Quantum Secret Sharing with Identity Authentication Based on GHZ States Entanglement Swapping

被引:0
作者
Jifeng Zhong
Banyao Ruan
Zhihao Liu
机构
[1] Jimei University,Navigation college
[2] Southeast University,School of Computer Science and Engineering
[3] Key Laboratory of Computer Network and Information Integration (Southeast University),undefined
[4] Ministry of Education,undefined
来源
International Journal of Theoretical Physics | / 62卷
关键词
Quantum secret sharing; Quantum identity authentication; GHZ state; Entanglement swapping;
D O I
暂无
中图分类号
学科分类号
摘要
A quantum secret sharing scheme with identity authentication is proposed. By leveraging the measurement correlation of the GHZ states, conjugate measurement bases (X-basis and Y-basis) and bitwise XOR operation, the secret message sender, Alice, can authenticate the identities of other participants, namely Bob and Charlie. Once quantum identity authentication is established, Alice encrypts the secret message by mapping it into a local unitary operation on the GHZ particles based on the pre-agreed coding rules. With the entanglement swapping feature of GHZ states, Bob and Charlie can decode Alice’s secret message by utilizing Bell-basis measurement. The proposed scheme is characterized by its simple operation, high transmission efficiency and quantum bit utilization. Additionally, it demonstrates resilience against various common attacks, including interception retransmission attack, identity impersonation attack, denial of service attack, entangle-and-measure attack.
引用
收藏
相关论文
共 71 条
[1]  
Shamir A(1979)How to share a secret Commun. ACM 22 612-613
[2]  
Hillery M(1999)Quantum secret sharing Phys. Rev. A 59 1829-1834
[3]  
Buzek V(1999)Quantum entanglement for secret sharing and secret splitting Phys. Rev. A 59 162-168
[4]  
Berthiaume A(2004)Efficient multiparty quantum-secret-sharing schemes Phys. Rev. A 69 4455-4459
[5]  
Karlsson A(2009)Multiparty quantum secret sharing with collective eavesdropping-check Opt. Commun. 282 386-390
[6]  
Koashi M(2020)Useful equations about bell states and their applications to quantum secret sharing IEEE Commun. Lett. 24 3936-3950
[7]  
Imoto N(2020)A quantum evolving secret sharing scheme Int. J. Theor. Phys. 59 3324-3328
[8]  
Xiao L(2020)Quantum secret sharing via cavity qed Int. J. Theor. Phys. 59 337-1235
[9]  
Lu Long G(2020)A verifiable (t, n) threshold quantum state sharing scheme on ibm quantum cloud platform Quantum Inf. Process. 19 1223-334
[10]  
Deng F-G(2023)Quantum secret permutating protocol IEEE Trans. Comput. 72 661-617