Weighted Threshold Quantum Secret Sharing Based on the Chinese Remainder Theorem and the Phase Shift Operation

Author(s):  
Wei-Lun Yeoh ◽  
Xing-Yu Chen ◽  
Guo-Jyun Zeng ◽  
Yao-Hsin Chou
2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Yao-Hsin Chou ◽  
Guo-Jyun Zeng ◽  
Xing-Yu Chen ◽  
Shu-Yu Kuo

AbstractSecret sharing is a widely-used security protocol and cryptographic primitive in which all people cooperate to restore encrypted information. The characteristics of a quantum field guarantee the security of information; therefore, many researchers are interested in quantum cryptography and quantum secret sharing (QSS) is an important research topic. However, most traditional QSS methods are complex and difficult to implement. In addition, most traditional QSS schemes share classical information, not quantum information which makes them inefficient to transfer and share information. In a weighted threshold QSS method, each participant has each own weight, but assigning weights usually costs multiple quantum states. Quantum state consumption will therefore increase with the weight. It is inefficient and difficult, and therefore not able to successfully build a suitable agreement. The proposed method is the first attempt to build multiparty weighted threshold QSS method using single quantum particles combine with the Chinese remainder theorem (CRT) and phase shift operation. The proposed scheme allows each participant has its own weight and the dealer can encode a quantum state with the phase shift operation. The dividing and recovery characteristics of CRT offer a simple approach to distribute partial keys. The reversibility of phase shift operation can encode and decode the secret. The proposed weighted threshold QSS scheme presents the security analysis of external attacks and internal attacks. Furthermore, the efficiency analysis shows that our method is more efficient, flexible, and simpler to implement than traditional methods.


2008 ◽  
Vol 16 (20) ◽  
pp. 15469 ◽  
Author(s):  
K. Inoue ◽  
T. Ohashi ◽  
T. Kukita ◽  
K. Watanebe ◽  
S. Hayashi ◽  
...  

2011 ◽  
Vol 55 (4) ◽  
pp. 573-578 ◽  
Author(s):  
Qian Su ◽  
Rong-Hua Shi ◽  
Ying Guo ◽  
Moon Ho Lee

Entropy ◽  
2021 ◽  
Vol 23 (6) ◽  
pp. 716
Author(s):  
Zhao-Ying Jia ◽  
Jie Gu ◽  
Bing-Hong Li ◽  
Hua-Lei Yin ◽  
Zeng-Bing Chen

As an essential application of quantum mechanics in classical cryptography, quantum secret sharing has become an indispensable component of quantum internet. Recently, a differential phase shift quantum secret sharing protocol using a twin field has been proposed to break the linear rate-distance boundary. However, this original protocol has a poor performance over channels with asymmetric transmittances. To make it more practical, we present a differential phase shift quantum secret sharing protocol with asymmetric source intensities and give the security proof of our protocol against individual attacks. Taking finite-key effects into account, our asymmetric protocol can theoretically obtain the key rate two orders of magnitude higher than that of the original protocol when the difference in length between Alice’s channel and Bob’s is fixed at 14 km. Moreover, our protocol can provide a high key rate even when the difference is quite large and has great robustness against finite-key effects. Therefore, our work is meaningful for the real-life applications of quantum secret sharing.


2018 ◽  
Vol 32 (18) ◽  
pp. 1850197 ◽  
Author(s):  
Huawang Qin ◽  
Raylin Tso ◽  
Yuewei Dai

An efficient three-party quantum secret sharing scheme is proposed. The dealer uses the phase shift operation to encode the secret information into some EPR pairs. The members use the phase shift operation to decode the EPR pairs, and measure the EPR pairs to reconstruct the secret. Our scheme does not need the BB84 protocol or the decoy particles to protect the transmitted particles, and can use the phase shift operation to prevent the attacker from stealing secret information from the transmitted particles. So all the particles can be used to bring the secret information, and the utilization efficiency of the particles of 100% can be achieved. With the prevent technology, our scheme is more practical than the existing schemes.


Sign in / Sign up

Export Citation Format

Share Document