An efficient controlled semi-quantum secret sharing protocol with entangled state

被引:1
作者
Houshmand, Monireh [1 ]
Hassanpour, Shima [2 ]
Haghparast, Majid [3 ]
机构
[1] Imam Reza Int Univ, Dept Elect Engn, Mashhad, Iran
[2] Tech Univ Dresden, Chair Privacy & Network Secur, Dresden, Germany
[3] Univ Jyvaskyla, Fac Informat Technol, Jyvaskyla, Finland
基金
芬兰科学院;
关键词
Semi-quantum secret sharing; Entangled state; Efficiency; KEY DISTRIBUTION;
D O I
10.1007/s11082-024-06434-3
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we present an entangled state controlled semi-quantum secret sharing CSQSS protocol for the first time. In this scheme, with the permission of a trusted classical user, Bob1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Bob_{1}$$\end{document}, Alice, as a quantum user, can share a one-bit specific message with n classical users, and the secret can only be recovered by the cooperation of all classical users. Then, the protocol is extended where m-bit specific messages, K(k1,k2,...,km)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(k_{1}, k_{2},..., k_{m})$$\end{document}, can be shared with n classical users. The security of the proposed protocol against common attacks is analysed in detail, which shows that the proposed protocol is theoretically secure. Compared with previous SQSS protocols, the proposed protocol can achieve a lower cost because it does not use returning qubits for producing the secret message, uses fewer returning qubits for eavesdropping check, and does not perform entangled state measurement. Moreover, the proposed protocol has the highest qubit efficiency among the previous SQSS schemes.
引用
收藏
页数:14
相关论文
共 40 条
  • [1] Bennett C.H., 1984, Theoretical Computer Science, V175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025, 10.1103/RevModPhys.74.145]
  • [2] Quantum cryptography: Public key distribution and coin tossing
    Bennett, Charles H.
    Brassard, Gilles
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 560 : 7 - 11
  • [3] Blakley G.R., 1979, INT WORKSH IEEE COMP
  • [4] Quantum key distribution with classical Bob
    Boyer, Michel
    Kenigsberg, Dan
    Mor, Tal
    [J]. PHYSICAL REVIEW LETTERS, 2007, 99 (14)
  • [5] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
    EKERT, AK
    [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663
  • [6] Multiparty semiquantum secret sharing based on rearranging orders of qubits
    Gao, Gan
    Wang, Yue
    Wang, Dong
    [J]. MODERN PHYSICS LETTERS B, 2016, 30 (10):
  • [7] Cryptanalysis and Improvement of the Semi-quantum Secret Sharing Protocol
    Gao, Xiang
    Zhang, Shibin
    Chang, Yan
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2017, 56 (08) : 2512 - 2520
  • [8] A two-step quantum secure direct communication protocol with hyperentanglement
    Gu Bin
    Huang Yu-Gai
    Fang Xia
    Zhang Cheng-Yi
    [J]. CHINESE PHYSICS B, 2011, 20 (10)
  • [9] Bidirectional teleportation of a pure EPR state by using GHZ states
    Hassanpour, Shima
    Houshmand, Monireh
    [J]. QUANTUM INFORMATION PROCESSING, 2016, 15 (02) : 905 - 912
  • [10] Efficient controlled quantum secure direct communication based on GHZ-like states
    Hassanpour, Shima
    Houshmand, Monireh
    [J]. QUANTUM INFORMATION PROCESSING, 2015, 14 (02) : 739 - 753