A (t, n) threshold quantum secret sharing with authentication based on single photons

被引:2
作者
Zhang, Jie [1 ]
Qin, Sujuan [2 ]
Jin, Zhengping [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum secret sharing; Lagrange interpolation polynomial; (t; n); threshold; Authentication; Single photons; KEY DISTRIBUTION;
D O I
10.1007/s11128-025-04672-2
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Secret sharing has become a important cryptographic primitive and been widely used. And quantum secret sharing is a quantum approach to achieve secret sharing. The (t, n) threshold quantum secret sharing requires only t participants out of n to cooperate to recover the secret, which is more flexible than the (n, n) scheme. However, most (t, n) threshold schemes basically involve quantum entanglement, and the preparation of entangled states as well as entanglement swapping are relatively complex. In this paper, we propose a (t, n) threshold quantum secret sharing scheme with authentication by using the Lagrange interpolation polynomial based on single photons. Unlike other (t, n) threshold schemes, it does not involve entangled states or entanglement swapping. And the distributor authenticate the participants without revealing the full identity key. In addition, secret sharing is based on Lagrange interpolation polynomial implementation, allowing any t participants to recover the secret. Analysis shows that the scheme can resist external eavesdroppers and dishonest participants. Compared with other schemes, this scheme has the following advantages: (1) it is easy to implement; (2) the (t, n) threshold scheme increases the flexibility of the scheme; (3) the identity key can be reused.
引用
收藏
页数:13
相关论文
共 65 条
[41]   Device-independent secret sharing and a stronger form of Bell nonlocality [J].
Moreno, M. G. M. ;
Brito, Samurai ;
Nery, Ranieri, V ;
Chaves, Rafael .
PHYSICAL REVIEW A, 2020, 101 (05)
[42]   Quantum algorithm for neighborhood preserving embedding [J].
Pan, Shi-Jie ;
Wan, Lin-Chun ;
Liu, Hai-Ling ;
Wu, Yu-Sen ;
Qin, Su-Juan ;
Wen, Qiao-Yan ;
Gao, Fei .
CHINESE PHYSICS B, 2022, 31 (06)
[43]   Improved quantum algorithm for A-optimal projection [J].
Pan, Shi-Jie ;
Wan, Lin-Chun ;
Liu, Hai-Ling ;
Wang, Qing-Le ;
Qin, Su-Juan ;
Wen, Qiao-Yan ;
Gao, Fei .
PHYSICAL REVIEW A, 2020, 102 (05)
[44]   A 15-user quantum secure direct communication network [J].
Qi, Zhantong ;
Li, Yuanhua ;
Huang, Yiwen ;
Feng, Juan ;
Zheng, Yuanlin ;
Chen, Xianfeng .
LIGHT-SCIENCE & APPLICATIONS, 2021, 10 (01)
[45]   Decoy-state quantum private query protocol with two-way communication [J].
Qin, Lizhou ;
Liu, Bin ;
Gao, Fei ;
Huang, Wei ;
Xu, Bingjie ;
Li, Yang .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2024, 633
[46]   Improving the security of multiparty quantum secret sharing against an attack with a fake signal [J].
Qin, Su-Juan ;
Gao, Fei ;
Wen, Qiao-Yan ;
Zhu, Fu-Chen .
PHYSICS LETTERS A, 2006, 357 (02) :101-103
[47]   Device-independent quantum secure direct communication under non-Markovian quantum channels [J].
Roy, Pritam ;
Bera, Subhankar ;
Gupta, Shashank ;
Majumdar, A. S. .
QUANTUM INFORMATION PROCESSING, 2024, 23 (05)
[48]   Device-independent quantum secret sharing in arbitrary even dimensions [J].
Roy, Sarbani ;
Mukhopadhyay, Sourav .
PHYSICAL REVIEW A, 2019, 100 (01)
[49]  
Otterbach JS, 2017, Arxiv, DOI [arXiv:1712.05771, DOI 10.48550/ARXIV.1712.05771]
[50]   Experimental single qubit quantum secret sharing [J].
Schmid, C ;
Trojek, P ;
Bourennane, M ;
Kurtsiefer, C ;
Zukowski, M ;
Weinfurter, H .
PHYSICAL REVIEW LETTERS, 2005, 95 (23)