A quantum secret sharing scheme with verifiable function

被引:14
|
作者
Liu, Li-Juan [1 ]
Li, Zhi-Hui [1 ]
Han, Zhao-Wei [1 ]
Zhi, Dan-Li [1 ]
机构
[1] Shaanxi Normal Univ, Coll Math & Informat Sci, Xian 710119, Peoples R China
来源
EUROPEAN PHYSICAL JOURNAL D | 2020年 / 74卷 / 07期
基金
中国国家自然科学基金;
关键词
MULTIPARTY;
D O I
10.1140/epjd/e2020-10010-3
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In the (t,n) threshold quantum secret sharing scheme, it is difficult to ensure that internal participants are honest. In this paper, a verifiable (t,n) threshold quantum secret sharing scheme is designed to combine with classical secret sharing scheme. First of all, the distributor uses the asymmetric binary polynomial to generate the shares and sends them to each participant. Secondly, the distributor sends the initial quantum state with the secret to the first participant, and each participant performs unitary operation that uses the mutually unbiased bases on the obtainedddimension single bit quantum state (dis a large odd prime number). In this process, distributor can randomly check the participants, and find out the internal fraudsters. Then the secret is reconstructed after all other participants publicly transmit it at the same time. The analysis of this scheme includes correctness analysis, completeness analysis and security analysis. And the security analysis shows that the scheme can resist both external and internal attacks.
引用
下载
收藏
页数:8
相关论文
共 50 条
  • [21] Verifiable Secret Sharing Scheme Using Hash Values
    Imai, Junta
    Mimura, Mamoru
    Tanaka, Hidema
    2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 405 - 409
  • [22] A Verifiable E-voting Scheme with Secret Sharing
    Yuan, Lifeng
    Li, Mingchu
    Guo, Cheng
    Hu, Weitong
    Tan, Xing
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 304 - 308
  • [23] A verifiable threshold secret sharing scheme based on lattices
    Rajabi, Bahman
    Eslami, Ziba
    INFORMATION SCIENCES, 2019, 501 : 655 - 661
  • [24] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [25] Verifiable Secret Sharing Scheme on Images using Watermarking
    Roy, Chitradeep Dutta
    Choudhury, Neel
    Chatterjee, Amrik
    Adhikari, Avishek
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (02): : 76 - 81
  • [27] Verifiable Rational Secret Sharing Scheme in Mobile Networks
    Zhang, En
    Yuan, Peiyan
    Du, Jiao
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [28] Secure and verifiable vector space secret sharing scheme
    Xiao, QH
    Ping, LD
    Pan, XZ
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 689 - 693
  • [29] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [30] Proactive Verifiable Linear Integer Secret Sharing Scheme
    Ma, Chuangui
    Ding, Xiaofei
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 439 - 448