A quantum secret sharing scheme with verifiable function

被引:14
|
作者
Liu, Li-Juan [1 ]
Li, Zhi-Hui [1 ]
Han, Zhao-Wei [1 ]
Zhi, Dan-Li [1 ]
机构
[1] Shaanxi Normal Univ, Coll Math & Informat Sci, Xian 710119, Peoples R China
来源
EUROPEAN PHYSICAL JOURNAL D | 2020年 / 74卷 / 07期
基金
中国国家自然科学基金;
关键词
MULTIPARTY;
D O I
10.1140/epjd/e2020-10010-3
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In the (t,n) threshold quantum secret sharing scheme, it is difficult to ensure that internal participants are honest. In this paper, a verifiable (t,n) threshold quantum secret sharing scheme is designed to combine with classical secret sharing scheme. First of all, the distributor uses the asymmetric binary polynomial to generate the shares and sends them to each participant. Secondly, the distributor sends the initial quantum state with the secret to the first participant, and each participant performs unitary operation that uses the mutually unbiased bases on the obtainedddimension single bit quantum state (dis a large odd prime number). In this process, distributor can randomly check the participants, and find out the internal fraudsters. Then the secret is reconstructed after all other participants publicly transmit it at the same time. The analysis of this scheme includes correctness analysis, completeness analysis and security analysis. And the security analysis shows that the scheme can resist both external and internal attacks.
引用
下载
收藏
页数:8
相关论文
共 50 条
  • [11] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [12] Publicly verifiable function secret sharing
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Jian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (04) : 526 - 535
  • [13] A New, Publicly Verifiable, Secret Sharing Scheme
    Behnad, A.
    Eghlidos, T.
    SCIENTIA IRANICA, 2008, 15 (02) : 246 - 251
  • [14] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [15] Design and analysis of a verifiable secret sharing scheme
    Li, Hui-Xian
    Cai, Wan-Dong
    Pei, Qing-Qi
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2008, 35 (01): : 148 - 151
  • [16] Efficient verifiable multi-secret sharing scheme based on hash function
    Shao, Jun
    INFORMATION SCIENCES, 2014, 278 : 104 - 109
  • [17] Verifiable Quantum Secret Sharing Protocol Based on Secret Authentication
    Du Yutao
    Bao Wansu
    Li Tan
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (01) : 212 - 217
  • [18] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [19] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [20] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465