Skip to main content
Erschienen in: Quantum Information Processing 11/2018

01.11.2018

Verifiable threshold quantum secret sharing with sequential communication

verfasst von: Changbin Lu, Fuyou Miao, Junpeng Hou, Keju Meng

Erschienen in: Quantum Information Processing | Ausgabe 11/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A (t, n) threshold quantum secret sharing (QSS) is proposed based on a single d-level quantum system. It enables the (t, n) threshold structure based on Shamir’s secret sharing and simply requires sequential communication in d-level quantum system to recover secret. Besides, the scheme provides a verification mechanism which employs an additional qudit to detect cheats and eavesdropping during secret reconstruction and allows a participant to use the share repeatedly. Analyses show that the proposed scheme is resistant to typical attacks. Moreover, the scheme is scalable in participant number and easier to realize compared to related schemes. More generally, our scheme also presents a generic method to construct new (t, n) threshold QSS schemes based on d-level quantum system from other classical threshold secret sharing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of national computer conference, New York, vol. 313 (1979) Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of national computer conference, New York, vol. 313 (1979)
4.
Zurück zum Zitat Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In: Public key cryptography-PKC., vol. 31, Springer, Berlin (2002) Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In: Public key cryptography-PKC., vol. 31, Springer, Berlin (2002)
5.
Zurück zum Zitat Harn, L.: Group-oriented (\(t\), \(n\)) threshold digital signature scheme and digital multisignature. IEEE Proc. Comput. Digit. Techn. 141(5), 307 (1994)CrossRef Harn, L.: Group-oriented (\(t\), \(n\)) threshold digital signature scheme and digital multisignature. IEEE Proc. Comput. Digit. Techn. 141(5), 307 (1994)CrossRef
6.
Zurück zum Zitat Liu, Y.N., Harn, L., Mao, L., Xiong, Z.: Full-healing group-key distribution in online social networks. Int. J. Secur. Netw. 11(1–2), 12 (2016)CrossRef Liu, Y.N., Harn, L., Mao, L., Xiong, Z.: Full-healing group-key distribution in online social networks. Int. J. Secur. Netw. 11(1–2), 12 (2016)CrossRef
7.
Zurück zum Zitat Desmedt, Y.G.: Threshold cryptography. Eur. Trans. Telecommun. 5(4), 449 (1994)CrossRef Desmedt, Y.G.: Threshold cryptography. Eur. Trans. Telecommun. 5(4), 449 (1994)CrossRef
8.
Zurück zum Zitat Patel, K.: Secure multiparty computation using secret sharing. In: International conference on signal processing, communication, power and embedded system, IEEE, p. 863 (2016) Patel, K.: Secure multiparty computation using secret sharing. In: International conference on signal processing, communication, power and embedded system, IEEE, p. 863 (2016)
9.
Zurück zum Zitat Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)ADSCrossRef Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)ADSCrossRef
11.
