Decoy state quantum secret sharing protocol with collective detection

被引:0
作者
Xie, Ying [1 ]
Liu, Bin [1 ,2 ,4 ]
Li, Xingyu
Li, Zhigang [2 ]
Shao, Wenzhu [2 ]
Huang, Wei [3 ]
机构
[1] Chongqing Univ, Natl Elite Inst Engn, Chongqing 401135, Peoples R China
[2] Shihezi Univ, Coll Informat Sci & Technol, Key Lab Comp Intelligence & Network Informat Secur, Shihezi 832003, Peoples R China
[3] Southwest Inst Commun, Natl Key Lab Secure Commun, Chengdu 610041, Peoples R China
[4] Chongqing Univ, Coll Comp Sci, Chongqing 401331, Peoples R China
关键词
quantum secret sharing; decoy state; quantum cryptography; KEY DISTRIBUTION;
D O I
10.1360/SSPMA-2024-0588
中图分类号
P1 [天文学];
学科分类号
0704 ;
摘要
The quantum secret sharing protocol with collective detection has garnered significant attention due to its high communication efficiency and low demands on agent capabilities. However, practical implementations face challenges such as intolerance to channel loss and insufficient practical security analysis. To address these issues, this paper proposes a decoy quantum secret sharing protocol with collective detection. First, we analyze the potential security threats posed by multi-photon signals and propose two attack methods, rigorously demonstrating their severe impact on protocol security. Subsequently, to mitigate the adverse effects of multi-photon signals, we introduce a decoy state strategy to enhance the protocol's reliability under non-ideal conditions. Finally, detailed security analysis against the proposed attacks confirms that the improved protocol effectively resists both attacks even in non-ideal scenarios, thereby ensuring secure and reliable quantum secret sharing.
引用
收藏
页数:16
相关论文
共 38 条
[1]  
[Anonymous], 2016, Quantum Cryptography
[2]   Photon Number Splitting Attack - Proposal and Analysis of an Experimental Scheme [J].
Ashkenazy, Ariel ;
Idan, Yuval ;
Korn, Dor ;
Fixler, Dror ;
Dayan, Barak ;
Cohen, Eliahu .
ADVANCED QUANTUM TECHNOLOGIES, 2024, 7 (07)
[3]   Experimental demonstration of graph-state quantum secret sharing [J].
Bell, B. A. ;
Markham, D. ;
Herrera-Marti, D. A. ;
Marin, A. ;
Wadsworth, W. J. ;
Rarity, J. G. ;
Tame, M. S. .
NATURE COMMUNICATIONS, 2014, 5
[4]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[5]   Post-quantum cryptography [J].
Bernstein, Daniel J. ;
Lange, Tanja .
NATURE, 2017, 549 (7671) :188-194
[6]  
Chen L, 2024, Dissertation for Doctoral Degree, P29
[7]  
[陈彦 Chen Yan], 2009, [光学学报, Acta Optica Sinica], V29, P2989
[8]   Multiparty weighted threshold quantum secret sharing based on the Chinese remainder theorem to share quantum information [J].
Chou, Yao-Hsin ;
Zeng, Guo-Jyun ;
Chen, Xing-Yu ;
Kuo, Shu-Yu .
SCIENTIFIC REPORTS, 2021, 11 (01)
[9]   How to share a quantum secret [J].
Cleve, R ;
Gottesman, D ;
Lo, HK .
PHYSICAL REVIEW LETTERS, 1999, 83 (03) :648-651
[10]  
Dworkin M J, 2001, Advanced Encryption Standard (AES), P197