Skip to main content
Top
Published in: Quantum Information Processing 11/2018

01-11-2018

Verifiable threshold quantum secret sharing with sequential communication

Authors: Changbin Lu, Fuyou Miao, Junpeng Hou, Keju Meng

Published in: Quantum Information Processing | Issue 11/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A (t, n) threshold quantum secret sharing (QSS) is proposed based on a single d-level quantum system. It enables the (t, n) threshold structure based on Shamir’s secret sharing and simply requires sequential communication in d-level quantum system to recover secret. Besides, the scheme provides a verification mechanism which employs an additional qudit to detect cheats and eavesdropping during secret reconstruction and allows a participant to use the share repeatedly. Analyses show that the proposed scheme is resistant to typical attacks. Moreover, the scheme is scalable in participant number and easier to realize compared to related schemes. More generally, our scheme also presents a generic method to construct new (t, n) threshold QSS schemes based on d-level quantum system from other classical threshold secret sharing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of national computer conference, New York, vol. 313 (1979) Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of national computer conference, New York, vol. 313 (1979)
4.
go back to reference Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In: Public key cryptography-PKC., vol. 31, Springer, Berlin (2002) Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In: Public key cryptography-PKC., vol. 31, Springer, Berlin (2002)
5.
go back to reference Harn, L.: Group-oriented (\(t\), \(n\)) threshold digital signature scheme and digital multisignature. IEEE Proc. Comput. Digit. Techn. 141(5), 307 (1994)CrossRef Harn, L.: Group-oriented (\(t\), \(n\)) threshold digital signature scheme and digital multisignature. IEEE Proc. Comput. Digit. Techn. 141(5), 307 (1994)CrossRef
6.
go back to reference Liu, Y.N., Harn, L., Mao, L., Xiong, Z.: Full-healing group-key distribution in online social networks. Int. J. Secur. Netw. 11(1–2), 12 (2016)CrossRef Liu, Y.N., Harn, L., Mao, L., Xiong, Z.: Full-healing group-key distribution in online social networks. Int. J. Secur. Netw. 11(1–2), 12 (2016)CrossRef
7.
go back to reference Desmedt, Y.G.: Threshold cryptography. Eur. Trans. Telecommun. 5(4), 449 (1994)CrossRef Desmedt, Y.G.: Threshold cryptography. Eur. Trans. Telecommun. 5(4), 449 (1994)CrossRef
8.
go back to reference Patel, K.: Secure multiparty computation using secret sharing. In: International conference on signal processing, communication, power and embedded system, IEEE, p. 863 (2016) Patel, K.: Secure multiparty computation using secret sharing. In: International conference on signal processing, communication, power and embedded system, IEEE, p. 863 (2016)
9.
go back to reference Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)ADSCrossRef Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)ADSCrossRef
11.
go back to reference Yu, I.C., Lin, F.L., Huang, C.Y.: Quantum secret sharing with multilevel mutually (un) biased bases. Phys. Rev. A 78, 012344 (2008)ADSCrossRef Yu, I.C., Lin, F.L., Huang, C.Y.: Quantum secret sharing with multilevel mutually (un) biased bases. Phys. Rev. A 78, 012344 (2008)ADSCrossRef
12.
go back to reference Bai, C.M., Li, Z.H., Xu, T.T., Li, Y.M.: Quantum secret sharing using the \(d\)-dimensional GHZ state. Quantum Inf. Process 16(3), 59 (2017)ADSMathSciNetCrossRef Bai, C.M., Li, Z.H., Xu, T.T., Li, Y.M.: Quantum secret sharing using the \(d\)-dimensional GHZ state. Quantum Inf. Process 16(3), 59 (2017)ADSMathSciNetCrossRef
13.
go back to reference Tavakoli, A., Herbauts, I., Zukowski, M., Bourennane, M.: Secret sharing with a single \(d\)-level quantum system. Phys. Rev. A 92, 030302 (2015)ADSCrossRef Tavakoli, A., Herbauts, I., Zukowski, M., Bourennane, M.: Secret sharing with a single \(d\)-level quantum system. Phys. Rev. A 92, 030302 (2015)ADSCrossRef
14.
go back to reference Hsu, L.Y.: Quantum secret-sharing protocol based on Grover’s algorithm. Phys. Rev. A 68, 022306 (2003)ADSCrossRef Hsu, L.Y.: Quantum secret-sharing protocol based on Grover’s algorithm. Phys. Rev. A 68, 022306 (2003)ADSCrossRef
