On Quantum Secret Sharing via Chinese Remainder Theorem with the Non-maximally Entanglement State Analysis

2012 ◽  
Vol 52 (2) ◽  
pp. 539-548 ◽  
Author(s):  
Ronghua Shi ◽  
Geli Lv ◽  
Yuan Wang ◽  
Dazu Huang ◽  
Ying Guo
2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Yao-Hsin Chou ◽  
Guo-Jyun Zeng ◽  
Xing-Yu Chen ◽  
Shu-Yu Kuo

AbstractSecret sharing is a widely-used security protocol and cryptographic primitive in which all people cooperate to restore encrypted information. The characteristics of a quantum field guarantee the security of information; therefore, many researchers are interested in quantum cryptography and quantum secret sharing (QSS) is an important research topic. However, most traditional QSS methods are complex and difficult to implement. In addition, most traditional QSS schemes share classical information, not quantum information which makes them inefficient to transfer and share information. In a weighted threshold QSS method, each participant has each own weight, but assigning weights usually costs multiple quantum states. Quantum state consumption will therefore increase with the weight. It is inefficient and difficult, and therefore not able to successfully build a suitable agreement. The proposed method is the first attempt to build multiparty weighted threshold QSS method using single quantum particles combine with the Chinese remainder theorem (CRT) and phase shift operation. The proposed scheme allows each participant has its own weight and the dealer can encode a quantum state with the phase shift operation. The dividing and recovery characteristics of CRT offer a simple approach to distribute partial keys. The reversibility of phase shift operation can encode and decode the secret. The proposed weighted threshold QSS scheme presents the security analysis of external attacks and internal attacks. Furthermore, the efficiency analysis shows that our method is more efficient, flexible, and simpler to implement than traditional methods.


2011 ◽  
Vol 55 (4) ◽  
pp. 573-578 ◽  
Author(s):  
Qian Su ◽  
Rong-Hua Shi ◽  
Ying Guo ◽  
Moon Ho Lee

2019 ◽  
Vol 34 (27) ◽  
pp. 1950213 ◽  
Author(s):  
Chia-Wei Tsai ◽  
Chun-Wei Yang ◽  
Narn-Yih Lee

Quantum secret sharing protocol, which lets a master share a secret with his/her agents and the agents can recover the master’s secret when they collaborate, is an important research issue in the quantum information field. In order to make the quantum protocol more practical, the concept of semi-quantum protocol is advanced by Boyer et al. Based on this concept, many semi-quantum secret sharing protocols have been proposed. The various entanglement states (including Bell state, GHZ state and so on) were used to be the quantum resources in these SQSS protocols, except for W-state which is the other multi-qubit entanglement state and different from GHZ states. Therefore, this study wants to use the entanglement property of W-state to propose the first three-party SQSS protocol and analyze the proposed protocol is free from the well-known attacks.


2019 ◽  
Vol 10 (1) ◽  
pp. 189
Author(s):  
Ye Kang ◽  
Ying Guo ◽  
Hai Zhong ◽  
Guojun Chen ◽  
Xiaojun Jing

The dishonest participants have many advantages to gain others’ shares by cheating in quantum secret sharing (QSS) protocols. However, the traditional methods such as identity authentication and message authentication can not resolve this problem due to the reason that the share has already been released to dishonest participants before realizing the deception. In this paper, a continuous variable QSS (CVQSS) scheme is proposed with fairness which ensures all participants can acquire or can not acquire the secret simultaneously. The quantum channel based on two-mode squeezing states provides secure communications through which it can send shares successfully, as long as setting the squeezing and modulation parameters according to the quantum channel transmission efficiency and the Shannon information of shares. In addition, the Chinese Remainder Theorem (CRT) can provides tunable threshold structures according to demands of the complex quantum network and the strategy for fairness can be incorporated with other sharing schemes, resulting in perfect compatibility for practical implementations.


Sign in / Sign up

Export Citation Format

Share Document