首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
A protocol for member expansion in quantum (t,n) threshold secret sharing schemes was proposed. Without a trusted center and modifying the shares of old participants, the protocol needs that t (t is the threshold) old participants cooperate to generate the new share. Compared with the previous secret sharing protocols, the proposed protocol has the advantage of joining new participants agilely.  相似文献   

2.
This paper presents an image authentication scheme for digital images. The proposed scheme protects a group of n images mutually. It designs a block matching procedure to generate the recovery data for each image, and applies a (t, n − 1), 2 ≤ t < n, threshold mechanism to encode each recovery data in n − 1 shares. The recovery shares are cross-embedded in the n images using a modified reversible contrast mapping watermarking scheme. A signature-based authentication code is finally generated and stamped to provide evidence for integrity of each image. The scheme not only can detect the tampering activities, but also can locate and recover the invalid regions of the tampered image if t or more watermarked images in the same group were intact. A nice characteristic of the proposed scheme is that the original images can be reconstructed lossless if no watermarked image was tampered, making the technique feasible in the application of protecting very sensitive images such as military or medical images. Experimental results show that the proposed scheme successfully detects various kinds of image alterations such as filtering, cropping, and replacement, and the corrupted images are properly recovered using the cross-recovery scheme.  相似文献   

3.
The security of multiparty quantum secret sharing with Bell states and Bell measurements [R.H. Shi et al., Opt. Commun. 283 (2010) 2476] is analyzed. It is shown that the first agent and the last one can gain access to the dealer's secret if they collaborate in this protocol. Therefore, this protocol does not satisfy the security requirement of quantum secret sharing.  相似文献   

4.
A protocol of quantum secret sharing between multiparty and multiparty with four states was presented. It was shown that this protocol can nullify the Trojan horse attack with a multi-photon signal, the fake-signal attack with Einstein-Podolsky-Rosen pairs, the attack with single photons, and the attack with invisible photons. In addition, the upper bounds of the average success probabilities were given for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states. Supported by the National Natural Science Foundation of China (Grant No. 10671054), the Key Project of Science and Technology Research of Education Ministry of China (Grant No. 207011) and the Natural Science Foundation of Hebei Province, China (Grant Nos. A2005000140 and 07M006)  相似文献   

5.
杨宇光  温巧燕  朱甫臣 《物理学报》2006,55(7):3255-3258
提出了一种单个N维量子系统的量子秘密共享方案.在该方案中,利用对Bennett和Brassard协议(BB84协议)中使用的两基四态扩展到多基多态,分发者对要共享的秘密采用多基多态编码,将被编码的单个N维量子系统发送给他的两个代理人之一,该代理人利用一个N维克隆机对接收到的粒子做幺正操作,然后把粒子发送给另一代理人.在得知最后一个代理人接收到该粒子之后,分发者告知两个代理人他所用的制备基,然后两个代理人分别对自己的系统进行测量并在合作之后获知分发者所发送的粒子的量子态.该方案的安全性基于量子不可克隆定理. 关键词: 量子秘密共享 多基多态编码 N维克隆机 量子不可克隆定理  相似文献   

6.
We present a multiparty quantum secret sharing scheme and analyze its security. In this scheme, the sender Alice takes EPR pairs in Bell states as quantum resources. In order to obtain the shared key, all participants only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is not necessary except for the eavesdropping checks.  相似文献   

7.
A quantum secret sharing scheme between an m-party group and an n-party group is proposed using three conjugate bases.A sequence of single photons,each of which is prepared in one of the six states,is used directly to encode classical information in the quantum secret sharing process.In this scheme,each of all m members in group 1 chooses randomly his/her own secret key individually and independently,and directly encodes his/her respective secret information on the states of single photons via unitary opera...  相似文献   

8.
Gan Gao 《Optics Communications》2010,283(14):2997-3000
In the paper [S. Lin, Q.Y. Wen, S.J. Qin, F.C. Zhu, Opt. Commun. 282 (2009) 4455], Lin et al. put forward a quantum secret sharing protocol in which the collective eavesdropping-check is employed. We study the security of this protocol and find that it is insecure. Two dishonest agents may collaborate to eavesdrop (half of) Alice's secret messages without introducing any error.  相似文献   

9.
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons, which is useful and efficient when the parties of communication are not all present. We described the process of this TQSS scheme and discussed its security. It was shown that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency was improved to approach 100% as almost all the instances can be used for generating the private key, and each photon can carry one bit of information. This protocol is feasible with the present-day technique. Supported by the National Basic Research Program of China (973 Program)(Grant No. 2007CB311100), the National High-Technology Research and Development Program of China (Grant Nos. 2006AA01Z419 and 2006AA01Z440), the Major Research Plan of the National Natural Science Foundation of China (Grant No. 90604023), the Scientific Research Common Program of Beijing Municipal Commission of Education (Grant No. KM200810005004), the Scientific Research Foundation for the Youth of Beijing University of Technology (Grant No. 97007016200701), the Doctoral Scientific Research Activation Foundation of Beijing University of Technology (Grant No. 52007016200702), the ISN Open Foundation, and the National Laboratory for Modern Communications Science Foundation of China (Grant No. 9140C1101010601)  相似文献   

