Skip to main content
Erschienen in: Quantum Information Processing 9/2018

01.09.2018

Cryptanalysis of secret sharing with a single d-level quantum system

verfasst von: Xiu-Bo Chen, Xin Tang, Gang Xu, Zhao Dou, Yu-Ling Chen, Yi-Xian Yang

Erschienen in: Quantum Information Processing | Ausgabe 9/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this work, we point out that the multiparty secret sharing protocol of Tavakoli et al. (Phys Rev A 92:030302, 2015) based on a single d-level quantum system (where d is a prime number) is insecure and low efficient. In our paper, we show that all the secrets of distributor R1 can be stolen by q dishonest participants with the probability (q/N)ξ. An important improvement is proposed to fix up this security loophole. Besides, another improvement is given to increase the efficiency from 1/d to 1.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India. IEEE, New York, pp. 175–179 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India. IEEE, New York, pp. 175–179 (1984)
4.
Zurück zum Zitat Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)ADSCrossRef Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)ADSCrossRef
5.
Zurück zum Zitat Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)ADSCrossRef Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)ADSCrossRef
6.
Zurück zum Zitat Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)ADSCrossRef Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)ADSCrossRef
7.
Zurück zum Zitat Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)ADSCrossRef Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)ADSCrossRef
8.
Zurück zum Zitat Wang, J., Zhang, Q., Tang, C.: Quantum secure direct communication based on order rearrangement of single photons. Phys. Lett. A 358(4), 256–258 (2006)ADSCrossRefMATH Wang, J., Zhang, Q., Tang, C.: Quantum secure direct communication based on order rearrangement of single photons. Phys. Lett. A 358(4), 256–258 (2006)ADSCrossRefMATH
9.
Zurück zum Zitat Lee, H., Lim, J., Yang, H.J.: Quantum direct communication with authentication. Phys. Rev. A 73(4), 042305 (2006)ADSCrossRef Lee, H., Lim, J., Yang, H.J.: Quantum direct communication with authentication. Phys. Rev. A 73(4), 042305 (2006)ADSCrossRef
10.
Zurück zum Zitat Lin, S., Wen, Q.Y., Gao, F., et al.: Quantum secure direct communication with Chi-type entangled states. Phys. Rev. A 78(6), 064304 (2008)ADSCrossRef Lin, S., Wen, Q.Y., Gao, F., et al.: Quantum secure direct communication with Chi-type entangled states. Phys. Rev. A 78(6), 064304 (2008)ADSCrossRef
11.
Zurück zum Zitat Farouk, A., Zakaria, M., Megahed, A., et al.: A generalized architecture of quantum secure direct communication for N disjointed users with authentication. Sci. Rep. 5, 16080 (2015)ADSCrossRef Farouk, A., Zakaria, M., Megahed, A., et al.: A generalized architecture of quantum secure direct communication for N disjointed users with authentication. Sci. Rep. 5, 16080 (2015)ADSCrossRef
12.
Zurück zum Zitat Hu, J.Y., Yu, B., Jing, M.Y., et al.: Experimental quantum secure direct communication with single photons. Light Sci. Appl. 5, e16144 (2016)CrossRef Hu, J.Y., Yu, B., Jing, M.Y., et al.: Experimental quantum secure direct communication with single photons. Light Sci. Appl. 5, e16144 (2016)CrossRef
13.
Zurück zum Zitat Zhu, F., Zhang, W., Sheng, Y., et al.: Experimental long-distance quantum secure direct communication. Sci. Bull. 62(22), 1519–1524 (2017)CrossRef Zhu, F., Zhang, W., Sheng, Y., et al.: Experimental long-distance quantum secure direct communication. Sci. Bull. 62(22), 1519–1524 (2017)CrossRef
14.
Zurück zum Zitat Zhang, W., Ding, D.S., Sheng, Y.B., et al.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118(22), 220501 (2017)ADSCrossRef Zhang, W., Ding, D.S., Sheng, Y.B., et al.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118(22), 220501 (2017)ADSCrossRef
15.
Zurück zum Zitat Wu, F.Z., Yang, G.J., Wang, H.B., et al.: High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states. Sci. China Phys. Mech. Astron. 57, 2024 (2014)ADSCrossRef Wu, F.Z., Yang, G.J., Wang, H.B., et al.: High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states. Sci. China Phys. Mech. Astron. 57, 2024 (2014)ADSCrossRef
16.
