Skip to main content
Erschienen in: Quantum Information Processing 2/2016

01.02.2016

Cryptanalysis and improvement of verifiable quantum (kn) secret sharing

verfasst von: Xiuli Song, Yanbing Liu

Erschienen in: Quantum Information Processing | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

After analyzing Yang’s verifiable quantum secret sharing (VQSS) scheme, we show that in their scheme a participant can prepare a false quantum particle sequence corresponding to a forged share, while other any participant cannot trace it. In addition, an attacker or a participant can forge a new quantum sequence by transforming an intercepted quantum sequence; moreover, the forged sequence can pass the verification of other participants. So we propose a new VQSS scheme to improve the existed one. In the improved scheme, we construct an identity-based quantum signature encryption algorithm, which ensures chosen plaintext attack security of the shares and their signatures transmitted in the quantum tunnel. We employ dual quantum signature and one-way function to trace against forgery and repudiation of the deceivers (dealer or participants). Furthermore, we add the reconstruction process of quantum secret and prove the security property against superposition attack in this process.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Zheng, S.B.: Splitting quantum information via W states. Phys. Rev. A 74, 054303 (2006)CrossRefADS Zheng, S.B.: Splitting quantum information via W states. Phys. Rev. A 74, 054303 (2006)CrossRefADS
4.
Zurück zum Zitat Nie, Y.Y., Sang, M.H., Li, Y.H., Liu, J.C.: Three-party quantum information splitting of an arbitrary two-qubit state by using six-qubit cluster state. Int. J. Theor. Phys. 50(5), 1367–1371 (2011)CrossRefMathSciNetMATH Nie, Y.Y., Sang, M.H., Li, Y.H., Liu, J.C.: Three-party quantum information splitting of an arbitrary two-qubit state by using six-qubit cluster state. Int. J. Theor. Phys. 50(5), 1367–1371 (2011)CrossRefMathSciNetMATH
5.
Zurück zum Zitat Paul, N., Menon, J.V., Karumanchi, S., Muralidharan, S., Panigrahi, P.K.: Quantum tasks using six qubit cluster states. Quantum Inf. Process. 10, 619–632 (2011)CrossRefMathSciNetMATH Paul, N., Menon, J.V., Karumanchi, S., Muralidharan, S., Panigrahi, P.K.: Quantum tasks using six qubit cluster states. Quantum Inf. Process. 10, 619–632 (2011)CrossRefMathSciNetMATH
6.
Zurück zum Zitat Hsu, L.-Y.: Quantum secret-sharing protocol based on Grover’s algorithm. Phys. Rev. A 68(2), 022306 (2003)CrossRefADS Hsu, L.-Y.: Quantum secret-sharing protocol based on Grover’s algorithm. Phys. Rev. A 68(2), 022306 (2003)CrossRefADS
7.
Zurück zum Zitat Hao, L., Li, J.-L., Long, G.-L.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. China Phys. Mech. Astron. 53(3), 491–495 (2010)CrossRefADS Hao, L., Li, J.-L., Long, G.-L.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. China Phys. Mech. Astron. 53(3), 491–495 (2010)CrossRefADS
8.
Zurück zum Zitat Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)CrossRefADS Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)CrossRefADS
9.
Zurück zum Zitat Lai, H., Orgun, A.M., Xiao, J.H., Pieprzyk, J.: Dynamic (2, 3) threshold quantum secret sharing of secure direct communication. Commun. Theor. Phys. 63(4), 459–465 (2015)CrossRefADS Lai, H., Orgun, A.M., Xiao, J.H., Pieprzyk, J.: Dynamic (2, 3) threshold quantum secret sharing of secure direct communication. Commun. Theor. Phys. 63(4), 459–465 (2015)CrossRefADS
11.
Zurück zum Zitat Keet, A., Fortescue, B., Markham, D., Sanders, B.C.: Quantum secret sharing with qudit graph states. Phys. Rev. A 82, 62315 (2010)CrossRefADS Keet, A., Fortescue, B., Markham, D., Sanders, B.C.: Quantum secret sharing with qudit graph states. Phys. Rev. A 82, 62315 (2010)CrossRefADS
12.
Zurück zum Zitat Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: The 26th IEEE Symposium on Foundations of computer science, pp. 383–395 (1985) Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: The 26th IEEE Symposium on Foundations of computer science, pp. 383–395 (1985)
13.
Zurück zum Zitat Yang, Y.G., Teng, Y.W., Chai, H.P., Wen, Q.Y.: Verifiable quantum \((k, n)\)-threshold secret key sharing. Int. J. Theor. Phys. 50(3), 792–798 (2011)CrossRefMathSciNetMATH Yang, Y.G., Teng, Y.W., Chai, H.P., Wen, Q.Y.: Verifiable quantum \((k, n)\)-threshold secret key sharing. Int. J. Theor. Phys. 50(3), 792–798 (2011)CrossRefMathSciNetMATH