Zurück zum Zitat Yu, I.C., Lin, F.L., Huang, C.Y.: Quantum secret sharing with multilevel mutually (un) biased bases. Phys. Rev. A 78, 012344 (2008)ADSCrossRef Yu, I.C., Lin, F.L., Huang, C.Y.: Quantum secret sharing with multilevel mutually (un) biased bases. Phys. Rev. A 78, 012344 (2008)ADSCrossRef
12.
Zurück zum Zitat Bai, C.M., Li, Z.H., Xu, T.T., Li, Y.M.: Quantum secret sharing using the \(d\)-dimensional GHZ state. Quantum Inf. Process 16(3), 59 (2017)ADSMathSciNetCrossRef Bai, C.M., Li, Z.H., Xu, T.T., Li, Y.M.: Quantum secret sharing using the \(d\)-dimensional GHZ state. Quantum Inf. Process 16(3), 59 (2017)ADSMathSciNetCrossRef
13.
Zurück zum Zitat Tavakoli, A., Herbauts, I., Zukowski, M., Bourennane, M.: Secret sharing with a single \(d\)-level quantum system. Phys. Rev. A 92, 030302 (2015)ADSCrossRef Tavakoli, A., Herbauts, I., Zukowski, M., Bourennane, M.: Secret sharing with a single \(d\)-level quantum system. Phys. Rev. A 92, 030302 (2015)ADSCrossRef
14.
Zurück zum Zitat Hsu, L.Y.: Quantum secret-sharing protocol based on Grover’s algorithm. Phys. Rev. A 68, 022306 (2003)ADSCrossRef Hsu, L.Y.: Quantum secret-sharing protocol based on Grover’s algorithm. Phys. Rev. A 68, 022306 (2003)ADSCrossRef
17.
Zurück zum Zitat Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92, 030301 (2015)ADSMathSciNetCrossRef Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92, 030301 (2015)ADSMathSciNetCrossRef
18.
Zurück zum Zitat Yang, W., Huang, L., Shi, R., He, L.: Secret sharing based on quantum Fourier transform. Quantum Inf. Process 12(7), 2465 (2013)ADSMathSciNetCrossRef Yang, W., Huang, L., Shi, R., He, L.: Secret sharing based on quantum Fourier transform. Quantum Inf. Process 12(7), 2465 (2013)ADSMathSciNetCrossRef
19.
Zurück zum Zitat Lai, H., Luo, M.X., Pieprzyk, J., Li, T., Liu, Z.M., Orgun, M.A.: Large-capacity three-party quantum digital secret sharing using three particular matrices coding. Commun. Theor. Phys. 66(05), 501–508 (2016)ADSMathSciNetCrossRef Lai, H., Luo, M.X., Pieprzyk, J., Li, T., Liu, Z.M., Orgun, M.A.: Large-capacity three-party quantum digital secret sharing using three particular matrices coding. Commun. Theor. Phys. 66(05), 501–508 (2016)ADSMathSciNetCrossRef
20.
Zurück zum Zitat Kogias, I., Xiang, Y., He, Q.Y., Adesso, G.: Unconditional security of entanglement-based continuous-variable quantum secret sharing. Phys. Rev. A 95, 012315 (2017)ADSCrossRef Kogias, I., Xiang, Y., He, Q.Y., Adesso, G.: Unconditional security of entanglement-based continuous-variable quantum secret sharing. Phys. Rev. A 95, 012315 (2017)ADSCrossRef
21.
Zurück zum Zitat Tittel, W., Zbinden, H., Gisin, N.: Experimental demonstration of quantum secret sharing. Phys. Rev. A 63(4), 042301 (2001)ADSCrossRef Tittel, W., Zbinden, H., Gisin, N.: Experimental demonstration of quantum secret sharing. Phys. Rev. A 63(4), 042301 (2001)ADSCrossRef
22.
Zurück zum Zitat Schmidt, C., Trojek, P., Bourennane, M., Kurtsiefer, C., Zukowski, M., Weinfurter, H.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95, 230505 (2005)ADSCrossRef Schmidt, C., Trojek, P., Bourennane, M., Kurtsiefer, C., Zukowski, M., Weinfurter, H.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95, 230505 (2005)ADSCrossRef
23.
