A rational hierarchical (t,n)-threshold quantum secret sharing scheme

被引:0
|
作者
Fulin Li
Zhuo Liu
Li Liu
Shixin Zhu
机构
[1] HeFei University of Technology,School of Mathematics
[2] Intelligent Interconnected Systems Laboratory of Anhui Province,undefined
关键词
Quantum secret sharing; Hierarchical; Rational; Phase shifting operations;
D O I
暂无
中图分类号
学科分类号
摘要
Quantum secret sharing plays a crucial role in quantum cryptography. In this paper, we present a rational hierarchical (t,n)-threshold quantum secret sharing scheme based on Lagrange interpolation. In our scheme, participants possess rational and hierarchical properties, and the secret can be reconstructed when the number of rational participants satisfies the hierarchical (t,n)-threshold structure proposed in this paper. The reconstructed secret can encompass both classical information and quantum state information, enhancing the practicality and flexibility of our scheme compared to existing ones. Additionally, we redefine the utility of participants based on their roles in the secret recovery process. This newly defined utility allows for a more precise analysis of the correctness, fairness, and equilibrium of our scheme. Finally, our scheme not only resists a typical set of external attacks but also incorporates mechanisms to detect forgery and collusion among participants.
引用
收藏
相关论文
共 50 条
  • [31] A general formula of the (t,n)-threshold visual secret sharing scheme
    Koga, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 328 - 345
  • [32] (t, n) Threshold secret image sharing scheme with adversary structure
    Cheng Guo
    Qiongqiong Yuan
    Kun Lu
    Mingchu Li
    Zhangjie Fu
    Multimedia Tools and Applications, 2017, 76 : 21193 - 21210
  • [33] A new (t, n)-threshold multi-secret sharing scheme
    Li, HX
    Cheng, CT
    Pang, LJ
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 421 - 426
  • [34] A secret sharing scheme based on (t, n) threshold and adversary structure
    Huawang Qin
    Yuewei Dai
    Zhiquan Wang
    International Journal of Information Security, 2009, 8
  • [35] (t, n) Threshold secret image sharing scheme with adversary structure
    Guo, Cheng
    Yuan, Qiongqiong
    Lu, Kun
    Li, Mingchu
    Fu, Zhangjie
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (20) : 21193 - 21210
  • [36] Multiple Assignment Secret Sharing Scheme Using Hierarchical Threshold Scheme
    Tochikubo, Kouya
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 456 - 461
  • [37] An efficient (t, n) threshold quantum secret sharing without entanglement
    Qin, Huawang
    Dai, Yuewei
    MODERN PHYSICS LETTERS B, 2016, 30 (12):
  • [38] (t,n) Threshold Quantum Secret Sharing Using Rotation Operation
    Wang, Ning
    Zhang, Xin
    Zhang, Xiaodong
    Lin, Song
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (06)
  • [39] A Kind of (t, n) Threshold Quantum Secret Sharing with Identity Authentication
    Meng, Depeng
    Li, Zhihui
    Luo, Shuangshuang
    Han, Zhaowei
    ENTROPY, 2023, 25 (05)
  • [40] (t,n) Threshold Quantum Secret Sharing Using Rotation Operation
    Ning Wang
    Xin Zhang
    Xiaodong Zhang
    Song Lin
    International Journal of Theoretical Physics, 61