Cheating identifiable (k, n) threshold quantum secret sharing scheme

被引:13
|
作者
Yan, Chenhong [1 ]
Li, Zhihui [1 ]
Liu, Lu [1 ]
Lu, Dianjun [1 ]
机构
[1] Shaanxi Normal Univ, Coll Math & Stat, Xian 710119, Peoples R China
基金
中国国家自然科学基金;
关键词
TQSS; Cheating identifiable; d-level MUBs; Quantum state digital signature; TROJAN-HORSE ATTACKS; VERIFIABLE T; MULTIPARTY;
D O I
10.1007/s11128-021-03343-2
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Threshold quantum secret sharing (TQSS) is a quantum cryptography technique that is used to split and reconstruct secret information. It is an important tool for ensuring information security and data confidentiality in the quantum communication environment. TQSS is mainly used to solve the problems of absence and dishonesty among participants. However, most existing TQSS can only detect the fact that one or more of the participants are cheating, and they cannot identify who is the cheater. In this paper, we propose a cheating identifiable (k, n) TQSS scheme on a single d-level quantum system. The dealer, Alice, performs a unitary transformation on two identical initial quantum states and signs one of the states. Then, she sends them to the first participant. After the quantum message is validated, the first participant performs his particular unitary transformation on two quantum states. Our scheme employs the voting mechanism, which not only has the ability to identify cheaters but also resists several typical attacks as well as denial and forgery attacks.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Chenhong Yan
    Zhihui Li
    Lu Liu
    Dianjun Lu
    [J]. Quantum Information Processing, 2022, 21
  • [2] Applying cheating identifiable secret sharing scheme in multimedia security
    Zheng Ma
    Yan Ma
    Xiaohong Huang
    Manjun Zhang
    Yanxiao Liu
    [J]. EURASIP Journal on Image and Video Processing, 2020
  • [3] Applying cheating identifiable secret sharing scheme in multimedia security
    Ma, Zheng
    Ma, Yan
    Huang, Xiaohong
    Zhang, Manjun
    Liu, Yanxiao
    [J]. EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2020, 2020 (01)
  • [4] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Li, Fulin
    Hu, Hang
    Zhu, Shixin
    Yan, Jiayun
    Ding, Jian
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (07)
  • [5] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Fulin Li
    Hang Hu
    Shixin Zhu
    Jiayun Yan
    Jian Ding
    [J]. Quantum Information Processing, 21
  • [6] A (w, t, n)-weighted threshold dynamic quantum secret sharing scheme with cheating identification
    Li, Fulin
    Luo, Mei
    Zhu, Huihui
    Zhu, Shixin
    Pang, Binbin
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2023, 612
  • [7] Linear (k,n) secret sharing scheme with cheating detection
    Liu, Yanxiao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2115 - 2121
  • [8] Linear (k, n) secret sharing scheme with cheating detection
    Liu, Yan-xiao
    Wang, Zhi-xiao
    Yan, Wen-yao
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1943 - 1948
  • [9] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Prashanti, Guttikonda
    Bhat, Mundukur Nirupama
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (1) : 403 - 423
  • [10] Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
    Liu, Yanxiao
    Yang, Chingnung
    Wang, Yichuan
    Zhu, Lei
    Ji, Wenjiang
    [J]. INFORMATION SCIENCES, 2018, 453 : 21 - 29