Passive continuous-variable quantum secret sharing using a thermal source

被引:56
作者
Wu, Xiaodong [1 ]
Wang, Yijun [1 ]
Huang, Duan [2 ]
机构
[1] Cent S Univ, Sch Automat, Changsha 410083, Peoples R China
[2] Cent S Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
基金
中国国家自然科学基金;
关键词
KEY DISTRIBUTION; SECURITY;
D O I
10.1103/PhysRevA.101.022301
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We propose a continuous-variable quantum secret sharing (CV-QSS) protocol in which the quantum states are prepared passively using a thermal source. In our protocol, one player splits the output of a thermal source into two spatial modes with the help of a beam splitter, then he (or she) measures one of the correlated thermal states and sends the others to the secure station of the adjacent player in sequence after using appropriate optical attenuation, which waives the necessity of employment of high extinction ratio modulators with good stability. Therefore, the proposed protocol provides convenient implementation in QSS framework. Moreover, our scheme is immune to Trojan horse attacks. We derive the security bounds for our protocol against both eavesdroppers and dishonest players. Furthermore, we can achieve tighter bound of QSS distance by considering the finite-size effect, which is more practical than that obtained in the asymptotic limit.
引用
收藏
页数:10
相关论文
共 50 条
[1]   Passive-state preparation in continuous-variable measurement-device-independent quantum key distribution [J].
Bai, Dongyun ;
Huang, Peng ;
Ma, Hongxin ;
Wang, Tao ;
Zeng, Guihua .
JOURNAL OF PHYSICS B-ATOMIC MOLECULAR AND OPTICAL PHYSICS, 2019, 52 (13)
[2]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[3]   Experimental quantum secret sharing and third-man quantum cryptography [J].
Chen, Y ;
Zhang, AN ;
Zhao, Z ;
Zhou, XQ ;
Lu, CY ;
Peng, CZ ;
Yang, T ;
Pan, JW .
PHYSICAL REVIEW LETTERS, 2005, 95 (20)
[4]   Continuous-variable quantum key distribution with a leakage from state preparation [J].
Derkach, Ivan ;
Usenko, Vladyslav C. ;
Filip, Radim .
PHYSICAL REVIEW A, 2017, 96 (06)
[5]   Practical challenges in quantum key distribution [J].
Diamanti, Eleni ;
Lo, Hoi-Kwong ;
Qi, Bing ;
Yuan, Zhiliang .
NPJ QUANTUM INFORMATION, 2016, 2
[6]   Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations [J].
Diamanti, Eleni ;
Leverrier, Anthony .
ENTROPY, 2015, 17 (09) :6072-6092
[7]   Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks [J].
Furrer, F. ;
Franz, T. ;
Berta, M. ;
Leverrier, A. ;
Scholz, V. B. ;
Tomamichel, M. ;
Werner, R. F. .
PHYSICAL REVIEW LETTERS, 2012, 109 (10)
[8]   Asymptotic Security of Continuous-Variable Quantum Key Distribution with a Discrete Modulation [J].
Ghorai, Shouvik ;
Grangier, Philippe ;
Diamanti, Eleni ;
Leverrier, Anthony .
PHYSICAL REVIEW X, 2019, 9 (02)
[9]   Two-Party secret key distribution via a modified quantum secret sharing protocol [J].
Grice, W. P. ;
Evans, P. G. ;
Lawrie, B. ;
Legre, M. ;
Lougovski, P. ;
Ray, W. ;
Williams, B. P. ;
Qi, B. ;
Smith, A. M. .
OPTICS EXPRESS, 2015, 23 (06) :7300-7311
[10]   Quantum secret sharing using weak coherent states [J].
Grice, Warren P. ;
Qi, Bing .
PHYSICAL REVIEW A, 2019, 100 (02)