Dual Compressible Hybrid Quantum Secret Sharing Schemes based on Extended Unitary Operations

被引:0
|
作者
Lai, Hong [1 ,2 ]
Orgun, Mehmet A. [1 ]
Xue, Liyin [3 ]
Xiao, Jinghua [2 ]
Pieprzyk, Josef [1 ]
机构
[1] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
[2] Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China
[3] Australian Tax Off, Corp Anal, Sydney, NSW 2000, Australia
来源
基金
中国国家自然科学基金;
关键词
dual compressible hybrid quantum secret sharing schemes; extended unitary operations; access structure; ((m+1; n; threshold; adversary structure; SECURE DIRECT COMMUNICATION; MULTIPARTY;
D O I
10.1117/12.2052886
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A crucial issue with hybrid quantum secret sharing schemes is the amount of data that is allocated to the participants. The smaller the amount of allocated data, the better the performance of a scheme. Moreover, quantum data is very hard and expensive to deal with, therefore, it is desirable to use as little quantum data as possible. To achieve this goal, we first construct extended unitary operations by the tensor product of n, n >= 2, basic unitary operations, and then by using those extended operations, we design two quantum secret sharing schemes. The resulting dual compressible hybrid quantum secret sharing schemes, in which classical data play a complementary role to quantum data, range from threshold to access structure. Compared with the existing hybrid quantum secret sharing schemes, our proposed schemes not only reduce the number of quantum participants, but also the number of particles and the size of classical shares. To be exact, the number of particles that are used to carry quantum data is reduced to 1 while the size of classical secret shares also is also reduced to 1-2/m-1 based on ((m + 1, n')) threshold and to (where r(2) is the number of maximal unqualified sets) based on adversary structure. Consequently, our proposed schemes can greatly reduce the cost and difficulty of generating and storing EPR pairs and lower the risk of transmitting encoded particles.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Quantum secret sharing schemes and reversibility of quantum operations
    Ogawa, T
    Sasaki, A
    Iwamoto, M
    Yamamoto, H
    PHYSICAL REVIEW A, 2005, 72 (03)
  • [2] Quantum Secret Sharing Based on Entanglement without Local Unitary Operations
    Yang, Yunyan
    Yin, Guisheng
    Deng, Tingquan
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 619 - +
  • [3] Selection of unitary operations in quantum secret sharing without entanglement
    Juan Xu
    HanWu Chen
    WenJie Liu
    ZhiHao Liu
    Science China Information Sciences, 2011, 54 : 1837 - 1842
  • [4] Selection of unitary operations in quantum secret sharing without entanglement
    Xu Juan
    Chen HanWu
    Liu WenJie
    Liu ZhiHao
    SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (09) : 1837 - 1842
  • [5] Selection of unitary operations in quantum secret sharing without entanglement
    XU Juan 1
    2 School of Computer and Software
    ScienceChina(InformationSciences), 2011, 54 (09) : 1837 - 1842
  • [6] Two secret sharing schemes based on Boolean operations
    Wang, Daoshun
    Zhang, Lei
    Ma, Ning
    Li, Xiaobo
    PATTERN RECOGNITION, 2007, 40 (10) : 2776 - 2785
  • [7] Unitary reconstruction of secret for stabilizer-based quantum secret sharing
    Matsumoto, Ryutaroh
    QUANTUM INFORMATION PROCESSING, 2017, 16 (08)
  • [8] Unitary reconstruction of secret for stabilizer-based quantum secret sharing
    Ryutaroh Matsumoto
    Quantum Information Processing, 2017, 16
  • [9] Quantum secret sharing and quantum operations
    Xiao, Heling
    Guo, Wangmei
    Wang, Xiao
    International Journal of Computer Science Issues, 2012, 9 (5 5-3): : 103 - 107
  • [10] Secret sharing schemes based on the dual of Golay codes
    Ding, Jian
    Lin, Changlu
    Mesnager, Sihem
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2021, 13 (06): : 1025 - 1041