Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement

被引:0
|
作者
Fan He
Xiangjun Xin
Chaoyang Li
Fagen Li
机构
[1] Zhengzhou University of Light Industry,College of Software Engineering
[2] University of Electronic Science and Technology of China,School of Computer Science and Engineering
关键词
Secret sharing; Semi-quantum secret sharing; Double-controlled NOT attack; Bell states;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, Tian et al. (Quantum Inf. Process., 20(6), 217(2021)) proposed an efficient semi-quantum secret-sharing protocol of specific bits. In their protocol, the dealer can split a specific secret such that two classical agents can efficiently and corporately reconstruct the secret by applying the simple operations such as Z-base measurement and reflecting operation. The qubit efficiency of their protocol can be up to 50%. Unfortunately, according to our security analysis, their protocol is vulnerable to the eavesdropping attacks. We prove that the eavesdropper can steal the dealer’s secret without being detected by applying the double-controlled NOT attack (DCNA) to the quantum channels. Then, some improvements are proposed, which can overcome the security flaw of the old protocol. We prove the improved protocol has enhanced security against DCNA, intercept–resend attack, entangle–measure attack and Trojan horse attack. In particular, the security proof shows that inserting decoy photons into the quantum message and reordering the quantum sequence is very helpful in detecting the adversary’s entangle–measure attack, even the adversary uses two auxiliary probes to eavesdrop the quantum channel. Furthermore, the improved eavesdropping check strategy can effectively increase the length of the shared secret.
引用
收藏
相关论文
共 50 条
  • [41] Circular Semi-Quantum Secret Sharing Using Single Particles
    Ye, Chong-Qiang
    Ye, Tian-Yu
    COMMUNICATIONS IN THEORETICAL PHYSICS, 2018, 70 (06) : 661 - 671
  • [42] EFFICIENT KEY CONSTRUCTION ON SEMI-QUANTUM SECRET SHARING PROTOCOLS
    Yang, Chun-Wei
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2013, 11 (05)
  • [43] Circular Semi-Quantum Secret Sharing Using Single Particles
    叶崇强
    叶天语
    Communications in Theoretical Physics, 2018, 70 (12) : 661 - 671
  • [44] Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol
    Qin, Su-Juan
    Gao, Fei
    Wen, Qiao-Yan
    Zhu, Fu-Chen
    PHYSICAL REVIEW A, 2007, 76 (06):
  • [45] Security Proof of a Semi-Quantum Key Distribution Protocol
    Krawec, Walter O.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 686 - 690
  • [46] Cryptanalysis of a semi-quantum secret sharing scheme based on Bell states
    Gao, Gan
    Wang, Yue
    Wang, Dong
    MODERN PHYSICS LETTERS B, 2018, 32 (09):
  • [47] Intercept-Resend Attacks on Semi-quantum Secret Sharing and the Improvements
    Jason Lin
    Chun-Wei Yang
    Chia-Wei Tsai
    Tzonelih Hwang
    International Journal of Theoretical Physics, 2013, 52 : 156 - 162
  • [48] A novel semi-quantum secret sharing scheme using entangled states
    Yin, Ai Han
    Tong, Yan
    MODERN PHYSICS LETTERS B, 2018, 32 (22):
  • [49] Intercept-Resend Attacks on Semi-quantum Secret Sharing and the Improvements
    Lin, Jason
    Yang, Chun-Wei
    Tsai, Chia-Wei
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (01) : 156 - 162
  • [50] A Scalable and Flexible Multi-User Semi-Quantum Secret Sharing
    Cao, Gang
    Chen, Chen
    Jiang, Min
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND COMMUNICATION ENGINEERING (ICTCE 2018), 2018, : 28 - 32