Zurück zum Zitat Chen, Y.A., Zhang, A.N., Zhao, Z., Zhou, X.Q., Lu, C.Y., Peng, C.Z.: Experimental quantum secret sharing and third-man quantum cryptography. Phys. Rev. Lett 95(20), 200502 (2005)ADSCrossRef Chen, Y.A., Zhang, A.N., Zhao, Z., Zhou, X.Q., Lu, C.Y., Peng, C.Z.: Experimental quantum secret sharing and third-man quantum cryptography. Phys. Rev. Lett 95(20), 200502 (2005)ADSCrossRef
24.
Zurück zum Zitat Lu, H., Zhang, Z., Chen, L.K., Li, Z.D., Liu, C., Li, L.: Secret sharing of a quantum state. Phys. Rev. Lett 117(3), 030501 (2016)ADSCrossRef Lu, H., Zhang, Z., Chen, L.K., Li, Z.D., Liu, C., Li, L.: Secret sharing of a quantum state. Phys. Rev. Lett 117(3), 030501 (2016)ADSCrossRef
25.
Zurück zum Zitat Lance, A.M., Symul, T., Bowen, W.P., Tyc, T., Sanders, B.C., Lam, P.K.: Continuous variable (2, 3) threshold quantum secret sharing schemes. New J. Phys. 5, 4 (2003)ADSMathSciNetCrossRef Lance, A.M., Symul, T., Bowen, W.P., Tyc, T., Sanders, B.C., Lam, P.K.: Continuous variable (2, 3) threshold quantum secret sharing schemes. New J. Phys. 5, 4 (2003)ADSMathSciNetCrossRef
26.
Zurück zum Zitat Lau, H.K., Weedbrook, C.: Quantum secret sharing with continuous-variable cluster states. Phys. Rev. A 88, 042313 (2013)ADSCrossRef Lau, H.K., Weedbrook, C.: Quantum secret sharing with continuous-variable cluster states. Phys. Rev. A 88, 042313 (2013)ADSCrossRef
27.
Zurück zum Zitat Wu, Y., Cai, R., He, G., Zhang, J.: Quantum secret sharing with continuous variable graph state. Quantum Inf. Process. 13, 1085 (2014)ADSMathSciNetCrossRef Wu, Y., Cai, R., He, G., Zhang, J.: Quantum secret sharing with continuous variable graph state. Quantum Inf. Process. 13, 1085 (2014)ADSMathSciNetCrossRef
28.
Zurück zum Zitat Rahaman, R., Parker, M.G.: Quantum scheme for secret sharing based on local distinguishability. Phys. Rev. A 91, 022330 (2015)ADSCrossRef Rahaman, R., Parker, M.G.: Quantum scheme for secret sharing based on local distinguishability. Phys. Rev. A 91, 022330 (2015)ADSCrossRef
29.
Zurück zum Zitat Yang, Y.H., Gao, F., Wu, X., Qin, S.J., Zuo, H.J., Wen, Q.Y.: Quantum secret sharing via local operations and classical communication. Sci. Rep. 5, 16967 (2015)ADSCrossRef Yang, Y.H., Gao, F., Wu, X., Qin, S.J., Zuo, H.J., Wen, Q.Y.: Quantum secret sharing via local operations and classical communication. Sci. Rep. 5, 16967 (2015)ADSCrossRef
30.
Zurück zum Zitat Wang, J., Li, L., Peng, H., Yang, Y.: Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Phys. Rev. A 95, 022320 (2017)ADSCrossRef Wang, J., Li, L., Peng, H., Yang, Y.: Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Phys. Rev. A 95, 022320 (2017)ADSCrossRef
31.
Zurück zum Zitat Tokunaga, Y., Okamoto, T., Imoto, N.: Threshold quantum cryptography. Phys. Rev. A 71, 012314 (2005)ADSCrossRef Tokunaga, Y., Okamoto, T., Imoto, N.: Threshold quantum cryptography. Phys. Rev. A 71, 012314 (2005)ADSCrossRef
32.
Zurück zum Zitat Qin, H., Zhu, X., Dai, Y.: (\(t\), \(n\)) Threshold quantum secret sharing using the phase shift operation. Quantum Inf. Process 14(8), 2997–3004 (2015)ADSMathSciNetCrossRef Qin, H., Zhu, X., Dai, Y.: (\(t\), \(n\)) Threshold quantum secret sharing using the phase shift operation. Quantum Inf. Process 14(8), 2997–3004 (2015)ADSMathSciNetCrossRef