10.
It is generally believed that nonorthogonal operations which can realize the state transformation between two nonorthogonal bases may ensure the security of many quantum communication protocols. However, in this paper, we present a powerful attack against quantum secret sharing protocols of these kinds. Applying entangled photons as fake signals, Eve can successfully steal the exact information without being revealed. We also give our effective modification to improve it. Under the suggested checking strategy, even to Eve's most general attack, it is robust and secure.  相似文献   

11.
In this article, we propose a three-party quantum secret sharing protocol with four-state Grover algorithm. The protocol has several advantages. It uses only four initial states which simplifies its experimental implementation. It has a higher encoding capacity, each two-qubit state provides two bits of information. We have experimentally demonstrated the protocol in a nuclear magnetic resonance quantum information processor successfully.  相似文献   

12.
Recently, Shi et al. proposed a multiparty quantum secret sharing (QSS) using Bell states and Bell measurements. This study shows that their scheme has a pitfall that could be mounted to a collusion attack if precaution has not been taken in implementation. That is, two dishonest agents can collude to reveal the secret without the help of the others. A possible solution is also presented to avoid the attack.  相似文献   

13.
於亚飞  张智明 《中国物理 B》2009,18(4):1342-1345
This paper reconsiders carefully the possibility of using the Smolin bound entangled states as the carrier for sharing quantum secret. It finds that the process of quantum secret sharing based on Smolin states has insecurity though the Smolin state was reported to violate maximally the two-setting Bell-inequality. The general proof is given.  相似文献   

14.
In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on χ-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice’s secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement.  相似文献   

15.
Based on x-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on x-type entangled states |X00〉3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed.  相似文献   

16.
Recently, Yang et al. proposed a kind of quantum cryptographic schemes based on secret sharing. The main idea is drawn from the case, where any n participants who share a secret K can co-operate as K does. This process can be applied to encryption, authentication, signature and so on. Unfortunately, since there is no identity authentication of the share’s holder, these schemes inherit the limitation of secret sharing in practice. If some participants do not follow the protocol, the protocol would be a failu...  相似文献   

17.
The security of a multiparty quantum secret sharing protocol [L.F. Han, Y.M. Liu, J. Liu, Z.J. Zhang, Opt. Commun. 281 (2008) 2690] is reexamined. It is shown that any one dishonest participant can obtain all the transmitted secret bits by a special attack, where the controlled-(-iσy) gate is employed to invalidate the role of the random phase shift operation. Furthermore, a possible way to resist this attack is discussed.  相似文献   

18.
A detailed analysis has showed that the quantum secret sharing protocol based on the Grover algorithm (Phys Rev A, 2003, 68: 022306) is insecure. A dishonest receiver may obtain the full information without being detected. A quantum secret-sharing protocol is presents here, which mends the security loophole of the original secret-sharing protocol, and doubles the information capacity.  相似文献   

19.
In this paper, two new efficient multiparty quantum direct secret sharing schemes are proposed via a six-particle GHZ state and Bell measurements. In the first scheme, based on the theory of security cryptanalysis, the secret message of the sender is directly encoded into the transmitted particles, and all the agents can obtain their information by performing bell measurement on the received particles, and then cooperate to recover the information of the sender. In the second scheme, we define a new secret shared coding method by performing local unitary operations on the transmitted particles, then agents perform Bell measurements on their own particles respectively, and feedback the measurement to the dealer. If the agent's results are matched with the previous coding method, the protocol will work out.In addition, the proposed two schemes have the following common advantages: the sender can send all prepared particles to the receiver, and can send an arbitrary key to the receiver, rather than a random secret key; the proposed schemes do not need to insert any detection sets to detect eavesdropping and can resist both existing attacks and spoofing attacks by dishonest agents. The sender need not to retain any photons, so the sender's quantum memory could be omitted here.  相似文献   

20.
In this comment, we show that the special attack [S.-J. Qin, F. Gao, Q.-Y. Wen, F.-C. Zhu, Opt. Commun. 281 (2008) 5472.], which claims to be able to obtain all the transmitted secret message bit values of the protocol of the multiparty quantum secret sharing of secure direct communication using single photons with random phase shift operations, fails. Furthermore, a class of similar attacks are also shown to fail to extract the secrete message.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号