Cheating identifiable (k, n) threshold quantum secret sharing scheme

被引:13
|
作者
Yan, Chenhong [1 ]
Li, Zhihui [1 ]
Liu, Lu [1 ]
Lu, Dianjun [1 ]
机构
[1] Shaanxi Normal Univ, Coll Math & Stat, Xian 710119, Peoples R China
基金
中国国家自然科学基金;
关键词
TQSS; Cheating identifiable; d-level MUBs; Quantum state digital signature; TROJAN-HORSE ATTACKS; VERIFIABLE T; MULTIPARTY;
D O I
10.1007/s11128-021-03343-2
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Threshold quantum secret sharing (TQSS) is a quantum cryptography technique that is used to split and reconstruct secret information. It is an important tool for ensuring information security and data confidentiality in the quantum communication environment. TQSS is mainly used to solve the problems of absence and dishonesty among participants. However, most existing TQSS can only detect the fact that one or more of the participants are cheating, and they cannot identify who is the cheater. In this paper, we propose a cheating identifiable (k, n) TQSS scheme on a single d-level quantum system. The dealer, Alice, performs a unitary transformation on two identical initial quantum states and signs one of the states. Then, she sends them to the first participant. After the quantum message is validated, the first participant performs his particular unitary transformation on two quantum states. Our scheme employs the voting mechanism, which not only has the ability to identify cheaters but also resists several typical attacks as well as denial and forgery attacks.
引用
收藏
页数:24
相关论文
共 50 条
  • [31] A rational hierarchical (t,n)-threshold quantum secret sharing scheme
    Li, Fulin
    Liu, Zhuo
    Liu, Li
    Zhu, Shixin
    [J]. QUANTUM INFORMATION PROCESSING, 2024, 23 (02)
  • [32] Cheating immune (2, n)-threshold visual secret sharing
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 216 - 228
  • [33] A new (k, n)-threshold secret sharing scheme and its extension
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 455 - 470
  • [34] A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (08) : 1808 - 1821
  • [35] Quantum Advantage of Threshold Changeable Secret Sharing Scheme
    Cheng, Xiaogang
    Guo, Ren
    Zhou, Changli
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2024, 63 (05)
  • [36] Cheating Immune Threshold Visual Secret Sharing
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. COMPUTER JOURNAL, 2010, 53 (09): : 1485 - 1496
  • [37] Cheater identifiable visual secret sharing scheme
    Gan Zhi & Chen Kefei1. Computer Science Department
    [J]. Journal of Systems Engineering and Electronics, 2005, (01) : 233 - 236
  • [38] Cheating detection and cheater identification in (t, n) secret sharing scheme
    Wang, Zhixiao
    Liu, Yanxiao
    Yan, Wenyao
    Wei, Wei
    Li, Junhuai
    Zhang, Deyun
    Alfandi, Omar
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2014, 29 (01): : 87 - 93
  • [39] A Scheme of Rational Secret Sharing against Cheating
    Cai, Yongquan
    Shi, Huili
    [J]. PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 166 - 169
  • [40] A Scheme of Rational Secret Sharing Against Cheating
    Cai Yong-quan
    Shi Hui-li
    [J]. INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 60 - 64