A Verifiable Threshold Quantum Secret Sharing Scheme Using Interpolation Method

Author(s):  
Manoj Kumar

Verifiable secret sharing schemes are important in cloud computing environments. Thus a key can be distributed over many servers by threshold secret sharing mechanism. The key is then reconstructed when needed. Secret sharing has also been suggested for sensor networks where the links are liable to be tapped by sending the data in shares which makes the task of the eavesdropper harder. The security in such environments can be made greater by continuous changing of the way the shares are constructed. In the present paper we proposed a verifiable quantum -threshold secret sharing scheme using Lagrange interpolation and two qudit Bell state in -dimensional Hilbert space. As discussed in the second last section of this paper, the proposed scheme is enough secure against the fraud in secret share distribution phase as well as secret reconstruction phase.

2019 ◽  
Vol 33 (28) ◽  
pp. 1950347
Author(s):  
Gan Gao ◽  
Hong-Ru Song

In the paper [Mod. Phys. Lett. B 33 (2019) 1950023 ], Qin et al. proposed a three-party quantum secret sharing scheme based on [Formula: see text]-dimensional Bell states. We study the security of the proposed scheme and find that it is not secure, that is, one sharer can obtain Alice’s secret messages without the help of the other sharer.


2007 ◽  
Vol 18 (12) ◽  
pp. 1885-1901 ◽  
Author(s):  
ZHAN-JUN ZHANG ◽  
YI-MIN LIU ◽  
MING FANG ◽  
DONG WANG

A multiparty quantum secret sharing scheme based on Bell-state entanglement swapping [Z. J. Zhang and Z. X. Man (2005)] is generalized to the qutrit case, that is, with qutrit-pair entangled states we propose a multiparty quantum secret sharing (QSS) scheme of classical messages by swapping qutrit-state entanglement. The security of our scheme is analyzed and confirmed with respect to some attacks. Compared to the scheme being generalized, this scheme possesses the distinct advantages of higher code capacity and higher security. Moreover, the generalization of the scheme to the qudit case is also outined.


2019 ◽  
Vol 33 (03) ◽  
pp. 1950023 ◽  
Author(s):  
Huawang Qin ◽  
Wallace K. S. Tang ◽  
Raylin Tso

A three-party quantum secret sharing scheme is proposed, in which the dealer uses the d-dimensional Bell state to distribute the secret, the participants perform the single-particle measurements to get their shares, and the dealer performs the Bell-basis measurements to check the eavesdropping. The main merit of our scheme is that the participants only need to measure the particles in one basis. Compared to the existing schemes in which the participants need to measure the particles in two bases, our scheme will be more practical.


2011 ◽  
Vol 130-134 ◽  
pp. 291-294
Author(s):  
Guang Liang Liu ◽  
Sheng Xian Xie ◽  
Wei Fu

On the elliptic curve cryptosystem proposed a new multi-proxy signature scheme - (t, k, n) threshold blind proxy signature scheme.In new program blind proxy signature and (t,k,n) threshold secret sharing scheme will be combined, and will not over-concentration of the rights of the blind proxy signer .Computation of the program is small, security is high, the achieve efficiency and the utility is better .can prevent a malicious user's forgery attack and have the security properties of proxy signature.


2012 ◽  
Vol 10 (03) ◽  
pp. 1250031 ◽  
Author(s):  
JUAN XU ◽  
HANWU CHEN ◽  
ZHIHAO LIU

Based on an orthogonal set of product states of two three-state particles, a new quantum secret sharing scheme is proposed, which uses a novel distribution strategy so that continuous and independent measurements, rather than particle-wise coordinated ones, are performed. As a result, it is convenient and efficient to implement. The scheme is also secure against several common attacks and gets rid of partial-information leakage due to the revised coding method. Moreover, the quantitative analysis shows that the security can be further improved by using more product states from appropriate multiple sets.


Sign in / Sign up

Export Citation Format

Share Document