A verifiable (t, n) threshold quantum state sharing scheme on IBM quantum cloud platform

被引:2
作者
Song, Xiuli [1 ]
Liu, Yanbing [1 ]
Xiao, Min [1 ]
Deng, Hongyao [2 ]
Yang, Shuai [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Chongqing Key Lab Network Informat Secur Technol, Chongqing 400065, Peoples R China
[2] Yangtze Normal Univ, Coll Comp Informat & Engn, Chongqing 408100, Peoples R China
基金
中国国家自然科学基金;
关键词
(t; n) threshold; Verifiable quantum state sharing; Rotation unitary operator; Lagrange unitary operator; Quantum cloud platform; MULTIPARTY;
D O I
10.1007/s11128-020-02846-8
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In current verifiable quantum state sharing schemes, the dishonest behaviors of certain participants can be verified. However, these schemes have either high resource consumption, low verification efficiency or lack simulation implementations. To compensate for the shortcomings of current schemes, a new verifiable (t, n) threshold quantum state sharing scheme on the IBM quantum cloud platform is proposed. To reduce resource consumption, the proposed scheme prepares only one secret particle and then performs the Lagrange unitary operator on it, and the transformed secret particle is shared in the authorized subset of participants. To improve verification efficiency, the scheme performs the composite rotation unitary operator on the received message particle, such that it not only verifies the validity of the message particle but also reconstructs the original secret particle. The correctness of the proposed scheme is verified by not only mathematic proof but also experimental simulation on the IBM quantum cloud platform. Compared with the two other schemes based on the rotation unitary operator, the proposed scheme provides stronger verification security by using the private shadow key and rotation key. Compared with the two other schemes based on the verification mechanism, the proposed scheme has lower resource consumption and higher verification efficiency.
引用
收藏
页数:21
相关论文
共 50 条
[21]   Improved quantum (t, n) threshold group signature [J].
Zhang, Yaodong ;
Liu, Feng ;
Zuo, Haixin .
CHINESE PHYSICS B, 2023, 32 (09)
[22]   Verifiable (t, n) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix [J].
Lin, Yijie ;
Lin, Chia-Chen ;
Liu, Jui-Chuan ;
Chang, Chin-Chen .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 80
[23]   A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure [J].
Li, Jing ;
Wang, Licheng ;
Yan, Jianhua ;
Niu, Xinxin ;
Yang, Yixian .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12) :4552-4567
[24]   Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme [J].
Wen, Wen ;
Vaidya, Binod ;
Makrakis, Dimitrios ;
Adams, Carlisle .
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 :279-293
[25]   Secret Image Sharing Using (t,n) Threshold Scheme with Lossless Recovery [J].
Chien, Ming-Chun ;
Hwang, Jen-Ing G. .
2012 5TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), 2012, :1325-1329
[26]   Verifiable visually meaningful image encryption algorithm based on compressive sensing and (t, n)-threshold secret sharing [J].
Yang, Yu-Guang ;
Wang, Tao ;
Zhou, Yi-Hua ;
Shi, Wei-Min ;
Jiang, Dong-Hua ;
Liao, Xin .
PHYSICA SCRIPTA, 2024, 99 (02)
[27]   A quantum secret sharing scheme on access structure [J].
Qin, Huawang ;
Zhu, Xiaohua ;
Dai, Yuewei .
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2016, 39 (02) :186-191
[28]   External Attack of a Quantum Secret Sharing Scheme [J].
Shi, Jianhong ;
Zhang, Shengli ;
Chang, Zhenggang .
2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, :874-877
[29]   A new (t, n) threshold image hiding scheme for sharing a secret color image [J].
Chang, CC ;
Lin, IC .
2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, :196-202
[30]   Threshold quantum secret sharing based on single qubit [J].
Lu, Changbin ;
Miao, Fuyou ;
Meng, Keju ;
Yu, Yue .
QUANTUM INFORMATION PROCESSING, 2018, 17 (03)