Limited resource semiquantum secret sharing

被引:33
|
作者
Li, Zhulin [1 ]
Li, Qin [2 ]
Liu, Chengdong [3 ]
Peng, Yu [3 ]
Chan, Wai Hong [4 ]
Li, Lvzhou [5 ]
机构
[1] Xiangtan Univ, Coll Informat Engn, Xiangtan 411105, Peoples R China
[2] Xiangtan Univ, Coll Informat Engn, Key Lab Hunan Prov Internet Things & Informat Sec, Xiangtan 411105, Peoples R China
[3] China Gen Technol Res Inst, Beijing 100091, Peoples R China
[4] Educ Univ Hong Kong, Dept Math & Informat Technol, Ting Kok, Hong Kong, Peoples R China
[5] Sun Yat Sen Univ, Dept Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Semiquantum secret sharing; Eavesdropping detection; Quantum cryptography; Secret sharing; QUANTUM KEY DISTRIBUTION; DECOY STATE; CRYPTANALYSIS; CRYPTOGRAPHY; MULTIPARTY; PROTOCOL;
D O I
10.1007/s11128-018-2058-8
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The idea of semiquantum secret sharing (SQSS) is that quantum Alice wants to share secret information with clients such as Bob and Charlie who have limited quantum capability. Neither Bob nor Charlie can reconstruct the secret information unless they collaborate together. In existing semiquantum secret sharing protocols, clients generally need the ability of quantum measurement in classical basis and quantum parties usually need to access quantum memory. In this paper, we propose a relatively efficient SQSS protocol where limited Bob and Charlie can realize secret sharing without making any measurements and quantum Alice does not have to access quantum memory.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    EURASIP Journal on Advances in Signal Processing, 2010
  • [32] A Performance and Resource Consumption Assessment of Secret Sharing Based Secure Multiparty Computation
    von Maltitz, Marcel
    Carle, Georg
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2018, 11025 : 355 - 372
  • [33] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [34] Secret sharing with secure secret reconstruction
    Harn, Lein
    Xia, Zhe
    Hsu, Chingfang
    Liu, Yining
    INFORMATION SCIENCES, 2020, 519 : 1 - 8
  • [35] Proactive Secret Sharing Scheme Suitable for Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [36] On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing
    Aggarwal, Divesh
    Chung, Eldon
    Obremski, Maciej
    Ribeiro, Joao
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT I, 2022, 13747 : 327 - 354
  • [37] ON VERIFICATION IN SECRET SHARING
    DWORK, C
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 114 - 128
  • [38] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [39] Unclonable Secret Sharing
    Ananth, Prabhanjan
    Goyal, Vipul
    Liu, Jiahui
    Liu, Qipeng
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT IX, 2025, 15492 : 129 - 157
  • [40] Quantum secret sharing
    Hillery, M
    Buzek, V
    Berthiaume, A
    PHYSICAL REVIEW A, 1999, 59 (03): : 1829 - 1834