scholarly journals Differential-phase-shift quantum secret sharing

2008 ◽  
Vol 16 (20) ◽  
pp. 15469 ◽  
Author(s):  
K. Inoue ◽  
T. Ohashi ◽  
T. Kukita ◽  
K. Watanebe ◽  
S. Hayashi ◽  
...  
Entropy ◽  
2021 ◽  
Vol 23 (6) ◽  
pp. 716
Author(s):  
Zhao-Ying Jia ◽  
Jie Gu ◽  
Bing-Hong Li ◽  
Hua-Lei Yin ◽  
Zeng-Bing Chen

As an essential application of quantum mechanics in classical cryptography, quantum secret sharing has become an indispensable component of quantum internet. Recently, a differential phase shift quantum secret sharing protocol using a twin field has been proposed to break the linear rate-distance boundary. However, this original protocol has a poor performance over channels with asymmetric transmittances. To make it more practical, we present a differential phase shift quantum secret sharing protocol with asymmetric source intensities and give the security proof of our protocol against individual attacks. Taking finite-key effects into account, our asymmetric protocol can theoretically obtain the key rate two orders of magnitude higher than that of the original protocol when the difference in length between Alice’s channel and Bob’s is fixed at 14 km. Moreover, our protocol can provide a high key rate even when the difference is quite large and has great robustness against finite-key effects. Therefore, our work is meaningful for the real-life applications of quantum secret sharing.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Yao-Hsin Chou ◽  
Guo-Jyun Zeng ◽  
Xing-Yu Chen ◽  
Shu-Yu Kuo

AbstractSecret sharing is a widely-used security protocol and cryptographic primitive in which all people cooperate to restore encrypted information. The characteristics of a quantum field guarantee the security of information; therefore, many researchers are interested in quantum cryptography and quantum secret sharing (QSS) is an important research topic. However, most traditional QSS methods are complex and difficult to implement. In addition, most traditional QSS schemes share classical information, not quantum information which makes them inefficient to transfer and share information. In a weighted threshold QSS method, each participant has each own weight, but assigning weights usually costs multiple quantum states. Quantum state consumption will therefore increase with the weight. It is inefficient and difficult, and therefore not able to successfully build a suitable agreement. The proposed method is the first attempt to build multiparty weighted threshold QSS method using single quantum particles combine with the Chinese remainder theorem (CRT) and phase shift operation. The proposed scheme allows each participant has its own weight and the dealer can encode a quantum state with the phase shift operation. The dividing and recovery characteristics of CRT offer a simple approach to distribute partial keys. The reversibility of phase shift operation can encode and decode the secret. The proposed weighted threshold QSS scheme presents the security analysis of external attacks and internal attacks. Furthermore, the efficiency analysis shows that our method is more efficient, flexible, and simpler to implement than traditional methods.


2009 ◽  
Vol 11 (4) ◽  
pp. 045020 ◽  
Author(s):  
Lijun Ma ◽  
S Nam ◽  
Hai Xu ◽  
B Baek ◽  
Tiejun Chang ◽  
...  

2009 ◽  
Vol 282 (14) ◽  
pp. 3037-3039 ◽  
Author(s):  
Huani Zhang ◽  
Jindong Wang ◽  
Xiaobao Liu ◽  
Zhengjun Wei ◽  
Songhao Liu

2016 ◽  
Vol 37 (4) ◽  
Author(s):  
Manisha Bharti ◽  
Ajay K. Sharma ◽  
Manoj Kumar

AbstractThis paper focuses on increasing the number of subscribers in optical code-division multiple access (OCDMA) system by using one of the features of light signal that it can be propagated in two polarization states. The performance of two-dimensional (2D) OCDMA system based on wavelength-time coding scheme by adding polarization state is investigated at varying data rates from 1 GHz to 6 GHz and for various modulation formats. It is reported that with increase in data rate of system, the performance of the system deteriorates due to polarization mode dispersion. Non-return to-zero (RZ), return to-zero (RZ), carrier suppressed return-to-zero (CSRZ) and differential phase shift keying (DPSK) modulation formats are simulated for a single user system with polarization. Investigations reveal that differential phase shift keying (DPSK) modulation format suits best to the proposed system and exhibit the potential to improve the flexibility of system for more number of users. The investigations are reported in terms of Q-factor, BER, received optical power (ROP) and eye diagrams.


Sign in / Sign up

Export Citation Format

Share Document