Advanced Search
Volume 43 Issue 1
Jan.  2021
Turn off MathJax
Article Contents
Yutao DU, Wansu BAO, Tan LI. Verifiable Quantum Secret Sharing Protocol Based on Secret Authentication[J]. Journal of Electronics & Information Technology, 2021, 43(1): 212-217. doi: 10.11999/JEIT190901
Citation: Yutao DU, Wansu BAO, Tan LI. Verifiable Quantum Secret Sharing Protocol Based on Secret Authentication[J]. Journal of Electronics & Information Technology, 2021, 43(1): 212-217. doi: 10.11999/JEIT190901

Verifiable Quantum Secret Sharing Protocol Based on Secret Authentication

doi: 10.11999/JEIT190901
  • Received Date: 2019-11-08
  • Rev Recd Date: 2020-08-04
  • Available Online: 2020-08-20
  • Publish Date: 2021-01-15
  • To solve the problem that Quantum Secret Sharing (QSS) protocol is difficult to resist inner-cheating attack, by utilizing the method of secret message authentication to present a general model of verifiable quantum secret sharing protocols, a new verification algorithm is proposed based on the two-particle transform of Bell states, and then a new verifiable quantum secret sharing protocol is proposed. Compared with the verification algorithms of the existing verifiable quantum secret sharing protocol, the new verification algorithm can not only resist effectively the typical attack strategies such as the inner-cheating attack, but also improves greatly the efficiency of the protocol, and has good scalability which can be combined with the existing quantum secret sharing protocols.

  • loading
  • SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612–613. doi: 10.1145/359168.359176
    DU Yutao and BAO Wansu. Dynamic quantum secret sharing protocol based on two-particle transform of Bell states[J]. Chinese Physics B, 2018, 27(8): 080304. doi: 10.1088/1674-1056/27/8/080304
    HILLERY M, BUŽEK V, and BERTHIAUME A. Quantum secret sharing[J]. Physical Review A, 1999, 59(3): 1829–1834. doi: 10.1103/PhysRevA.59.1829
    CLEVE R, GOTTESMAN D, and LO H K. How to share a quantum secret[J]. Physical Review Letters, 1999, 83(3): 648–651. doi: 10.1103/PhysRevLett.83.648
    CRÉPEAU C, GOTTESMAN D, and SMITH A. Secure multi-party quantum computation[C]. The 34th Annual ACM Symposium on Theory of Computing, Montréal, Canada, 2002: 643–652.
    GUO Guoping and GUO Guangcan. Quantum secret sharing without entanglement[J]. Physics Letters A, 2003, 310(4): 247–251. doi: 10.1016/S0375-9601(03)00074-4
    ZHANG Zhanjun. Multiparty quantum secret sharing of secure direct communication[J]. Physics Letters A, 2005, 342(1/2): 60–66.
    YAN Fengli and GAO Ting. Quantum secret sharing between multiparty and multiparty without entanglement[J]. Physical Review A, 2005, 72(1): 012304. doi: 10.1103/PhysRevA.72.012304
    LIU Hongwei, MA Haiqiang, WEI Kejin, et al. Multi-group dynamic quantum secret sharing with single photons[J]. Physics Letters A, 2016, 380(31/32): 2349–2353. doi: 10.1016/j.physleta.2016.05.032
    YANG Yuguang, TENG Yiwei, CHAI Haiping, et al. Verifiable quantum (k, n)-threshold secret key sharing[J]. International Journal of Theoretical Physics, 2011, 50(3): 792–798. doi: 10.1007/s10773-010-0616-7
    YANG Yuguang, JIA Xin, WANG Hongyang, et al. Verifiable quantum (k, n)-threshold secret sharing[J]. Quantum Information Processing, 2011, 11(6): 1619–1625. doi: 10.1007/s11128-011-0323-1
    SONG Yun, LI Zhihui, and LI Yongming. A dynamic multiparty quantum direct secret sharing based on generalized GHZ states[J]. Quantum Information Processing, 2018, 17(9): 244. doi: 10.1007/s11128-018-1970-2
    宋云. 基于GHZ态局域测量的量子秘密共享[J]. 电子学报, 2019, 47(7): 1443–1448. doi: 10.3969/j.issn.0372-2112.2019.07.007

