共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n parties can reconstruct the secret key when they collaborate. It shows that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as the single photons carrying the secret key are deterministically forwarded among any t or more of n parties, and each photon can carry one bit of information without quantum storage. This protocol is feasible with current technology. 相似文献
2.
HAO Liang LI JunLin & LONG GuiLu Key Laboratory for Atomic Molecular NanoSciences 《中国科学:物理学 力学 天文学(英文版)》2010,(3)
A detailed analysis has showed that the quantum secret sharing protocol based on the Grover algorithm (Phys Rev A, 2003, 68: 022306) is insecure. A dishonest receiver may obtain the full information without being detected. A quantum secret-sharing protocol is presents here, which mends the security loophole of the original secret-sharing protocol, and doubles the information capacity. 相似文献
3.
We present an efficient scheme for sharing an arbitrary two-qubit quantum state with n agents. In this scheme, the sender Alice first prepares an n + 2-particle GHZ state and introduces a Controlled-Not (CNOT) gate operation. Then, she utilizes the n + 2-particle entangled state as the quantum resource. After setting up the quantum channel, she performs one Bell-state measurement and another single-particle measurement, rather than two Bell-state measurements. In addition, except that the designated recover of the quantum secret just keeps two particles, almost all agents only hold one particle in their hands respectively, and thus they only need to perform a single-particle measurement on the respective particle with the basis X. Compared with other schemes based on entanglement swapping, our scheme needs less qubits as the quantum resources and exchanges less classical information, and thus obtains higher communication efficiency. 相似文献
4.
An experimentally feasible scheme for implementing quantum secret sharing via cavity quantum electrodynamics (QED) is proposed. The scheme requires the large detuning of the cavity field from the atomic transition, the cavity is only virtually excited, thus the requirement on the quality factor of the cavity is greatly loosened. 相似文献
5.
We present a multiparty quantum secret sharing scheme and analyze its security. In this scheme, the sender Alice takes EPR pairs in Bell states as quantum resources. In order to obtain the shared key, all participants only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is not necessary except for the eavesdropping checks. 相似文献
6.
Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states.This paper presents how to use a [2k-1,1,k] quantum error-correcting code(QECC) to implement a quantum(k,2k 1) threshold scheme.It also takes advantage of classical enhancement of the [2k-1,1,k] QECC to establish a QSS scheme which can share classical information and quantum information simultaneously.Because information is encoded into QECC,these schemes can prevent intercept-resend attacks and be implemented on some noisy channels. 相似文献
7.
This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time. 相似文献
8.
This paper presents a scheme for high-capacity three-party
quantum secret sharing with quantum superdense coding, following
some ideas in the work by Liu et al (2002 Phys. Rev. A
65 022304) and the quantum secret sharing scheme by Deng
et al (2008 Phys. Lett. A 372 1957). Instead of using
two sets of nonorthogonal states, the boss Alice needs only to
prepare a sequence of Einstein--Podolsky--Rosen pairs in
d-dimension. The two agents Bob and Charlie encode their
information with dense coding unitary operations, and security is
checked by inserting decoy photons. The scheme has a high capacity
and intrinsic efficiency as each pair can carry 2lbd bits of
information, and almost all the pairs can be used for carrying
useful information. 相似文献
9.
Shih-Hsueh Wang 《Optics Communications》2010,283(21):4405-1471
Recently, Shi et al. proposed a multiparty quantum secret sharing (QSS) using Bell states and Bell measurements. This study shows that their scheme has a pitfall that could be mounted to a collusion attack if precaution has not been taken in implementation. That is, two dishonest agents can collude to reveal the secret without the help of the others. A possible solution is also presented to avoid the attack. 相似文献
10.
YANG YuGuang WEN QiaoYan & ZHU FuChen School of Computer Beijing University of Technology Beijing China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing China School of Science Beijing University of Posts Telecommunications Beijing China National Key Laboratory for Modern Communications Chengdu China 《中国科学G辑(英文版)》2007,50(3):331-338
An efficient quantum secret sharing protocol with orthogonal product states in the 33 Hilbert space is presented. The particles in the orthogonal product states form two particle sequences. One sequence is sent to Bob and the other is sent to Charlie after rearranging the particle orders. With the help of Alice, Bob and Charlie make the corresponding local measurement to obtain the information of the or- thogonal product states prepared. This protocol has many distinct features such as great capacity and high efficiency. 相似文献
11.
A protocol of quantum secret sharing between multiparty and multiparty with four states was presented. It was shown that this
protocol can nullify the Trojan horse attack with a multi-photon signal, the fake-signal attack with Einstein-Podolsky-Rosen
pairs, the attack with single photons, and the attack with invisible photons. In addition, the upper bounds of the average
success probabilities were given for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle
entangled states.
Supported by the National Natural Science Foundation of China (Grant No. 10671054), the Key Project of Science and Technology
Research of Education Ministry of China (Grant No. 207011) and the Natural Science Foundation of Hebei Province, China (Grant
Nos. A2005000140 and 07M006) 相似文献
12.
YANG YuGuang * CHAI HaiPing WANG Yuan TENG YiWei & WEN QiaoYan College of Computer Science Technology Beijing University of Technology Beijing China State Key Laboratory of Integrated Services Network Xidian University Xi’an State Key Laboratory of Networking Switching Technology Beijing University of Posts Telecommunications Beijing 《中国科学:物理学 力学 天文学(英文版)》2011,(9)
We present a quantum secret sharing protocol against collective-amplitude-damping noise. Each logical qubit is encoded in two qubit noiseless states. So it can function over such a noisy channel. The two agents encode their messages on each logical qubit only by performing a permutation operation on two physical qubits. Although each logical qubit received by each agent only carries a bit of information, the boss Alice can read out her agents’ information by discriminating two orthogonal states by performin... 相似文献
13.
It is generally believed that nonorthogonal operations which can
realize the state transformation between two nonorthogonal bases may
ensure the security of many quantum communication protocols.
However, in this paper, we present a powerful attack against quantum
secret sharing protocols of these kinds. Applying entangled photons
as fake signals, Eve can successfully steal the exact information
without being revealed. We also give our effective modification to
improve it. Under the suggested checking strategy, even to Eve's
most general attack, it is robust and secure. 相似文献
14.
Cryptanalysis and improvement of a quantum secret sharing scheme based on x-type entangled states
下载免费PDF全文

