scholarly journals Two-Party secret key distribution via a modified quantum secret sharing protocol

2015 ◽  
Vol 23 (6) ◽  
pp. 7300 ◽  
Author(s):  
W. P. Grice ◽  
P. G. Evans ◽  
B. Lawrie ◽  
M. Legré ◽  
P. Lougovski ◽  
...  
2018 ◽  
Vol 32 (25) ◽  
pp. 1850294 ◽  
Author(s):  
Bingren Chen ◽  
Wei Yang ◽  
Liusheng Huang

A recent paper proposed a semi-quantum secret sharing (SQSS) scheme based on Bell states [A. Yin et al., Mod. Phys. Lett. B. https://doi.org/10.1142/S0217984917501500 ]. This protocol was presumed that only the sender has the quantum power and all participants perform classical operations. However, we find this protocol is not that secure as it is expected. We can utilize the intercept-resend method to attack this scheme. Then, we give an improvement strategy based on semi-quantum key distribution, which ensures that the new scheme resists the attack we have proposed.


2021 ◽  
pp. 2150156
Author(s):  
Tianqi Dou ◽  
Hongwei Liu ◽  
Jipeng Wang ◽  
Zhenhua Li ◽  
Wenxiu Qu ◽  
...  

Quantum communication plays an important role in quantum information science due to its unconditional security. In practical implementations, the users of each communication vary with the transmitted information, and hence not all users are required to participate in each communication round. Therefore, improving the flexibility and efficiency of the actual communication process is highly demanded. Here, we propose a theoretical quantum communication scheme that realizes secret key distribution for both the two-party quantum key distribution (QKD) and multi-party quantum secret sharing (QSS) modes. The sender, Alice, can freely select one or more users to share keys among all users, and nonactive users will not participate in the process of secret key sharing. Numerical simulations show the superiority of the proposed scheme in transmission distance and secure key rate. Consequently, the proposed scheme is valuable for secure quantum communication network scenarios.


2019 ◽  
Vol 35 (06) ◽  
pp. 2050024
Author(s):  
Chun-Wei Yang ◽  
Chia-Wei Tsai

In 2017, Qin and Dai [Quantum Inf. Process. 16, 64 (2017). https://doi.org/10.1007/s11128-017-1525-y ], proposed a dynamic quantum secret sharing (DQSS) scheme based on the d-dimensional state. However, as shown in this study, a malicious participant can reveal the secret key of other participants without being detected. Furthermore, this study identifies a security issue in Qin and Dai’s DQSS protocol pertaining to the honesty of a revoked participant. Without considering these security issues, the DQSS protocol could fail at providing secret-sharing function. Therefore, two improvements are proposed to circumvent these problems.


2016 ◽  
Vol 30 (02) ◽  
pp. 1550267 ◽  
Author(s):  
Yi Xiang ◽  
Zhi Wen Mo

In this paper, we proposed a three-party quantum secret sharing (QSS) scheme using four-dimensional three-particle entangled states. In this QSS scheme, each agent can obtain a shadow of the secret key by performing single-particle measurements. Compared with the existing QSS protocol, this scheme has high efficiency and can resist the eavesdropping attack and entangle-measuring attack, which using three-particle entangled states are based on four-dimensional Hilbert space.


2016 ◽  
Vol 30 (10) ◽  
pp. 1650130 ◽  
Author(s):  
Gan Gao ◽  
Yue Wang ◽  
Dong Wang

Based on the assumption of a perfect qubit, Boyer et al. proposed a novel semiquantum key distribution protocol [Phys. Rev. Lett. 99 (2007) 140501], in which quantum Alice shares a secret key with classical Bob. In this paper, we use Bell states to propose a multiparty semiquantum secret sharing (MSQSS) protocol, in which only the boss is quantum and all agents are classical. Classical agents are restricted to performing measurements in a computational basis and rearranging orders of qubits. Unless all classical agents collaborate, no subset of them can obtain the secret of the quantum boss. Also, we show that this proposed protocol is secure against eavesdropping.


2007 ◽  
Vol 24 (5) ◽  
pp. 1147-1150 ◽  
Author(s):  
Liu Wei-Tao ◽  
Liang Lin-Mei ◽  
Li Cheng-Zu ◽  
Yuan Jian-Min

2009 ◽  
Vol 07 (07) ◽  
pp. 1357-1362
Author(s):  
YU-GUANG YANG ◽  
WEI-FENG CAO ◽  
QIAO-YAN WEN

The participant attack is the most serious threat for quantum secret-sharing protocols. However, it is only during the transmission of quantum information carriers that attention is paid to this kind of attack in the existing quantum secret-sharing protocols. The security considerations of the secret reconstruction phase of quantum secret-sharing protocols against this kind of attack are neglected. We demonstrate our viewpoint by taking the scheme of Hillery, Buzěk, and Berthiaume (HBB) [Phys. Rev. A59 (1999) 18–29] as an example. By telling a lie in the reconstruction phase, a dishonest participant can easily attain the entire secret key instead of eavesdropping during the transmission awkwardly, whereas the honest one cannot judge whether the dishonest one tells the truth and the obtained secret random key is identical to what the secret distributor owns because of lack of verification mechanism in the HBB protocol. It is not difficult to find that almost all the quantum secret-sharing protocols have such disadvantages. Our viewpoint presented may be useful for the design of other similar protocols.


2017 ◽  
Vol 15 (04) ◽  
pp. 1750023 ◽  
Author(s):  
Hussein Abulkasim ◽  
Safwat Hamad ◽  
Amal Khalifa ◽  
Khalid El Bahnasy

Quantum secret sharing techniques allow two parties or more to securely share a key, while the same number of parties or less can efficiently deduce the secret key. In this paper, we propose an authenticated quantum secret sharing protocol, where a quantum dialogue protocol is adopted to authenticate the identity of the parties. The participants simultaneously authenticate the identity of each other based on parts of a prior shared key. Moreover, the whole prior shared key can be reused for deducing the secret data. Although the proposed scheme does not significantly improve the efficiency performance, it is more secure compared to some existing quantum secret sharing scheme due to the identity authentication process. In addition, the proposed scheme can stand against participant attack, man-in-the-middle attack, impersonation attack, Trojan-horse attack as well as information leaks.


Sign in / Sign up

Export Citation Format

Share Document