17.
go back to reference Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92, 030301 (2015)ADSMathSciNetCrossRef Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92, 030301 (2015)ADSMathSciNetCrossRef
18.
go back to reference Yang, W., Huang, L., Shi, R., He, L.: Secret sharing based on quantum Fourier transform. Quantum Inf. Process 12(7), 2465 (2013)ADSMathSciNetCrossRef Yang, W., Huang, L., Shi, R., He, L.: Secret sharing based on quantum Fourier transform. Quantum Inf. Process 12(7), 2465 (2013)ADSMathSciNetCrossRef
19.
go back to reference Lai, H., Luo, M.X., Pieprzyk, J., Li, T., Liu, Z.M., Orgun, M.A.: Large-capacity three-party quantum digital secret sharing using three particular matrices coding. Commun. Theor. Phys. 66(05), 501–508 (2016)ADSMathSciNetCrossRef Lai, H., Luo, M.X., Pieprzyk, J., Li, T., Liu, Z.M., Orgun, M.A.: Large-capacity three-party quantum digital secret sharing using three particular matrices coding. Commun. Theor. Phys. 66(05), 501–508 (2016)ADSMathSciNetCrossRef
20.
go back to reference Kogias, I., Xiang, Y., He, Q.Y., Adesso, G.: Unconditional security of entanglement-based continuous-variable quantum secret sharing. Phys. Rev. A 95, 012315 (2017)ADSCrossRef Kogias, I., Xiang, Y., He, Q.Y., Adesso, G.: Unconditional security of entanglement-based continuous-variable quantum secret sharing. Phys. Rev. A 95, 012315 (2017)ADSCrossRef
21.
go back to reference Tittel, W., Zbinden, H., Gisin, N.: Experimental demonstration of quantum secret sharing. Phys. Rev. A 63(4), 042301 (2001)ADSCrossRef Tittel, W., Zbinden, H., Gisin, N.: Experimental demonstration of quantum secret sharing. Phys. Rev. A 63(4), 042301 (2001)ADSCrossRef
22.
go back to reference Schmidt, C., Trojek, P., Bourennane, M., Kurtsiefer, C., Zukowski, M., Weinfurter, H.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95, 230505 (2005)ADSCrossRef Schmidt, C., Trojek, P., Bourennane, M., Kurtsiefer, C., Zukowski, M., Weinfurter, H.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95, 230505 (2005)ADSCrossRef
23.
go back to reference Chen, Y.A., Zhang, A.N., Zhao, Z., Zhou, X.Q., Lu, C.Y., Peng, C.Z.: Experimental quantum secret sharing and third-man quantum cryptography. Phys. Rev. Lett 95(20), 200502 (2005)ADSCrossRef Chen, Y.A., Zhang, A.N., Zhao, Z., Zhou, X.Q., Lu, C.Y., Peng, C.Z.: Experimental quantum secret sharing and third-man quantum cryptography. Phys. Rev. Lett 95(20), 200502 (2005)ADSCrossRef
24.
go back to reference Lu, H., Zhang, Z., Chen, L.K., Li, Z.D., Liu, C., Li, L.: Secret sharing of a quantum state. Phys. Rev. Lett 117(3), 030501 (2016)ADSCrossRef Lu, H., Zhang, Z., Chen, L.K., Li, Z.D., Liu, C., Li, L.: Secret sharing of a quantum state. Phys. Rev. Lett 117(3), 030501 (2016)ADSCrossRef
25.
go back to reference Lance, A.M., Symul, T., Bowen, W.P., Tyc, T., Sanders, B.C., Lam, P.K.: Continuous variable (2, 3) threshold quantum secret sharing schemes. New J. Phys. 5, 4 (2003)ADSMathSciNetCrossRef Lance, A.M., Symul, T., Bowen, W.P., Tyc, T., Sanders, B.C., Lam, P.K.: Continuous variable (2, 3) threshold quantum secret sharing schemes. New J. Phys. 5, 4 (2003)ADSMathSciNetCrossRef
26.
go back to reference Lau, H.K., Weedbrook, C.: Quantum secret sharing with continuous-variable cluster states. Phys. Rev. A 88, 042313 (2013)ADSCrossRef Lau, H.K., Weedbrook, C.: Quantum secret sharing with continuous-variable cluster states. Phys. Rev. A 88, 042313 (2013)ADSCrossRef
27.
go back to reference Wu, Y., Cai, R., He, G., Zhang, J.: Quantum secret sharing with continuous variable graph state. Quantum Inf. Process. 13, 1085 (2014)ADSMathSciNetCrossRef Wu, Y., Cai, R., He, G., Zhang, J.: Quantum secret sharing with continuous variable graph state. Quantum Inf. Process. 13, 1085 (2014)ADSMathSciNetCrossRef
28.
go back to reference Rahaman, R., Parker, M.G.: Quantum scheme for secret sharing based on local distinguishability. Phys. Rev. A 91, 022330 (2015)ADSCrossRef Rahaman, R., Parker, M.G.: Quantum scheme for secret sharing based on local distinguishability. Phys. Rev. A 91, 022330 (2015)ADSCrossRef
29.
