Verifiable Quantum Secret Sharing Based on a Single Qudit

被引:0
|
作者
Dan-Li Zhi
Zhi-Hui Li
Zhao-Wei Han
Li-Juan Liu
机构
[1] Shaanxi Normal University,College of Mathematics and Information Science
关键词
Verifiability; Mutually unbiased bases; Unitary transformation; Secret sharing scheme;
D O I
暂无
中图分类号
学科分类号
摘要
To detect frauds from some internal participants or external attackers, some verifiable threshold quantum secret sharing schemes have been proposed. In this paper, we present a new verifiable threshold structure based on a single qudit using bivariate polynomial. First, Alice chooses an asymmetric bivariate polynomial and sends a pair of values from this polynomial to each participant. Then Alice and participants implement in sequence unitary transformation on the d-dimensional quantum state based on unbiased bases, where those unitary transformations are contacted by this polynomial. Finally, security analysis shows that the proposed scheme can detect the fraud from external and internal attacks compared with the exiting schemes and is comparable to the recent schemes.
引用
收藏
页码:3672 / 3684
页数:12
相关论文
共 50 条
  • [41] Cloud Key Management Based on Verifiable Secret Sharing
    Hedabou, Mustapha
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 289 - 303
  • [42] Fourier-based Verifiable Function Secret Sharing
    Koshiba, Takeshi
    PROCEEDINGS OF 2020 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2020), 2020, : 442 - 446
  • [43] A verifiable threshold secret sharing scheme based on lattices
    Rajabi, Bahman
    Eslami, Ziba
    INFORMATION SCIENCES, 2019, 501 : 655 - 661
  • [44] Verifiable secret redistribution protocol based on additive sharing
    Institute of Network Security, Shandong University, Jinan 250100, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2006, 1 (23-27):
  • [45] Verifiable secret sharing based on the Chinese remainder theorem
    Harn, Lein
    Miao Fuyou
    Chang, Chin-Chen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) : 950 - 957
  • [46] Accountable Privacy Based on Publicly Verifiable Secret Sharing
    Kim, Young-Sam
    Kim, Seung-Hyun
    Jin, Seung-Hun
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1583 - 1586
  • [47] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Li, Fulin
    Hu, Hang
    Zhu, Shixin
    Yan, Jiayun
    Ding, Jian
    QUANTUM INFORMATION PROCESSING, 2022, 21 (07)
  • [48] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Fulin Li
    Hang Hu
    Shixin Zhu
    Jiayun Yan
    Jian Ding
    Quantum Information Processing, 21
  • [49] A verifiable (t,n) threshold quantum secret sharing scheme based on asymmetric binary polynomial
    Guan, Feiting
    Guo, Jiansheng
    Li, Lele
    LASER PHYSICS, 2023, 33 (12)
  • [50] Publicly verifiable function secret sharing
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Jian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (04) : 526 - 535