Quantum secret sharing between m-party and n-party with six states

被引:45
作者
Gao Ting [1 ]
Yan FengLi [2 ,3 ]
Li YouCheng [2 ,3 ]
机构
[1] Hebei Normal Univ, Coll Math & Informat Sci, Shijiazhuang 050016, Peoples R China
[2] Hebei Normal Univ, Coll Phys & Informat Engn, Shijiazhuang 050016, Peoples R China
[3] Hebei Adv Thin Films Lab, Shijiazhuang 050016, Peoples R China
来源
SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY | 2009年 / 52卷 / 08期
基金
芬兰科学院; 中国国家自然科学基金;
关键词
quantum secret sharing; security; EPR pairs; MULTIPARTY; ENTANGLEMENT;
D O I
10.1007/s11433-009-0157-3
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A quantum secret sharing scheme between an m-party group and an n-party group is proposed using three conjugate bases. A sequence of single photons, each of which is prepared in one of the six states, is used directly to encode classical information in the quantum secret sharing process. In this scheme, each of all m members in group 1 chooses randomly his/her own secret key individually and independently, and directly encodes his/her respective secret information on the states of single photons via unitary operations, then the last one sends 1/n of the resulting qubits to each member of group 2. By measuring their respective qubits, all members in group 2 share the secret information shared by all members in group 1. It renders impossible a Trojan horse attack with a multi-photon signal, a fake-signal attack with EPR pairs, an attack with single photons, and an attack with invisible photons. We give the upper bounds on the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states.
引用
收藏
页码:1191 / 1202
页数:12
相关论文
共 43 条
[1]   Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers [J].
Bagherinezhad, S ;
Karimipour, V .
PHYSICAL REVIEW A, 2003, 67 (04) :4
[2]  
Bennett C. H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1103/REVMODPHYS.74.145
[3]   Observation of three-photon Greenberger-Horne-Zeilinger entanglement [J].
Bouwmeester, D ;
Pan, JW ;
Daniell, M ;
Weinfurter, H ;
Zeilinger, A .
PHYSICAL REVIEW LETTERS, 1999, 82 (07) :1345-1349
[4]   Secret-message sharing via direct transmission [J].
Brádler, K ;
Dusek, M .
JOURNAL OF OPTICS B-QUANTUM AND SEMICLASSICAL OPTICS, 2004, 6 (01) :63-68
[5]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[6]   Eavesdropping on the two-way quantum communication protocols with invisible photons [J].
Cai, QY .
PHYSICS LETTERS A, 2006, 351 (1-2) :23-25
[7]   How to share a quantum secret [J].
Cleve, R ;
Gottesman, D ;
Lo, HK .
PHYSICAL REVIEW LETTERS, 1999, 83 (03) :648-651
[8]   Quantum state sharing of an arbitrary two-qubit state with two-photon entanglements and Bell-state measurements [J].
Deng, F. -G. ;
Li, X. -H. ;
Li, C. -Y. ;
Zhou, P. ;
Zhou, H. -Y. .
EUROPEAN PHYSICAL JOURNAL D, 2006, 39 (03) :459-464
[9]   Improving the security of multiparty quantum secret sharing against Trojan horse attack (vol 72, art no 044302, 2005) [J].
Deng, FG ;
Li, XH ;
Zhou, HY ;
Zhang, ZJ .
PHYSICAL REVIEW A, 2006, 73 (04)
[10]   Improving the security of multiparty quantum secret sharing against Trojan horse attack [J].
Deng, FG ;
Li, XH ;
Zhou, HY ;
Zhang, ZJ .
PHYSICAL REVIEW A, 2005, 72 (04)