    SONG Yun. Quantum secret sharing based on GHZ states local measurements[J]. Acta Electronica Sinica, 2019, 47(7): 1443–1448. doi: 10.3969/j.issn.0372-2112.2019.07.007
    DU Yutao and BAO Wansu. Multiparty quantum secret sharing scheme based on the phase shift operations[J]. Optics Communications, 2013, 308: 159–163. doi: 10.1016/j.optcom.2013.06.014
    LU Changbin, MIAO Fuyou, HOU Junpeng, et al. Verifiable threshold quantum secret sharing with sequential communication[J]. Quantum Information Processing, 2018, 17(11): 310. doi: 10.1007/s11128-018-2059-7
    BAI Chenming, LI Zhihui, and LI Yongming. Sequential quantum secret sharing using a single qudit[J]. Communications in Theoretical Physics, 2018, 69(5): 513–518. doi: 10.1088/0253-6102/69/5/513
    YE Chongqiang and YE Tianyu. Circular semi-quantum secret sharing using single particles[J]. Communications in Theoretical Physics, 2018, 70(6): 661–671. doi: 10.1088/0253-6102/70/6/661
    YANG Yuguang, GAO Shang, LI Dan, et al. Three-party quantum secret sharing against collective noise[J]. Quantum Information Processing, 2019, 18(7): 215. doi: 10.1007/s11128-019-2319-1
    WANG Yu, TIAN Caixing, SU Qi, et al. Measurement-device-independent quantum secret sharing and quantum conference based on Gaussian cluster state[J]. Science China Information Sciences, 2019, 62(7): 72501. doi: 10.1007/s11432-018-9705-x
    许娟, 陈汉武, 刘文杰, 等. 无纠缠量子秘密共享中酉操作的选择[J]. 中国科学: 信息科学, 2011, 54(9): 1837–1842. doi: 10.1007/s11432-011-4240-9

    XU Juan, CHEN Hanwu, LIU Wenjie, et al. Selection of unitary operations in quantum secret sharing without entanglement[J]. Science China Information Sciences, 2011, 54(9): 1837–1842. doi: 10.1007/s11432-011-4240-9
    黄鹏, 周南润, 刘晔. 基于多目标量子远程通信的秘密共享协议[J]. 通信学报, 2008, 29(3): 114–118. doi: 10.3321/j.issn:1000-436X.2008.03.018

    HUANG Peng, ZHOU Nanrun, and LIU Ye. Secret sharing protocol based on multi-target quantum teleportation[J]. Journal on Communications, 2008, 29(3): 114–118. doi: 10.3321/j.issn:1000-436X.2008.03.018
    魏春艳, 蔡晓秋, 王天银, 等. 基于量子不经意密钥传输的量子匿名认证密钥交换协议[J]. 电子与信息学报, 2020, 42(2): 341–347. doi: 10.11999/JEIT190679

    WEI Chunyan, CAI Xiaoqiu, WANG Tianyin, et al. Quantum anonymous authenticated key exchange protocol based on quantum oblivious Key transfer[J]. Journal of Electronics &Information Technology, 2020, 42(2): 341–347. doi: 10.11999/JEIT190679
    施荣华, 冯艳艳, 石金晶. 基于正则图上量子游走的仲裁量子签名方案[J]. 电子与信息学报, 2020, 42(1): 89–97. doi: 10.11999/JEIT190597

    SHI Ronghua, FENG Yanyan, and SHI Jinjing. Arbitrated quantum signature scheme with quantum walks on regular graphs[J]. Journal of Electronics &Information Technology, 2020, 42(1): 89–97. doi: 10.11999/JEIT190597
    李宏伟. 量子密钥分配协议的安全性分析[D]. [硕士论文], 解放军信息工程大学, 2009.

    LI Hongwei. Security proof of quantum key distribution[D]. [Master dissertation], PLA Information Engineering University, 2009.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Tables(1)

    Article Metrics

    Article views (1583) PDF downloads(94) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return