Quantum secret sharing protocol through noisy channel with application in visual cryptography

被引:1
|
作者
Rathi, Deepa [1 ]
Kumar, Sanjeev [1 ,2 ,4 ]
Musanna, Farhan [3 ]
Singh, Deepak [1 ]
机构
[1] Indian Inst Technol Roorkee, Dept Math, Roorkee, Uttaranchal, India
[2] Indian Inst Technol Roorkee, Mehta Family Sch Data Sci & Artificial Intelligenc, Roorkee, Uttarakhand, India
[3] Thapar Inst Engn & Technol, Sch Math, Patiala, India
[4] Indian Inst Technol Roorkee, Mehta Family Sch Data Sci & Artificial Intelligenc, Dept Math, Roorkee, Uttaranchal, India
来源
关键词
amplitude-damping noise; Grover's search algorithm; phase-damping noise; quantum simulation; quantum secret sharing; visual cryptography; GROVER ALGORITHM; IMAGE ENCRYPTION;
D O I
10.1002/cpe.7899
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This study presents a quantum secret sharing (QSS) protocol designed using Grover's search algorithm in a noisy environment. The proposed protocol utilizes Grover's three-particle quantum state. The proposed scheme is divided into secret information sharing and eavesdropping checking. The dealer prepares an encoded state by encoding the classical information as a marked state and shares the states' qubits between three participants. Using the amplitude-damping noise and the phase-damping noise as conventional noisy channels, it can be demonstrated that secret information can be conveyed between participants with some information lost. The security analysis shows the scheme is stringent against malicious participants or eavesdroppers. The simulation analysis is done on the cloud platform IBM-QE thereby showing the practical feasibility of the scheme. Finally, an application of the proposed scheme is demonstrated in visual cryptography using the GNEQR representation of images.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Determining the optimal contrast for secret sharing schemes in visual cryptography
    Krause, M
    Simon, HU
    COMBINATORICS PROBABILITY & COMPUTING, 2003, 12 (03): : 285 - 299
  • [22] A Modified Multi-secret Sharing Visual Cryptography Scheme
    Yu, Bin
    Fu, Zhengxin
    Fang, Liguo
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 912 - 915
  • [23] Extended Visual Cryptography Scheme for Multi-secret Sharing
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 249 - 257
  • [24] Multi-secret sharing threshold visual cryptography scheme
    Yu, Bin
    Xu, Xiaohui
    Fang, Liguo
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 815 - +
  • [25] A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity
    Tian, Yuan
    Bian, Genqing
    Chang, Jinyong
    Tang, Ying
    Li, Jian
    Ye, Chongqiang
    ENTROPY, 2023, 25 (05)
  • [26] Secret sharing and visual cryptography schemes -: A randomness preserving transformation
    De Bonis, A
    De Santis, A
    TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 123 - 137
  • [27] Approximate reconstructability of quantum states and noisy quantum secret sharing schemes
    Ouyang, Yingkai
    Goswami, Kaumudibikash
    Romero, Jacquiline
    Sanders, Barry C.
    Hsieh, Min-Hsiu
    Tomamichel, Marco
    PHYSICAL REVIEW A, 2023, 108 (01)
  • [28] Verifiable Quantum Secret Sharing Protocol Based on Secret Authentication
    Du Yutao
    Bao Wansu
    Li Tan
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (01) : 212 - 217
  • [29] Multiparty mediated quantum secret sharing protocol
    Chia-Wei Tsai
    Chun-Wei Yang
    Jason Lin
    Quantum Information Processing, 2022, 21
  • [30] A quantum secret-sharing protocol with fairness
    Liu, Feng
    Qin, Su-Juan
    Wen, Qiao-Yan
    PHYSICA SCRIPTA, 2014, 89 (07)