Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement

被引:5
作者
He, Fan [1 ]
Xin, Xiangjun [1 ]
Li, Chaoyang [1 ]
Li, Fagen [2 ]
机构
[1] Zhengzhou Univ Light Ind, Coll Software Engn, Zhengzhou 450002, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
基金
中国国家自然科学基金;
关键词
Secret sharing; Semi-quantum secret sharing; Double-controlled NOT attack; Bell states; SCHEME;
D O I
10.1007/s11128-023-04255-z
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, Tian et al. (Quantum Inf. Process., 20(6), 217(2021)) proposed an efficient semi-quantum secret-sharing protocol of specific bits. In their protocol, the dealer can split a specific secret such that two classical agents can efficiently and corporately reconstruct the secret by applying the simple operations such as Z-base measurement and reflecting operation. The qubit efficiency of their protocol can be up to 50%. Unfortunately, according to our security analysis, their protocol is vulnerable to the eavesdropping attacks. We prove that the eavesdropper can steal the dealer's secret without being detected by applying the double-controlled NOT attack (DCNA) to the quantum channels. Then, some improvements are proposed, which can overcome the security flaw of the old protocol. We prove the improved protocol has enhanced security against DCNA, intercept-resend attack, entangle-measure attack and Trojan horse attack. In particular, the security proof shows that inserting decoy photons into the quantum message and reordering the quantum sequence is very helpful in detecting the adversary's entangle-measure attack, even the adversary uses two auxiliary probes to eavesdrop the quantum channel. Furthermore, the improved eavesdropping check strategy can effectively increase the length of the shared secret.
引用
收藏
页数:20
相关论文
共 45 条
  • [1] Fair quantum secret sharing based on symmetric bivariate polynomial
    Bai, Chen-Ming
    Zhang, Sujuan
    Liu, Lu
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2022, 589
  • [2] Generalized privacy amplification
    Bennett, CH
    Brassard, G
    Crepeau, C
    Maurer, UM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) : 1915 - 1923
  • [3] Eavesdropping on the two-way quantum communication protocols with invisible photons
    Cai, QY
    [J]. PHYSICS LETTERS A, 2006, 351 (1-2) : 23 - 25
  • [4] Multiparty Semi-Quantum Secret Sharing with d-Level Single-Particle States
    Chong-Qiang, Ye
    Tian-Yu, Ye
    De, He
    Zhi-Gang, Gan
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (11) : 3797 - 3814
  • [5] Improving the security of multiparty quantum secret sharing against Trojan horse attack
    Deng, FG
    Li, XH
    Zhou, HY
    Zhang, ZJ
    [J]. PHYSICAL REVIEW A, 2005, 72 (04):
  • [6] Quantum privacy amplification and the security of quantum cryptography over noisy channels
    Deutsch, D
    Ekert, A
    Jozsa, R
    Macchiavello, C
    Popescu, S
    Sanpera, A
    [J]. PHYSICAL REVIEW LETTERS, 1996, 77 (13) : 2818 - 2821
  • [7] Cryptanalysis of a semi-quantum secret sharing scheme based on Bell states
    Gao, Gan
    Wang, Yue
    Wang, Dong
    [J]. MODERN PHYSICS LETTERS B, 2018, 32 (09):
  • [8] Multiparty semiquantum secret sharing based on rearranging orders of qubits
    Gao, Gan
    Wang, Yue
    Wang, Dong
    [J]. MODERN PHYSICS LETTERS B, 2016, 30 (10):
  • [9] Cryptanalysis and Improvement of the Semi-quantum Secret Sharing Protocol
    Gao, Xiang
    Zhang, Shibin
    Chang, Yan
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2017, 56 (08) : 2512 - 2520
  • [10] Quantum cryptography
    Gisin, N
    Ribordy, GG
    Tittel, W
    Zbinden, H
    [J]. REVIEWS OF MODERN PHYSICS, 2002, 74 (01) : 145 - 195