys. 55, 4972–4986 (2016)CrossRef
25.
go back to reference Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92, 030301(R) (2015)ADSMathSciNetCrossRef Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92, 030301(R) (2015)ADSMathSciNetCrossRef
26.
go back to reference Gheorghiu, V., Sanders, B.C.: Accessing quantum secrets via local operations and classical communication. Phys. Rev. A 88(2), 022340 (2013)ADSCrossRef Gheorghiu, V., Sanders, B.C.: Accessing quantum secrets via local operations and classical communication. Phys. Rev. A 88(2), 022340 (2013)ADSCrossRef
27.
go back to reference Tavakoli, A., Herbauts, I., Zukowski, M., Bourennane, M.: Secret sharing with a single \(d\)-level quantum system. Phys. Rev. A 92, 030302(R) (2015)ADSCrossRef Tavakoli, A., Herbauts, I., Zukowski, M., Bourennane, M.: Secret sharing with a single \(d\)-level quantum system. Phys. Rev. A 92, 030302(R) (2015)ADSCrossRef
28.
go back to reference Maitra, A., De, S.J., Paul, G., Pal, A.K.: Proposal for quantum rational secret sharing. Phys. Rev. A 92, 022305 (2015)ADSCrossRef Maitra, A., De, S.J., Paul, G., Pal, A.K.: Proposal for quantum rational secret sharing. Phys. Rev. A 92, 022305 (2015)ADSCrossRef
29.
go back to reference Rahaman, R., Parker, M.G.: Quantum scheme for secret sharing based on local distinguishability. Phys. Rev. A 91, 022330 (2015)ADSCrossRef Rahaman, R., Parker, M.G.: Quantum scheme for secret sharing based on local distinguishability. Phys. Rev. A 91, 022330 (2015)ADSCrossRef
30.
go back to reference Yang, Y.H., Gao, F., Wu, X.: Quantum secret sharing via local operations and classical communication. Sci. Rep. 5, 16967–16967 (2015)ADSCrossRef Yang, Y.H., Gao, F., Wu, X.: Quantum secret sharing via local operations and classical communication. Sci. Rep. 5, 16967–16967 (2015)ADSCrossRef
31.
go back to reference Bai, C.M., Li, Z.H., Xu, T.T.: Quantum secret sharing using the \(d\)-dimensional GHZ state. Quantum Inf. Process. 16, 59 (2017)ADSMathSciNetCrossRef Bai, C.M., Li, Z.H., Xu, T.T.: Quantum secret sharing using the \(d\)-dimensional GHZ state. Quantum Inf. Process. 16, 59 (2017)ADSMathSciNetCrossRef
32.
go back to reference Wang, J., Li, L., Peng, H., Yang, Y.: Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Phys. Rev. A 95(2), 022320 (2017)ADSCrossRef Wang, J., Li, L., Peng, H., Yang, Y.: Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Phys. Rev. A 95(2), 022320 (2017)ADSCrossRef
33.
go back to reference Bai, C.M., Li, Z.H., Liu, C.J.: Quantum secret sharing using orthogonal multiqudit entangled states. Quantum Inf. Process. 16, 304 (2017)ADSMathSciNetCrossRef Bai, C.M., Li, Z.H., Liu, C.J.: Quantum secret sharing using orthogonal multiqudit entangled states. Quantum Inf. Process. 16, 304 (2017)ADSMathSciNetCrossRef
34.
go back to reference Song, T.T.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18(4), 1333 (2009)ADSCrossRef Song, T.T.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18(4), 1333 (2009)ADSCrossRef
35.
go back to reference Guo, F.-Z.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D 56(3), 445–448 (2010)ADSCrossRef Guo, F.-Z.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D 56(3), 445–448 (2010)ADSCrossRef
Metadata
Title
Restricted (k, n)-threshold quantum secret sharing scheme based on local distinguishability of orthogonal multiqudit entangled states
Authors
Chen-Ming Bai
Zhi-Hui Li
Jing-Tao Wang
Cheng-Ji Liu
Yong-Ming Li
Publication date
01-11-2018
Publisher
Springer US
Published in
Quantum Information Processing / Issue 11/2018
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-018-2080-x

Other articles of this Issue 11/2018

Quantum Information Processing 11/2018 Go to the issue