A Novel Quantum Visual Secret Sharing Scheme

被引:15
作者
Liu, Wenjie [1 ,2 ]
Xu, Yinsong [2 ]
Zhang, Maojun [3 ]
Chen, Junxiu [2 ]
Yang, Ching-Nung [4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[3] Guilin Univ Elect Technol, Sch Math & Comp Sci, Guilin 541004, Peoples R China
[4] Natl Dong Hwa Univ, Div Dept Comp Sci & Informat Engn, Hualien 97441, Taiwan
基金
中国国家自然科学基金;
关键词
n-qubit superposition state; n-qubit XOR operation; quantum expansion; quantum visual secret sharing; single-pixel parallel processing; visual cryptography; CRYPTOGRAPHY; EFFICIENT; COMMUNICATION;
D O I
10.1109/ACCESS.2019.2931073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Inspired by Naor et al.'s visual secret sharing (VSS) scheme, a novel n out of n quantum visual secret sharing (QVSS) scheme is proposed, which consists of two phases: sharing process and recovering process. In the first process, the color information of each pixel from the original secret image is encoded into an n-qubit superposition state by using the strategy of quantum expansion instead of classical pixel expansion, and then these n qubits are distributed as shares to n participants, respectively. During the recovering process, all participants cooperate to collect these n shares of each pixel together, then perform the corresponding measurement on them, and execute the n-qubit XOR operation to recover each pixel of the secret image. The proposed scheme has the advantage of single-pixel parallel processing that is not available in the existing analogous quantum schemes and perfectly solves the problem that in the classic VSS schemes the recovered image has the loss in resolution. Moreover, its experiment implementation with the IBM Q is conducted to demonstrate the practical feasibility.
引用
收藏
页码:114374 / 114384
页数:11
相关论文
共 37 条
[1]  
[Anonymous], 1994, WORKSHOP THEORY APPL, DOI 10.1007/BFb0053419
[2]  
[Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
[3]  
[Anonymous], 2009, CHINESE PHYS LETT
[4]  
Blakley GR, 1979, P NATL COMPUTER C, P313, DOI 10.1109/MARK.1979.8817296
[5]   Probabilistic visual cryptography schemes [J].
Cimato, S ;
De Prisco, R ;
De Santis, A .
COMPUTER JOURNAL, 2006, 49 (01) :97-107
[6]   How to share a quantum secret [J].
Cleve, R ;
Gottesman, D ;
Lo, HK .
PHYSICAL REVIEW LETTERS, 1999, 83 (03) :648-651
[7]  
DAS SS, 2015, PROC SPIE, V24
[8]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[9]   Quantum private query: A new kind of practical quantum cryptographic protocol [J].
Gao, Fei ;
Qin, SuJuan ;
Huang, Wei ;
Wen, QiaoYan .
SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2019, 62 (07)
[10]   Quantum secret sharing [J].
Hillery, M ;
Buzek, V ;
Berthiaume, A .
PHYSICAL REVIEW A, 1999, 59 (03) :1829-1834