Proactive quantum secret sharing

被引:1
|
作者
Huawang Qin
Yuewei Dai
机构
[1] Nanjing University of Science and Technology,School of Automatization
来源
关键词
Quantum secret sharing; Proactive; Bell state; Quantum cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
A proactive quantum secret sharing scheme is proposed, in which the participants can update their key shares periodically. In an updating period, one participant randomly generates the EPR pairs, and the other participants update their key shares and perform the corresponding unitary operations on the particles of the EPR pairs. Then, the participant who generated the EPR pairs performs the Bell-state measurement and updates his key share according to the result of the Bell-state measurement. After an updating period, each participant can change his key share, but the secret is changeless, and the old key shares will be useless even if they have been stolen by the attacker. The proactive property of our scheme is very useful to resist the mobile attacker.
引用
收藏
页码:4237 / 4244
页数:7
相关论文
共 50 条
  • [11] Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
    于佳
    孔凡玉
    李大兴
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 236 - 241
  • [12] MPSS: Mobile Proactive Secret Sharing
    Schultz, David
    Liskov, Barbara
    Liskov, Moses
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (04)
  • [13] Proactive Secret Sharing with a Dishonest Majority
    Dolev, Shlomi
    ElDefrawy, Karim
    Lampkins, Joshua
    Ostrovsky, Rafail
    Yung, Moti
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 529 - 548
  • [14] Proactive Secret Sharing with Constant Communication
    Falk, Brett Hemenway
    Noble, Daniel
    Rabin, Tal
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT II, 2023, 14370 : 337 - 373
  • [15] Quantum secret sharing
    Hillery, M
    Buzek, V
    Berthiaume, A
    PHYSICAL REVIEW A, 1999, 59 (03): : 1829 - 1834
  • [16] APSS: Proactive secret sharing in asynchronous systems
    Zhou, Lidong
    Schneider, Fred B.
    Van Renesse, Robbert
    ACM Transactions on Information and System Security, 2005, 8 (03) : 259 - 286
  • [17] Security Evaluation of Proactive Secret Sharing Cryptosystem
    Shi Tingjun
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL I, 2009, : 358 - 360
  • [18] Security analysis for proactive secret sharing system
    Chen, Hui-Fang
    Zhao, Wen-Dao
    Xi, Guo-Bao
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2006, 40 (08): : 1358 - 1360
  • [19] Brief Announcement: Mobile Proactive Secret Sharing
    Schultz, David
    Liskov, Barbara
    Liskov, Moses
    PODC'08: PROCEEDINGS OF THE 27TH ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2008, : 458 - 458
  • [20] Quantum secret sharing
    Guo, GP
    Guo, GC
    QUANTUM OPTICS IN COMPUTING AND COMMUNICATIONS, 2002, 4917 : 101 - 105