Cluster-state-based quantum secret sharing for users with different abilities

被引:0
作者
Chaoyang Li
Chongqiang Ye
Yuan Tian
Xiu-Bo Chen
Jian Li
机构
[1] Zhengzhou University of Light Industry,College of Software Engineering
[2] Beijing University of Post and Telecommunications,Information Security Center, State Key Laboratory of Networking and Switching Technology
来源
Quantum Information Processing | 2021年 / 20卷
关键词
Quantum secret sharing; Semi-quantum secret sharing; Entanglement swapping; Cluster state; Bell state;
D O I
暂无
中图分类号
学科分类号
摘要
The four-qubit cluster state has a more robust entanglement property than other four-particle states. Empowered by the 4-qubit cluster state and Bell state entanglement, two quantum secret sharing (QSS) protocols are proposed in this paper. The first protocol is with the quantum users who can perform Bell measurement. The second protocol is with classical users who only can perform Z basis measurement and is also known as semi-quantum secret sharing (SQSS). Moreover, the security analysis shows the proposed QSS and SQSS protocols can achieve full security and resist some common eavesdropping attacks, such as interception attack, measure-resend attack, entanglement-measure attack, and Trojan horse attack. Meanwhile, the efficiency comparison shows that the proposed protocols are also efficient than other similar protocols with relate to the qubit efficiency.
引用
收藏
相关论文
共 112 条
  • [1] Bennett CH(1992)Quantum cryptography using any two nonorthogonal states Phys. Rev. Lett. 68 3121-10
  • [2] Li J(2016)One step quantum key distribution based on EPR entanglement Sci. Rep. 6 1-628
  • [3] Li N(2021)A quantum key distribution protocol based on the EPR Pairs and its simulation Mob. Netw. Appl. 26 620-12
  • [4] Li LL(2004)Secure direct communication with a quantum one-time pad Phys. Rev. A 69 052319-18
  • [5] Wang T(2020)Quantum secure direct communication based on single-photon Bell-state measurement New J. Phys. 22 063017-1150
  • [6] Li J(2009)An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement J. Phys. A Math. Theor. 42 055305-1955
  • [7] Li HJ(2019)Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state Quantum Inf. Process. 18 1-1465
  • [8] Wang N(2021)A class of protocols for multi-party quantum private comparison based on traveling mode Quantum Inf. Process. 20 1-25
  • [9] Li CY(1999)Quantum secret sharing[J] Phys. Rev. A 59 1829-8
  • [10] Hou YY(2000)Theory of quantum secret sharing Phys. Rev. A 61 042311-1819