Quantum secret sharing protocol through noisy channel with application in visual cryptography

被引:1
作者
Rathi, Deepa [1 ]
Kumar, Sanjeev [1 ,2 ,4 ]
Musanna, Farhan [3 ]
Singh, Deepak [1 ]
机构
[1] Indian Inst Technol Roorkee, Dept Math, Roorkee, Uttaranchal, India
[2] Indian Inst Technol Roorkee, Mehta Family Sch Data Sci & Artificial Intelligenc, Roorkee, Uttarakhand, India
[3] Thapar Inst Engn & Technol, Sch Math, Patiala, India
[4] Indian Inst Technol Roorkee, Mehta Family Sch Data Sci & Artificial Intelligenc, Dept Math, Roorkee, Uttaranchal, India
关键词
amplitude-damping noise; Grover's search algorithm; phase-damping noise; quantum simulation; quantum secret sharing; visual cryptography; GROVER ALGORITHM; IMAGE ENCRYPTION;
D O I
10.1002/cpe.7899
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This study presents a quantum secret sharing (QSS) protocol designed using Grover's search algorithm in a noisy environment. The proposed protocol utilizes Grover's three-particle quantum state. The proposed scheme is divided into secret information sharing and eavesdropping checking. The dealer prepares an encoded state by encoding the classical information as a marked state and shares the states' qubits between three participants. Using the amplitude-damping noise and the phase-damping noise as conventional noisy channels, it can be demonstrated that secret information can be conveyed between participants with some information lost. The security analysis shows the scheme is stringent against malicious participants or eavesdroppers. The simulation analysis is done on the cloud platform IBM-QE thereby showing the practical feasibility of the scheme. Finally, an application of the proposed scheme is demonstrated in visual cryptography using the GNEQR representation of images.
引用
收藏
页数:21
相关论文
共 56 条
  • [1] Improving fidelity of quantum secret sharing by weak measurement
    Bai, Chen-Ming
    Li, Jing
    Zhang, Sujuan
    Liu, Lu
    [J]. LASER PHYSICS LETTERS, 2020, 17 (02)
  • [2] Bai CM., 2018, EUR PHYS J D, V72, P1
  • [3] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES
    BENNETT, CH
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
  • [4] Security of quantum cryptography against collective attacks
    Biham, E
    Mor, T
    [J]. PHYSICAL REVIEW LETTERS, 1997, 78 (11) : 2256 - 2259
  • [5] Deterministic secure direct communication using entanglement -: art. no. 187902
    Boström, K
    Felbinger, T
    [J]. PHYSICAL REVIEW LETTERS, 2002, 89 (18) : 187902/1 - 187902/4
  • [6] Systems-level understanding of ethanol-induced stresses and adaptation in E. coli
    Cao, Huansheng
    Wei, Du
    Yang, Yuedong
    Shang, Yu
    Li, Gaoyang
    Zhou, Yaoqi
    Ma, Qin
    Xu, Ying
    [J]. SCIENTIFIC REPORTS, 2017, 7
  • [7] Chamoli A., 2007, GROVERS ALGORITHM BA
  • [8] Quantum teleportation and state sharing using a genuinely entangled six-qubit state
    Choudhury, Sayan
    Muralidharan, Sreraman
    Panigrahi, Prasanta K.
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2009, 42 (11)
  • [9] Coherent eavesdropping strategies for the four state quantum cryptography protocol
    Cirac, JI
    Gisin, N
    [J]. PHYSICS LETTERS A, 1997, 229 (01) : 1 - 7
  • [10] How to share a quantum secret
    Cleve, R
    Gottesman, D
    Lo, HK
    [J]. PHYSICAL REVIEW LETTERS, 1999, 83 (03) : 648 - 651