Quantum direct secret sharing using Bell state

2021 ◽  
Vol 18 (12) ◽  
pp. 125204
Author(s):  
Chen-Ming Bai ◽  
Sujuan Zhang ◽  
Lu Liu
Keyword(s):  
2007 ◽  
Vol 18 (03) ◽  
pp. 343-349 ◽  
Author(s):  
ZHONG-XIAO MAN ◽  
YUN-JIE XIA ◽  
ZHAN-JUN ZHANG

We propose a scheme to secret sharing of an unknown N-atom entangled state in driven cavity QED. The scheme needs only atomic Bell states as the quantum channels and joint Bell-state measurement is unnecessary. In addition, the scheme is insensitive to the cavity decay and the thermal field.


2019 ◽  
Vol 34 (27) ◽  
pp. 1950213 ◽  
Author(s):  
Chia-Wei Tsai ◽  
Chun-Wei Yang ◽  
Narn-Yih Lee

Quantum secret sharing protocol, which lets a master share a secret with his/her agents and the agents can recover the master’s secret when they collaborate, is an important research issue in the quantum information field. In order to make the quantum protocol more practical, the concept of semi-quantum protocol is advanced by Boyer et al. Based on this concept, many semi-quantum secret sharing protocols have been proposed. The various entanglement states (including Bell state, GHZ state and so on) were used to be the quantum resources in these SQSS protocols, except for W-state which is the other multi-qubit entanglement state and different from GHZ states. Therefore, this study wants to use the entanglement property of W-state to propose the first three-party SQSS protocol and analyze the proposed protocol is free from the well-known attacks.


2007 ◽  
Vol 05 (03) ◽  
pp. 335-342 ◽  
Author(s):  
CHUAN-JIA SHAN ◽  
ZHONG-XIAO MAN ◽  
YUN-JIE XIA ◽  
TANG-KUN LIU

We propose a protocol for implementing quantum secret sharing via EPR states in driven cavity QED. Both of the two receivers can read out the sender's secret if they cooperate. The protocol does not require the joint Bell-state measurement needed in the previous schemes. In the protocol the cavity is only virtually excited and thus the requirement on the quality factor of the cavity is greatly loosened.


2019 ◽  
Vol 33 (28) ◽  
pp. 1950347
Author(s):  
Gan Gao ◽  
Hong-Ru Song

In the paper [Mod. Phys. Lett. B 33 (2019) 1950023 ], Qin et al. proposed a three-party quantum secret sharing scheme based on [Formula: see text]-dimensional Bell states. We study the security of the proposed scheme and find that it is not secure, that is, one sharer can obtain Alice’s secret messages without the help of the other sharer.


2007 ◽  
Vol 18 (12) ◽  
pp. 1885-1901 ◽  
Author(s):  
ZHAN-JUN ZHANG ◽  
YI-MIN LIU ◽  
MING FANG ◽  
DONG WANG

A multiparty quantum secret sharing scheme based on Bell-state entanglement swapping [Z. J. Zhang and Z. X. Man (2005)] is generalized to the qutrit case, that is, with qutrit-pair entangled states we propose a multiparty quantum secret sharing (QSS) scheme of classical messages by swapping qutrit-state entanglement. The security of our scheme is analyzed and confirmed with respect to some attacks. Compared to the scheme being generalized, this scheme possesses the distinct advantages of higher code capacity and higher security. Moreover, the generalization of the scheme to the qudit case is also outined.


2021 ◽  
Vol 3 (3) ◽  
Author(s):  
Yu‐Guang Yang ◽  
Xiao‐Xiao Liu ◽  
Shang Gao ◽  
Yi‐Hua Zhou ◽  
Wei‐Min Shi ◽  
...  

2009 ◽  
Vol 9 (9&10) ◽  
pp. 879-898
Author(s):  
A. Fahmi

Recently, Zhang, Li and Guo (ZLG) suggested a new approach to quantum key distribution by using a shared Bell state which acts as quantum key in order to encode and decode classical information. Subsequently, others extended ZLG protocol to d-dimensional systems and to quantum secret sharing based on reusable GHZ states. However, Gao et al. have shown that if Eve employs a special strategy to attack, these protocols become insecure. Afterwards, they repair ZLG protocol so that their eavesdropping strategy becomes inefficient. In this paper, we investigate the security of ZLG quantum key distribution protocol and show that it is not secure against Eve's attacks and with probability of one half she gets all of the keys without being detected by the two parties. In this eavesdropping strategy, Eve transforms the previously shared Bell state between Alice and Bob to two Bell states among herself and the parties. Moreover, we briefly show that ZLG's repairing by Gao et al's is not efficient against of our attack and Eve can choose an appropriate rotation angle and measurement bases which help her to do eavesdropping. Afterwards, we discuss generalization of ZLG protocol to d-dimensional systems and show that with probability 1/d, Eve gets all of keys. We show that quantum secret sharing based on reusable GHZ states is also not secure and with probability one half, Eve gets all of keys. We repair them by going to higher dimensional shared EPR or GHZ states. Finally, we compare ZLG protocol with ours and show that the ZLG protocol and its extensions are less robust against the channel noise with respect to ours.


Author(s):  
Manoj Kumar

Verifiable secret sharing schemes are important in cloud computing environments. Thus a key can be distributed over many servers by threshold secret sharing mechanism. The key is then reconstructed when needed. Secret sharing has also been suggested for sensor networks where the links are liable to be tapped by sending the data in shares which makes the task of the eavesdropper harder. The security in such environments can be made greater by continuous changing of the way the shares are constructed. In the present paper we proposed a verifiable quantum -threshold secret sharing scheme using Lagrange interpolation and two qudit Bell state in -dimensional Hilbert space. As discussed in the second last section of this paper, the proposed scheme is enough secure against the fraud in secret share distribution phase as well as secret reconstruction phase.


2019 ◽  
Vol 33 (03) ◽  
pp. 1950023 ◽  
Author(s):  
Huawang Qin ◽  
Wallace K. S. Tang ◽  
Raylin Tso

A three-party quantum secret sharing scheme is proposed, in which the dealer uses the d-dimensional Bell state to distribute the secret, the participants perform the single-particle measurements to get their shares, and the dealer performs the Bell-basis measurements to check the eavesdropping. The main merit of our scheme is that the participants only need to measure the particles in one basis. Compared to the existing schemes in which the participants need to measure the particles in two bases, our scheme will be more practical.


Sign in / Sign up

Export Citation Format

Share Document