Two Quantum Secret Sharing Schemes with Adversary Structure

被引:0
|
作者
Tingting Wu
Shixin Zhu
Fulin Li
Li Liu
机构
[1] HeFei University of Technology,School of Mathematics
[2] Intelligent Interconnected Systems Laboratory of Anhui Province,undefined
关键词
Quantum secret sharing; Adversary structure; GHZ state; Unitary operation;
D O I
暂无
中图分类号
学科分类号
摘要
Quantum secret sharing is an important technology in quantum cryptography, and it is used in the fields of secure multiparty computation, quantum auction and fiber network configuration. In this paper, we construct two quantum secret sharing schemes with adversary structure by using three-qudit GHZ state and three qubits. In the proposed scheme, the dealer first generates the private keys based on the adversary structure, then the participants in authorized subset use their private keys to perform the unitary operations on the quantum state and recover the original secret. The security analysis shows the attacks of intercept-and-resend, entangle-and-measure and participant are impossible in our schemes. Compared with the existing quantum secret sharing schemes, we realize the sharing of classical information and quantum state, and need less computational cost. Moreover, our schemes are more efficient when the adversary structure can be obtained directly.
引用
收藏
相关论文
共 50 条
  • [21] A NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA
    Rashkolia, A. Saeidi
    Zahedi, M. M.
    Dehkordi, M. H.
    IRANIAN JOURNAL OF FUZZY SYSTEMS, 2018, 15 (04): : 1 - 11
  • [22] (t, n) Threshold secret image sharing scheme with adversary structure
    Guo, Cheng
    Yuan, Qiongqiong
    Lu, Kun
    Li, Mingchu
    Fu, Zhangjie
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (20) : 21193 - 21210
  • [23] An efficient construction of secret sharing for generalized adversary structure and its reduction
    Guo, YB
    Shi, TJ
    Ma, HF
    2004 INTERNATIONAL CONFERENCE ON COMMUNICATION, CIRCUITS, AND SYSTEMS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS - VOL 2: SIGNAL PROCESSING, CIRCUITS AND SYSTEMS, 2004, : 6 - 10
  • [24] Approximate reconstructability of quantum states and noisy quantum secret sharing schemes
    Ouyang, Yingkai
    Goswami, Kaumudibikash
    Romero, Jacquiline
    Sanders, Barry C.
    Hsieh, Min-Hsiu
    Tomamichel, Marco
    PHYSICAL REVIEW A, 2023, 108 (01)
  • [25] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [26] Two secret sharing schemes based on Boolean operations
    Wang, Daoshun
    Zhang, Lei
    Ma, Ning
    Li, Xiaobo
    PATTERN RECOGNITION, 2007, 40 (10) : 2776 - 2785
  • [27] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [28] The access structure of some secret-sharing schemes
    Renvall, A
    Ding, CS
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78
  • [29] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Dehkordi, Masoud Hadian
    Farzaneh, Yousof
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1749 - 1758
  • [30] Is quantum secret sharing different to the sharing of a quantum secret?
    Lance, AM
    Symul, T
    Bowen, WP
    Tyc, T
    Sanders, BC
    Lam, PK
    QUANTUM COMMUNICATIONS AND QUANTUM IMAGING, 2004, 5161 : 127 - 133