16.
Zurück zum Zitat Boneh, D., and Zhandry, M.: Secure signatures and chosen ciphertext security in a post-quantum world. In: The 33rd Annual Cryptology Conference, pp. 361–379 (2013) Boneh, D., and Zhandry, M.: Secure signatures and chosen ciphertext security in a post-quantum world. In: The 33rd Annual Cryptology Conference, pp. 361–379 (2013)
17.
Zurück zum Zitat Lü, X., Feng, D.G.: Quantum digital signature based on quantum one-way functions. In: The 7th IEEE International Conference on Advanced Communication Technology, pp. 514–517 (2005) Lü, X., Feng, D.G.: Quantum digital signature based on quantum one-way functions. In: The 7th IEEE International Conference on Advanced Communication Technology, pp. 514–517 (2005)
18.
Zurück zum Zitat Buhrman, H., Cleve, R., Watrous, J., Wolf, R.D.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 175–196 (2001)CrossRef Buhrman, H., Cleve, R., Watrous, J., Wolf, R.D.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 175–196 (2001)CrossRef
19.
Zurück zum Zitat Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. Electron. Colloq. Comput. Complex. 14, 197–206 (2008)MathSciNet Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. Electron. Colloq. Comput. Complex. 14, 197–206 (2008)MathSciNet
20.
Zurück zum Zitat Agrawal, S., Dan, B., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Advances in Cryptology - EUROCRYPT 2010, pp. 553–572 (2010) Agrawal, S., Dan, B., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Advances in Cryptology - EUROCRYPT 2010, pp. 553–572 (2010)
21.
Zurück zum Zitat Zhandry, M.: Secure identity-based encryption in the quantum random oracle model. Int. J. Quantum Inf. 7417, 758–775 (2015) Zhandry, M.: Secure identity-based encryption in the quantum random oracle model. Int. J. Quantum Inf. 7417, 758–775 (2015)
22.
Zurück zum Zitat Li, Q., Long, D.Y., Chan, W.H., Qiu, D.W.: Sharing a quantum secret without a trusted party. Quantum Inf. Process. 10(1), 97–106 (2011)CrossRefMathSciNetMATH Li, Q., Long, D.Y., Chan, W.H., Qiu, D.W.: Sharing a quantum secret without a trusted party. Quantum Inf. Process. 10(1), 97–106 (2011)CrossRefMathSciNetMATH
23.
Zurück zum Zitat Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91(5), 508–508 (2003)CrossRef Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91(5), 508–508 (2003)CrossRef
24.
Zurück zum Zitat Somma, R.D., Hughes, R.J.: Security of decoy-state protocols for general photon-number-splitting attacks. Phys. Rev. A. 87(6), 1993–2001 (2013)CrossRef Somma, R.D., Hughes, R.J.: Security of decoy-state protocols for general photon-number-splitting attacks. Phys. Rev. A. 87(6), 1993–2001 (2013)CrossRef
25.
26.
Zurück zum Zitat Lin, S., Yu, C.H., Guo, G.D.: Reexamining the security of fair quantum blind signature schemes. Quantum Inf. Process. 13(11), 2407–2415 (2014)CrossRefMathSciNetMATH Lin, S., Yu, C.H., Guo, G.D.: Reexamining the security of fair quantum blind signature schemes. Quantum Inf. Process. 13(11), 2407–2415 (2014)CrossRefMathSciNetMATH
27.
29.
Zurück zum Zitat Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)CrossRefADS Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)CrossRefADS
30.
Zurück zum Zitat Damgard, I., Funder, J., Nielsen, J.B., et al.: Superposition attacks on cryptographic protocols. In: The 7th International Conference on Information Theoretic Security, pp. 142–161 (2013) Damgard, I., Funder, J., Nielsen, J.B., et al.: Superposition attacks on cryptographic protocols. In: The 7th International Conference on Information Theoretic Security, pp. 142–161 (2013)
31.
Zurück zum Zitat Ogawa, T., Sasaki, A., Iwamoto, M., Yamamoto, H.: Quantum secret sharing schemes and reversibility of quantum operations. Phys. Rev. A 72(3), 032318 (2005)CrossRefADS Ogawa, T., Sasaki, A., Iwamoto, M., Yamamoto, H.: Quantum secret sharing schemes and reversibility of quantum operations. Phys. Rev. A 72(3), 032318 (2005)CrossRefADS
Metadaten
Titel
Cryptanalysis and improvement of verifiable quantum (k, n) secret sharing
verfasst von
Xiuli Song
Yanbing Liu
Publikationsdatum
01.02.2016
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 2/2016
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-015-1199-2

Weitere Artikel der Ausgabe 2/2016

Quantum Information Processing 2/2016 Zur Ausgabe

Neuer Inhalt