An efficient multiparty quantum secret sharing scheme using a single qudit

被引:2
作者
Hu, Wenwen [1 ]
Xiong, Bangshu [2 ]
Zhou, Rigui [3 ]
机构
[1] Nanchang Hangkong Univ, Sch Informat Engn, Nanchang 330063, Peoples R China
[2] Nanchang Hangkong Univ, Key Lab Image Proc & Pattern Recognit Jiangxi Prov, Nanchang 330063, Peoples R China
[3] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
基金
中国国家自然科学基金;
关键词
quantum secret sharing; high-dimensional; measurement basis encrypted; security analysis; SECURE DIRECT COMMUNICATION; PROTOCOL;
D O I
10.1088/1674-1056/aca391
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The aim of quantum secret sharing, as one of most promising components of quantum cryptograph, is one-to-multiparty secret communication based on the principles of quantum mechanics. In this paper, an efficient multiparty quantum secret sharing protocol in a high-dimensional quantum system using a single qudit is proposed. Each participant's shadow is encoded on a single qudit via a measuring basis encryption method, which avoids the waste of qudits caused by basis reconciliation. Security analysis indicates that the proposed protocol is immune to general attacks, such as the measure-resend attack, entangle-and-measure attack and Trojan horse attack. Compared to former protocols, the proposed protocol only needs to perform the single-qudit measurement operation, and can share the predetermined dits instead of random bits or dits.
引用
收藏
页数:10
相关论文
共 54 条
[1]   Quantum secret sharing for a general quantum access structure [J].
Bai, Chen-Ming ;
Li, Zhi-Hui ;
Si, Meng-Meng ;
Li, Yong-Ming .
EUROPEAN PHYSICAL JOURNAL D, 2017, 71 (10)
[2]   TELEPORTING AN UNKNOWN QUANTUM STATE VIA DUAL CLASSICAL AND EINSTEIN-PODOLSKY-ROSEN CHANNELS [J].
BENNETT, CH ;
BRASSARD, G ;
CREPEAU, C ;
JOZSA, R ;
PERES, A ;
WOOTTERS, WK .
PHYSICAL REVIEW LETTERS, 1993, 70 (13) :1895-1899
[3]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[4]   Bloch vectors for qudits [J].
Bertlmann, Reinhold A. ;
Krammer, Philipp .
JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2008, 41 (23)
[5]  
Blakley G. R., 1979, P AFIPS NAT COMP C J, P313
[6]   Quantum key distribution with classical Bob [J].
Boyer, Michel ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW LETTERS, 2007, 99 (14)
[7]   Eavesdropping on the two-way quantum communication protocols with invisible photons [J].
Cai, QY .
PHYSICS LETTERS A, 2006, 351 (1-2) :23-25
[8]  
Cai QY, 2004, CHINESE PHYS LETT, V21, P601, DOI 10.1088/0256-307X/21/4/003
[9]   How to share a quantum secret [J].
Cleve, R ;
Gottesman, D ;
Lo, HK .
PHYSICAL REVIEW LETTERS, 1999, 83 (03) :648-651
[10]   Improving the security of multiparty quantum secret sharing against Trojan horse attack [J].
Deng, FG ;
Li, XH ;
Zhou, HY ;
Zhang, ZJ .
PHYSICAL REVIEW A, 2005, 72 (04)