Zurück zum Zitat Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92, 030301 (2015)ADSMathSciNetCrossRef Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92, 030301 (2015)ADSMathSciNetCrossRef
18.
Zurück zum Zitat Sen, A., Sen, U., Zukowski, M.: Unified criterion for security of secret sharing in terms of violation of Bell inequalities. Phys. Rev. A 68, 032309 (2003)ADSMathSciNetCrossRef Sen, A., Sen, U., Zukowski, M.: Unified criterion for security of secret sharing in terms of violation of Bell inequalities. Phys. Rev. A 68, 032309 (2003)ADSMathSciNetCrossRef
19.
Zurück zum Zitat Yu, I.C., Lin, F.L., Huang, C.Y.: Quantum secret sharing with multilevel mutually (un)biased bases. Phys. Rev. A 78, 012344 (2008)ADSCrossRef Yu, I.C., Lin, F.L., Huang, C.Y.: Quantum secret sharing with multilevel mutually (un)biased bases. Phys. Rev. A 78, 012344 (2008)ADSCrossRef
20.
Zurück zum Zitat Schmid, C., Trojek, P., Bourennane, M., et al.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95(23), 230505 (2005)ADSCrossRef Schmid, C., Trojek, P., Bourennane, M., et al.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95(23), 230505 (2005)ADSCrossRef
21.
Zurück zum Zitat He, G.P.: Comment on “Experimental single qubit quantum secret sharing”. Phys. Rev. Lett. 98(2), 028901 (2007)ADSCrossRef He, G.P.: Comment on “Experimental single qubit quantum secret sharing”. Phys. Rev. Lett. 98(2), 028901 (2007)ADSCrossRef
22.
Zurück zum Zitat Tavakoli, A., Herbauts, I., Zukowski, M., et al.: Secret sharing with a single-level quantum system. Phys. Rev. A 92, 030302 (2015)ADSCrossRef Tavakoli, A., Herbauts, I., Zukowski, M., et al.: Secret sharing with a single-level quantum system. Phys. Rev. A 92, 030302 (2015)ADSCrossRef
23.
Zurück zum Zitat Lin, S., Guo, G.D., Xu, Y.Z., et al.: Cryptanalysis of quantum secret sharing with d-level single particles. Phys. Rev. A 93, 062343 (2016)ADSCrossRef Lin, S., Guo, G.D., Xu, Y.Z., et al.: Cryptanalysis of quantum secret sharing with d-level single particles. Phys. Rev. A 93, 062343 (2016)ADSCrossRef
24.
Zurück zum Zitat Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 052307 (1999)CrossRef Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 052307 (1999)CrossRef
25.
Zurück zum Zitat Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)ADSCrossRef Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)ADSCrossRef
27.
Zurück zum Zitat Xiao, L., Long, G.L., Deng, F.G., et al.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307 (2004)ADSCrossRef Xiao, L., Long, G.L., Deng, F.G., et al.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307 (2004)ADSCrossRef
30.
Zurück zum Zitat Hao, L., Wang, C., Long, G.L.: Quantum secret sharing protocol with four state Grover algorithm and its proof-of-principle experimental demonstration. Opt. Commun. 284(14), 3639–3642 (2011)ADSCrossRef Hao, L., Wang, C., Long, G.L.: Quantum secret sharing protocol with four state Grover algorithm and its proof-of-principle experimental demonstration. Opt. Commun. 284(14), 3639–3642 (2011)ADSCrossRef
31.
Zurück zum Zitat Wei, K.J., Ma, H.Q., Yang, J.H.: Experimental circular quantum secret sharing over telecom fiber network. Opt. Express 21(14), 16663–16669 (2013)ADSCrossRef Wei, K.J., Ma, H.Q., Yang, J.H.: Experimental circular quantum secret sharing over telecom fiber network. Opt. Express 21(14), 16663–16669 (2013)ADSCrossRef
32.
Zurück zum Zitat Huang, W., Su, Q., Xu, B.J., et al.: Improved multiparty quantum key agreement in travelling mode. Sci. China Phys. Mech. Astron. 59(12), 120311 (2016)CrossRef Huang, W., Su, Q., Xu, B.J., et al.: Improved multiparty quantum key agreement in travelling mode. Sci. China Phys. Mech. Astron. 59(12), 120311 (2016)CrossRef
33.
Zurück zum Zitat Zhang, K.J., Zhang, L., Song, T.T., et al.: A potential application in quantum networks—deterministic quantum operation sharing schemes with Bell states. Sci. China Phys. Mech. Astron. 59(6), 660302 (2016)CrossRef Zhang, K.J., Zhang, L., Song, T.T., et al.: A potential application in quantum networks—deterministic quantum operation sharing schemes with Bell states. Sci. China Phys. Mech. Astron. 59(6), 660302 (2016)CrossRef
34.