In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on χ-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice’s secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement. 相似文献
15.
Recently, Yang et al. proposed a kind of quantum cryptographic schemes based on secret sharing. The main idea is drawn from the case, where any n participants who share a secret K can co-operate as K does. This process can be applied to encryption, authentication, signature and so on. Unfortunately, since there is no identity authentication of the share’s holder, these schemes inherit the limitation of secret sharing in practice. If some participants do not follow the protocol, the protocol would be a failu... 相似文献
16.
GAO Ting YAN FengLi & LI YouCheng College of Mathematics Information Science Hebei Normal University Shijiazhuang China College of Physics Information Engineering Hebei Advanced Thin Films Laboratory 《中国科学G辑(英文版)》2009,(8)
A quantum secret sharing scheme between an m-party group and an n-party group is proposed using three conjugate bases.A sequence of single photons,each of which is prepared in one of the six states,is used directly to encode classical information in the quantum secret sharing process.In this scheme,each of all m members in group 1 chooses randomly his/her own secret key individually and independently,and directly encodes his/her respective secret information on the states of single photons via unitary opera... 相似文献
17.
High-dimension multiparty quantum secret sharing scheme with Einstein-Podolsky-Rosen pairs
下载免费PDF全文

In this paper a high-dimension multiparty quantum secret sharing scheme is proposed
by using Einstein--Podolsky--Rosen pairs and local unitary operators. This scheme
has the advantage of not only having higher capacity, but also saving storage space.
The security analysis is also given. 相似文献
18.
A protocol for member expansion in quantum (t,n) threshold secret sharing schemes was proposed. Without a trusted center and modifying the shares of old participants, the protocol needs that t (t is the threshold) old participants cooperate to generate the new share. Compared with the previous secret sharing protocols, the proposed protocol has the advantage of joining new participants agilely. 相似文献
19.
Three-party quantum secret sharing of secure direct communication based on x-type entangled states
下载免费PDF全文

Based on x-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on x-type entangled states |X00〉3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed. 相似文献
20.
For the first time, a threshold quantum secure direct communication (TQSDC) scheme is presented. Similar to the classical Shamir's secret sharing scheme, the sender makes n shares, S1, …, Sn of secret key K and each receiver keeps a share secretly. If the sender wants to send a secret message M to the receivers, he en-codes the information of K and M on a single photon sequence and sends it to one of the receivers. According to the secret shares, the t receivers sequentially per-form the corresponding unitary operations on the single photon sequence and ob-tain the secret message M. The shared shares may be reusable if it can be judged that there is no eavesdropper in line. We discuss that our protocol is feasible with current technology. 相似文献