Two Quantum Secret Sharing Schemes with Adversary Structure

被引:0
|
作者
Tingting Wu
Shixin Zhu
Fulin Li
Li Liu
机构
[1] HeFei University of Technology,School of Mathematics
[2] Intelligent Interconnected Systems Laboratory of Anhui Province,undefined
关键词
Quantum secret sharing; Adversary structure; GHZ state; Unitary operation;
D O I
暂无
中图分类号
学科分类号
摘要
Quantum secret sharing is an important technology in quantum cryptography, and it is used in the fields of secure multiparty computation, quantum auction and fiber network configuration. In this paper, we construct two quantum secret sharing schemes with adversary structure by using three-qudit GHZ state and three qubits. In the proposed scheme, the dealer first generates the private keys based on the adversary structure, then the participants in authorized subset use their private keys to perform the unitary operations on the quantum state and recover the original secret. The security analysis shows the attacks of intercept-and-resend, entangle-and-measure and participant are impossible in our schemes. Compared with the existing quantum secret sharing schemes, we realize the sharing of classical information and quantum state, and need less computational cost. Moreover, our schemes are more efficient when the adversary structure can be obtained directly.
引用
收藏
相关论文
共 50 条
  • [1] Two Quantum Secret Sharing Schemes with Adversary Structure
    Wu, Tingting
    Zhu, Shixin
    Li, Fulin
    Liu, Li
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (07)
  • [2] Notes on two multiparty quantum secret sharing schemes
    Gao, Gan
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2018, 16 (03)
  • [3] Quantum secret sharing schemes and reversibility of quantum operations
    Ogawa, T
    Sasaki, A
    Iwamoto, M
    Yamamoto, H
    PHYSICAL REVIEW A, 2005, 72 (03)
  • [4] A NOTE ON SOME QUANTUM SECRET SHARING SCHEMES
    Cao, Zhengjun
    Markowitch, Olivier
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2010, 8 (03) : 451 - 456
  • [5] Improving quantum secret-sharing schemes
    Nascimento, ACA
    Mueller-Quade, J
    Imai, H
    PHYSICAL REVIEW A, 2001, 64 (04): : 423111 - 423115
  • [6] Matroids and quantum-secret-sharing schemes
    Sarvepalli, Pradeep
    Raussendorf, Robert
    PHYSICAL REVIEW A, 2010, 81 (05):
  • [7] Practical secret sharing scheme realizing generalized adversary structure
    Guo, YB
    Ma, JF
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (04) : 564 - 569
  • [8] Practical secret sharing scheme realizing generalized adversary structure
    Yuan-Bo Guo
    Jian-Feng Ma
    Journal of Computer Science and Technology, 2004, 19 : 564 - 569
  • [9] Ways to merge two secret sharing schemes
    Slinko, Arkadii
    IET INFORMATION SECURITY, 2020, 14 (01) : 146 - 150
  • [10] Two Optimum Secret Sharing Schemes Revisited
    Cao, Zhengjun
    Markowitch, Olivier
    2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 157 - +