Zurück zum Zitat Song, X., Liu, Y.: Cryptanalysis and improvement of verifiable quantum (k, n) secret sharing. Quantum Inf. Process. 15(2), 851–868 (2016)ADSMathSciNetCrossRefMATH Song, X., Liu, Y.: Cryptanalysis and improvement of verifiable quantum (k, n) secret sharing. Quantum Inf. Process. 15(2), 851–868 (2016)ADSMathSciNetCrossRefMATH
35.
Zurück zum Zitat Jiang, T.S., Jiang, Z.W., Ling, S.T.: An algebraic method for quaternion and complex least squares coneigen-problem in quantum mechanics. Appl. Math. Comput. 249, 222–228 (2014)MathSciNetMATH Jiang, T.S., Jiang, Z.W., Ling, S.T.: An algebraic method for quaternion and complex least squares coneigen-problem in quantum mechanics. Appl. Math. Comput. 249, 222–228 (2014)MathSciNetMATH
36.
Zurück zum Zitat Dong, H.H., Zhang, Y.F., Zhang, Y.F., Yin, B.S.: Generalized bilinear differential operators, binary bell polynomials, and exact periodic wave solution of boiti-leon-manna-pempinelli equation. Abstr. Appl. Anal. 2014, 738609 (2014) Dong, H.H., Zhang, Y.F., Zhang, Y.F., Yin, B.S.: Generalized bilinear differential operators, binary bell polynomials, and exact periodic wave solution of boiti-leon-manna-pempinelli equation. Abstr. Appl. Anal. 2014, 738609 (2014)
38.
Zurück zum Zitat Deng, F.G., Ren, B.C., Li, X.H.: Quantum hyperentanglement and its applications in quantum information processing. Sci. Bull. 62(1), 46–68 (2017)CrossRef Deng, F.G., Ren, B.C., Li, X.H.: Quantum hyperentanglement and its applications in quantum information processing. Sci. Bull. 62(1), 46–68 (2017)CrossRef
40.
Zurück zum Zitat Adhikari, S., Chakrabarty, I., Agrawal, P.: Probabilistic secret sharing through noise quantum channel. Quantum Inf. Comput. 12, 0253 (2012)MathSciNetMATH Adhikari, S., Chakrabarty, I., Agrawal, P.: Probabilistic secret sharing through noise quantum channel. Quantum Inf. Comput. 12, 0253 (2012)MathSciNetMATH
41.
Zurück zum Zitat Sazim, S., Chiranjeevi, V., Chakrabarty, I., et al.: Retrieving and routing quantum information in a quantum network. Quantum Inf. Process. 14(12), 4651–4664 (2015)ADSMathSciNetCrossRefMATH Sazim, S., Chiranjeevi, V., Chakrabarty, I., et al.: Retrieving and routing quantum information in a quantum network. Quantum Inf. Process. 14(12), 4651–4664 (2015)ADSMathSciNetCrossRefMATH
42.
Zurück zum Zitat Ray, M., Chatterjee, S., Chakrabarty, I.: Sequential quantum secret sharing in a noisy environment aided with weak measurements. Eur. Phys. J. D 70, 114 (2016)ADSCrossRef Ray, M., Chatterjee, S., Chakrabarty, I.: Sequential quantum secret sharing in a noisy environment aided with weak measurements. Eur. Phys. J. D 70, 114 (2016)ADSCrossRef
43.
44.
Zurück zum Zitat Qin, S.J., Gao, F., Wen, Q.Y., et al.: Cryptanalysis of the Hillery–Bužek–Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76, 062324 (2007)ADSCrossRef Qin, S.J., Gao, F., Wen, Q.Y., et al.: Cryptanalysis of the Hillery–Bužek–Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76, 062324 (2007)ADSCrossRef
45.
Zurück zum Zitat Gao, F., Qin, S.J., Wen, Q.Y., et al.: A simple participant attack on the Brádler–Dušek protocol. Quantum Inf. Comput. 7, 329 (2007)MathSciNetMATH Gao, F., Qin, S.J., Wen, Q.Y., et al.: A simple participant attack on the Brádler–Dušek protocol. Quantum Inf. Comput. 7, 329 (2007)MathSciNetMATH
46.
Zurück zum Zitat Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Comment on “Experimental demonstration of a quantum protocol for byzantine agreement and liar detection”. Phys. Rev. Lett. 101, 208901 (2008)ADSCrossRef Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Comment on “Experimental demonstration of a quantum protocol for byzantine agreement and liar detection”. Phys. Rev. Lett. 101, 208901 (2008)ADSCrossRef
47.
Zurück zum Zitat Gao, F., Qin, S.J., Wen, Q.Y., et al.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283, 192 (2010)ADSCrossRef Gao, F., Qin, S.J., Wen, Q.Y., et al.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283, 192 (2010)ADSCrossRef
Metadaten
Titel
Cryptanalysis of secret sharing with a single d-level quantum system
verfasst von
Xiu-Bo Chen
Xin Tang
Gang Xu
Zhao Dou
Yu-Ling Chen
Yi-Xian Yang
Publikationsdatum
01.09.2018
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 9/2018
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-018-1988-5

Weitere Artikel der Ausgabe 9/2018

Quantum Information Processing 9/2018 Zur Ausgabe