A Lightweight and Efficient Multiparty Semi-Quantum Secret Sharing Protocol Using Entangled States for Sharing Specific Bit

被引:0
作者
Younes, Mustapha Anis [1 ]
Zebboudj, Sofia [2 ]
Gharbi, Abdelhakim [1 ]
机构
[1] Univ Bejaia, Fac Sci Exactes, Lab Phys Theor, Bejaia 06000, Algeria
[2] Univ Bretagne Sud, ENSIBS, F-56000 Vannes, France
关键词
Quantum cryptography; Semi-quantum secret sharing; Trojan horse attack; CNOT attack; Bell states; Entangled states; SIMULATION;
D O I
10.1007/s10773-024-05834-1
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, Younes et al. (2024) proposed an efficient multi-party semi-quantum secret sharing (SQSS) scheme that generalizes Tian et al.'s three-party protocol (Tian et al. Quantum Inf. Process. 20(6), 2021) to accommodate multiple participants. This scheme retains the original advantages, such as high qubit efficiency and allowing the secret dealer, Alice, to control the message content. However, (He et al. Quantum Inf. Process 23(2), 2024) identified a vulnerability in Tian et al.'s protocol to the double CNOT attack (DCNA), which also affects the generalized scheme. In response, He et al. proposed an improved protocol to address this issue. Despite these improvements, their protocol is limited to two participants and remains a primarily two-way communication scheme, which does not fully prevent the Trojan horse attack without expensive quantum devices such as photon number splitters (PNS) and wavelength filters (WF). To address these issues, this paper develops a novel multi-party SQSS scheme using the quantum property between Bell states and the Hadamard operation to detect eavesdroppers. This new scheme is secure against the DCNA, intercept-resend attack, and collective attack. It employs a fully one-way communication scheme, entirely preventing the Trojan horse attack without costly quantum devices, aligning with the semi-quantum environment's original intent. This new protocol also offers better qubit efficiency and allows Alice to share specific secrets.
引用
收藏
页数:22
相关论文
共 68 条
[1]   Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers [J].
Bagherinezhad, S ;
Karimipour, V .
PHYSICAL REVIEW A, 2003, 67 (04) :4
[2]   Experimental quantum teleportation [J].
Bouwmeester, D ;
Pan, JW ;
Mattle, K ;
Eibl, M ;
Weinfurter, H ;
Zeilinger, A .
NATURE, 1997, 390 (6660) :575-579
[3]   Experimentally feasible protocol for semiquantum key distribution [J].
Boyer, Michel ;
Katz, Matty ;
Liss, Rotem ;
Mor, Tal .
PHYSICAL REVIEW A, 2017, 96 (06)
[4]   Semiquantum key distribution [J].
Boyer, Michel ;
Gelles, Ran ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW A, 2009, 79 (03)
[5]   Quantum key distribution with classical Bob [J].
Boyer, Michel ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW LETTERS, 2007, 99 (14)
[6]  
Brickell E. F., 1991, Journal of Cryptology, V4, P123, DOI 10.1007/BF00196772
[7]  
Brickell Ernest F., 1989, WORKSHOP THEORY APPL, V9, P105, DOI [10.1007/3-540-46885-4_45, DOI 10.1007/3-540-46885-4_45]
[8]   Optical simulation of quantum logic [J].
Cerf, NJ ;
Adami, C ;
Kwiat, PG .
PHYSICAL REVIEW A, 1998, 57 (03) :R1477-R1480
[9]   SIMPLE QUANTUM COMPUTER [J].
CHUANG, IL ;
YAMAMOTO, Y .
PHYSICAL REVIEW A, 1995, 52 (05) :3489-3496
[10]   Quantum computing and simulation Where we stand and what awaits us [J].
Cirac, Juan Ignacio .
NANOPHOTONICS, 2021, 10 (01) :453-456