Cryptanalysis and improvement of the novel semi-quantum secret sharing scheme based on Bell states

2018 ◽  
Vol 32 (25) ◽  
pp. 1850294 ◽  
Author(s):  
Bingren Chen ◽  
Wei Yang ◽  
Liusheng Huang

A recent paper proposed a semi-quantum secret sharing (SQSS) scheme based on Bell states [A. Yin et al., Mod. Phys. Lett. B. https://doi.org/10.1142/S0217984917501500 ]. This protocol was presumed that only the sender has the quantum power and all participants perform classical operations. However, we find this protocol is not that secure as it is expected. We can utilize the intercept-resend method to attack this scheme. Then, we give an improvement strategy based on semi-quantum key distribution, which ensures that the new scheme resists the attack we have proposed.

2018 ◽  
Vol 32 (09) ◽  
pp. 1850117 ◽  
Author(s):  
Gan Gao ◽  
Yue Wang ◽  
Dong Wang

In the paper [Mod. Phys. Lett. B 31 (2017) 1750150], Yin et al. proposed a semi-quantum secret sharing scheme by using Bell states. We find that the proposed scheme cannot finish the quantum secret sharing task. In addition, we also find that the proposed scheme has a security loophole, that is, it will not be detected that the dishonest participant, Charlie attacks on the quantum channel.


2019 ◽  
Vol 33 (28) ◽  
pp. 1950347
Author(s):  
Gan Gao ◽  
Hong-Ru Song

In the paper [Mod. Phys. Lett. B 33 (2019) 1950023 ], Qin et al. proposed a three-party quantum secret sharing scheme based on [Formula: see text]-dimensional Bell states. We study the security of the proposed scheme and find that it is not secure, that is, one sharer can obtain Alice’s secret messages without the help of the other sharer.


2019 ◽  
Vol 33 (04) ◽  
pp. 1950045 ◽  
Author(s):  
Qijian He ◽  
Wei Yang ◽  
Bingren Chen ◽  
Liusheng Huang

A semi-quantum secret sharing scheme using entangled states was proposed in a recent paper [Mod. Phys. Lett. B 32 (2018) 1850256. https://doi.org/10.1142/S0217984918502561 ]. We find a loophole of this scheme. Based on the intercept-resend attack, we propose a deterministic attack strategy and a probabilistic attack strategy. The malicious participant can escape the detection and obtains the secret. We also suggest two improvements to help increase the security of the original scheme.


2017 ◽  
Vol 31 (13) ◽  
pp. 1750150 ◽  
Author(s):  
Aihan Yin ◽  
Zefan Wang ◽  
Fangbo Fu

A semi-quantum secret sharing (SQSS) scheme based on Bell states is proposed in this paper. The sender who can perform any relevant quantum operations uses Bell states to share the secret keys with her participants that are limited to perform classical operations on the transmitted qubits. It is found that our scheme is easy to generalize from three parties to multiparty and more efficient than the previous schemes [Q. Li, W. H. Chan and D. Y. Long, Phys. Rev. A 82 (2010) 022303; L. Z. Li, D. W. Qiu and P. Mateus, J. Phys. A: Math. Theor. 26 (2013) 045304; C. Xie, L. Z. Li and D. W. Qiu, Int. J. Theor. Phys. 54 (2015) 3819].


2018 ◽  
Vol 16 (03) ◽  
pp. 1850030 ◽  
Author(s):  
Gan Gao

In the paper [H. Abulkasim et al., Int. J. Quantum Inform. 15 (2017) 1750023], Abulkasim et al. proposed a quantum secret sharing scheme based on Bell states. We study the security of the multiparty case in the proposed scheme and detect that it is not secure. In the paper [Y. Du and W. Bao, Opt. Commun. 308 (2013) 159], Du and Bao listed Gao’s scheme and gave a attack strategy on the listed scheme. We point out that their listing scheme is not the genuine Gao’s scheme and their research method is not advisable.


2007 ◽  
Vol 18 (02) ◽  
pp. 177-185 ◽  
Author(s):  
ZHONG-XIAO MAN ◽  
YUN-JIE XIA ◽  
ZHAN-JUN ZHANG

In this paper, we propose a scheme of many-agent controlled multi-player quantum secret sharing. The players are some filed performers to implement a task by using the secret messages from a supremo, while the agents may be the players' superiors who hold the controls also from the supremo and can manipulate the task by using the controls. In the scheme only Bell states are employed and need to be identified, which implies that it is more easily implemented with today's technique.


2012 ◽  
Vol 26 (20) ◽  
pp. 1250122 ◽  
Author(s):  
TIAN-YIN WANG ◽  
XIAO-QIU CAI

We present a multiparty quantum secret sharing scheme of classical information with Bell states and decoy states. This scheme can save a lot of photons because eavesdropping checks are performed only twice; in addition, it has the advantage of high intrinsic efficiency for qubits because every Bell states can generate two bits of classical secret information; moreover, only the dealer and one of the agents are required to store photons; most important of all, this scheme can resist all the attacks that have been proposed.


Sign in / Sign up

Export Citation Format

Share Document