Limited resource semiquantum secret sharing

被引:33
|
作者
Li, Zhulin [1 ]
Li, Qin [2 ]
Liu, Chengdong [3 ]
Peng, Yu [3 ]
Chan, Wai Hong [4 ]
Li, Lvzhou [5 ]
机构
[1] Xiangtan Univ, Coll Informat Engn, Xiangtan 411105, Peoples R China
[2] Xiangtan Univ, Coll Informat Engn, Key Lab Hunan Prov Internet Things & Informat Sec, Xiangtan 411105, Peoples R China
[3] China Gen Technol Res Inst, Beijing 100091, Peoples R China
[4] Educ Univ Hong Kong, Dept Math & Informat Technol, Ting Kok, Hong Kong, Peoples R China
[5] Sun Yat Sen Univ, Dept Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Semiquantum secret sharing; Eavesdropping detection; Quantum cryptography; Secret sharing; QUANTUM KEY DISTRIBUTION; DECOY STATE; CRYPTANALYSIS; CRYPTOGRAPHY; MULTIPARTY; PROTOCOL;
D O I
10.1007/s11128-018-2058-8
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The idea of semiquantum secret sharing (SQSS) is that quantum Alice wants to share secret information with clients such as Bob and Charlie who have limited quantum capability. Neither Bob nor Charlie can reconstruct the secret information unless they collaborate together. In existing semiquantum secret sharing protocols, clients generally need the ability of quantum measurement in classical basis and quantum parties usually need to access quantum memory. In this paper, we propose a relatively efficient SQSS protocol where limited Bob and Charlie can realize secret sharing without making any measurements and quantum Alice does not have to access quantum memory.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Secret sharing and duality
    Csirmaz, Laszlo
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 157 - 173
  • [42] Secret image sharing
    Thien, CC
    Lin, JC
    COMPUTERS & GRAPHICS-UK, 2002, 26 (05): : 766 - 770
  • [43] Deceptive Secret Sharing
    Zhang, Lei
    Blough, Douglas M.
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 442 - 453
  • [44] DNA secret sharing
    Adhikari, Avishek
    2006 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-6, 2006, : 1392 - 1396
  • [45] Timed Secret Sharing
    Kavousi, Alireza
    Abadi, Aydin
    Jovanovic, Philipp
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VII, 2025, 15490 : 129 - 164
  • [46] ON SECRET SHARING SYSTEMS
    KARNIN, ED
    GREENE, JW
    HELLMAN, ME
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (01) : 35 - 41
  • [47] Quantum secret sharing
    Guo, GP
    Guo, GC
    QUANTUM OPTICS IN COMPUTING AND COMMUNICATIONS, 2002, 4917 : 101 - 105
  • [48] Framing in Secret Sharing
    Desmedt, Yvo
    Mo, Songbao
    Slinko, Arkadii M.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2836 - 2842
  • [49] Function Secret Sharing
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 337 - 367
  • [50] Quantum entanglement for secret sharing and secret splitting
    Karlsson, A
    Koashi, M
    Imoto, N
    PHYSICAL REVIEW A, 1999, 59 (01) : 162 - 168