Quantum walk based quantum secret sharing in a verifiable framework

被引:1
作者
Lu, Changbin [1 ]
Miao, Fuyou [1 ]
Hou, Junpeng [2 ]
Ning, Yu [1 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei, Peoples R China
[2] Microsoft, Microsoft Quantum, Washington, DC 98052 USA
来源
2021 2ND INTERNATIONAL CONFERENCE ON BIG DATA & ARTIFICIAL INTELLIGENCE & SOFTWARE ENGINEERING (ICBASE 2021) | 2021年
基金
中国国家自然科学基金;
关键词
Quantum cryptography; Quantum secret sharing; Quantum walk; Verification mechanism; Network security; ENTANGLEMENT;
D O I
10.1109/ICBASE53849.2021.00056
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secret sharing is a cryptographic primitive which plays a central role in various tasks including secure multi-party computation and key management. Quantum schemes for secret sharing commonly rely on multi-particle entangled quantum states, which remains challenging with current experimental technologies. Firstly, in this paper we present a (t,n) quantum secret sharing scheme based on quantum walks on a circle, which only involves two-particle product states as the initial quantum resource. When recovering the secrets, it requires at least t participants sequentially completing their operations on the communicated state, while less than t participants can not acquire any information about the secrets. Secondly, a verification mechanism is designed, which can detect cheats with an asymptotic probability 100%. Finally, we show that the scheme is perfectly correct and is secure against common attacks including collusion attack. In conclusion, the proposed scheme will be useful for quantum communication networks due to its inherent scalability, flexibility and information-theoretical security.
引用
收藏
页码:271 / 276
页数:6
相关论文
共 35 条
  • [1] QUANTUM RANDOM-WALKS
    AHARONOV, Y
    DAVIDOVICH, L
    ZAGURY, N
    [J]. PHYSICAL REVIEW A, 1993, 48 (02): : 1687 - 1690
  • [2] Quantum walk algorithm for element distinctness
    Ambainis, Andris
    [J]. SIAM JOURNAL ON COMPUTING, 2007, 37 (01) : 210 - 239
  • [3] A MODULAR APPROACH TO KEY SAFEGUARDING
    ASMUTH, C
    BLOOM, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 208 - 210
  • [4] Bell J S., 1964, Physics, V1, P195, DOI [10.1103/Physics-PhysiqueFizika.1.195, 10.1103/PhysicsPhysiqueFizika.1.195, DOI 10.1103/PHYSICSPHYSIQUEFIZIKA.1.195]
  • [5] Bennett C H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
  • [6] Blakley G R., 1979, INT WORKSH MAN REQ K, P313, DOI [10.1109/MARK.1979.8817296, 10.1109/AFIPS.1979.98, DOI 10.1109/MARK.1979.8817296]
  • [7] Optimal Quantum Spatial Search on Random Temporal Networks
    Chakraborty, Shantanav
    Novo, Leonardo
    Di Giorgio, Serena
    Omar, Yasser
    [J]. PHYSICAL REVIEW LETTERS, 2017, 119 (22)
  • [8] Universal Computation by Multiparticle Quantum Walk
    Childs, Andrew M.
    Gosset, David
    Webb, Zak
    [J]. SCIENCE, 2013, 339 (6121) : 791 - 794
  • [9] Cohen Henri, 2013, A course in computational algebraic number theory, V138
  • [10] Can quantum-mechanical description of physical reality be considered complete?
    Einstein, A
    Podolsky, B
    Rosen, N
    [J]. PHYSICAL REVIEW, 1935, 47 (10): : 0777 - 0780