go back to reference Yang, Y.H., Gao, F., Wu, X., Qin, S.J., Zuo, H.J., Wen, Q.Y.: Quantum secret sharing via local operations and classical communication. Sci. Rep. 5, 16967 (2015)ADSCrossRef Yang, Y.H., Gao, F., Wu, X., Qin, S.J., Zuo, H.J., Wen, Q.Y.: Quantum secret sharing via local operations and classical communication. Sci. Rep. 5, 16967 (2015)ADSCrossRef
30.
go back to reference Wang, J., Li, L., Peng, H., Yang, Y.: Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Phys. Rev. A 95, 022320 (2017)ADSCrossRef Wang, J., Li, L., Peng, H., Yang, Y.: Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Phys. Rev. A 95, 022320 (2017)ADSCrossRef
31.
go back to reference Tokunaga, Y., Okamoto, T., Imoto, N.: Threshold quantum cryptography. Phys. Rev. A 71, 012314 (2005)ADSCrossRef Tokunaga, Y., Okamoto, T., Imoto, N.: Threshold quantum cryptography. Phys. Rev. A 71, 012314 (2005)ADSCrossRef
32.
go back to reference Qin, H., Zhu, X., Dai, Y.: (\(t\), \(n\)) Threshold quantum secret sharing using the phase shift operation. Quantum Inf. Process 14(8), 2997–3004 (2015)ADSMathSciNetCrossRef Qin, H., Zhu, X., Dai, Y.: (\(t\), \(n\)) Threshold quantum secret sharing using the phase shift operation. Quantum Inf. Process 14(8), 2997–3004 (2015)ADSMathSciNetCrossRef
33.
go back to reference Song, X.L., Liu, Y.B., Deng, H.Y., Xiao, Y.G.: (\(t\), \(n\)) Threshold d-level quantum secret sharing. Sci. Rep. 7, 6366 (2017)ADSCrossRef Song, X.L., Liu, Y.B., Deng, H.Y., Xiao, Y.G.: (\(t\), \(n\)) Threshold d-level quantum secret sharing. Sci. Rep. 7, 6366 (2017)ADSCrossRef
34.
go back to reference Lu, C.B., Miao, F.Y., Meng, K.J., Yu, Y.: Threshold quantum secret sharing based on single qubit. Quantum Inf. Process. 17(3), 64 (2018)ADSMathSciNetCrossRef Lu, C.B., Miao, F.Y., Meng, K.J., Yu, Y.: Threshold quantum secret sharing based on single qubit. Quantum Inf. Process. 17(3), 64 (2018)ADSMathSciNetCrossRef
35.
go back to reference Lai, H., Zhang, J., Luo, M.X., Pan, L., Pieprzyk, J., Xiao, F.Y., Orgun, M.A.: Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman–Fibonacci tree coding. Sci. Rep. 6, 31350 (2016)ADSCrossRef Lai, H., Zhang, J., Luo, M.X., Pan, L., Pieprzyk, J., Xiao, F.Y., Orgun, M.A.: Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman–Fibonacci tree coding. Sci. Rep. 6, 31350 (2016)ADSCrossRef
37.
38.
go back to reference Miao, F.Y., Xiong, Y., Wang, X.F., Badawy, M.: Randomized component and its application to (t, m, n)-group oriented secret sharing. IEEE Trans. Inf. Forensics Secur. 10(5), 889–899 (2015)CrossRef Miao, F.Y., Xiong, Y., Wang, X.F., Badawy, M.: Randomized component and its application to (t, m, n)-group oriented secret sharing. IEEE Trans. Inf. Forensics Secur. 10(5), 889–899 (2015)CrossRef
39.
go back to reference Gao, F., Qin, S.J., Wen, Q.Y.: A simple participant attack on the Bradler–Dusek protocol. Quantum Inf. Comput. 7(4), 329 (2007)MathSciNetMATH Gao, F., Qin, S.J., Wen, Q.Y.: A simple participant attack on the Bradler–Dusek protocol. Quantum Inf. Comput. 7(4), 329 (2007)MathSciNetMATH
40.
go back to reference He, G.P.: Comment on experimental single qubit quantum secret sharing. Phys. Rev. Lett. 98, 028901 (2007)ADSCrossRef He, G.P.: Comment on experimental single qubit quantum secret sharing. Phys. Rev. Lett. 98, 028901 (2007)ADSCrossRef
41.
42.
go back to reference Massey, J.L.: Minimal codewords and secret sharing. In: Proceedings of the 6th joint Swedish–Russian international workshop on information theory. IEEE Press, Washington DC, vol. 276 (1993) Massey, J.L.: Minimal codewords and secret sharing. In: Proceedings of the 6th joint Swedish–Russian international workshop on information theory. IEEE Press, Washington DC, vol. 276 (1993)
43.
44.
go back to reference Mignotte, M.: How to share a secret. In: Conference on cryptography, Springer, Berlin vol. 149, 371 (1982) Mignotte, M.: How to share a secret. In: Conference on cryptography, Springer, Berlin vol. 149, 371 (1982)
Metadata
Title
Verifiable threshold quantum secret sharing with sequential communication
Authors
Changbin Lu
Fuyou Miao
Junpeng Hou
Keju Meng
Publication date
01-11-2018
Publisher
Springer US
Published in
Quantum Information Processing / Issue 11/2018
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-018-2059-7

Other articles of this Issue 11/2018

Quantum Information Processing 11/2018 Go to the issue