33.
Zurück zum Zitat Song, X.L., Liu, Y.B., Deng, H.Y., Xiao, Y.G.: (\(t\), \(n\)) Threshold d-level quantum secret sharing. Sci. Rep. 7, 6366 (2017)ADSCrossRef Song, X.L., Liu, Y.B., Deng, H.Y., Xiao, Y.G.: (\(t\), \(n\)) Threshold d-level quantum secret sharing. Sci. Rep. 7, 6366 (2017)ADSCrossRef
34.
Zurück zum Zitat Lu, C.B., Miao, F.Y., Meng, K.J., Yu, Y.: Threshold quantum secret sharing based on single qubit. Quantum Inf. Process. 17(3), 64 (2018)ADSMathSciNetCrossRef Lu, C.B., Miao, F.Y., Meng, K.J., Yu, Y.: Threshold quantum secret sharing based on single qubit. Quantum Inf. Process. 17(3), 64 (2018)ADSMathSciNetCrossRef
35.
Zurück zum Zitat Lai, H., Zhang, J., Luo, M.X., Pan, L., Pieprzyk, J., Xiao, F.Y., Orgun, M.A.: Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman–Fibonacci tree coding. Sci. Rep. 6, 31350 (2016)ADSCrossRef Lai, H., Zhang, J., Luo, M.X., Pan, L., Pieprzyk, J., Xiao, F.Y., Orgun, M.A.: Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman–Fibonacci tree coding. Sci. Rep. 6, 31350 (2016)ADSCrossRef
37.
38.
Zurück zum Zitat Miao, F.Y., Xiong, Y., Wang, X.F., Badawy, M.: Randomized component and its application to (t, m, n)-group oriented secret sharing. IEEE Trans. Inf. Forensics Secur. 10(5), 889–899 (2015)CrossRef Miao, F.Y., Xiong, Y., Wang, X.F., Badawy, M.: Randomized component and its application to (t, m, n)-group oriented secret sharing. IEEE Trans. Inf. Forensics Secur. 10(5), 889–899 (2015)CrossRef
39.
Zurück zum Zitat Gao, F., Qin, S.J., Wen, Q.Y.: A simple participant attack on the Bradler–Dusek protocol. Quantum Inf. Comput. 7(4), 329 (2007)MathSciNetMATH Gao, F., Qin, S.J., Wen, Q.Y.: A simple participant attack on the Bradler–Dusek protocol. Quantum Inf. Comput. 7(4), 329 (2007)MathSciNetMATH
40.
Zurück zum Zitat He, G.P.: Comment on experimental single qubit quantum secret sharing. Phys. Rev. Lett. 98, 028901 (2007)ADSCrossRef He, G.P.: Comment on experimental single qubit quantum secret sharing. Phys. Rev. Lett. 98, 028901 (2007)ADSCrossRef
41.
42.
Zurück zum Zitat Massey, J.L.: Minimal codewords and secret sharing. In: Proceedings of the 6th joint Swedish–Russian international workshop on information theory. IEEE Press, Washington DC, vol. 276 (1993) Massey, J.L.: Minimal codewords and secret sharing. In: Proceedings of the 6th joint Swedish–Russian international workshop on information theory. IEEE Press, Washington DC, vol. 276 (1993)
43.
44.
Zurück zum Zitat Mignotte, M.: How to share a secret. In: Conference on cryptography, Springer, Berlin vol. 149, 371 (1982) Mignotte, M.: How to share a secret. In: Conference on cryptography, Springer, Berlin vol. 149, 371 (1982)
Metadaten
Titel
Verifiable threshold quantum secret sharing with sequential communication
verfasst von
Changbin Lu
Fuyou Miao
Junpeng Hou
Keju Meng
Publikationsdatum
01.11.2018
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 11/2018
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-018-2059-7

Weitere Artikel der Ausgabe 11/2018

Quantum Information Processing 11/2018 Zur Ausgabe

Neuer Inhalt