Two Quantum Secret Sharing Schemes with Adversary Structure

被引:0
|
作者
Tingting Wu
Shixin Zhu
Fulin Li
Li Liu
机构
[1] HeFei University of Technology,School of Mathematics
[2] Intelligent Interconnected Systems Laboratory of Anhui Province,undefined
关键词
Quantum secret sharing; Adversary structure; GHZ state; Unitary operation;
D O I
暂无
中图分类号
学科分类号
摘要
Quantum secret sharing is an important technology in quantum cryptography, and it is used in the fields of secure multiparty computation, quantum auction and fiber network configuration. In this paper, we construct two quantum secret sharing schemes with adversary structure by using three-qudit GHZ state and three qubits. In the proposed scheme, the dealer first generates the private keys based on the adversary structure, then the participants in authorized subset use their private keys to perform the unitary operations on the quantum state and recover the original secret. The security analysis shows the attacks of intercept-and-resend, entangle-and-measure and participant are impossible in our schemes. Compared with the existing quantum secret sharing schemes, we realize the sharing of classical information and quantum state, and need less computational cost. Moreover, our schemes are more efficient when the adversary structure can be obtained directly.
引用
收藏
相关论文
共 50 条
  • [41] d-Dimensional quantum state sharing with adversary structure
    Huawang Qin
    Yuewei Dai
    Quantum Information Processing, 2016, 15 : 1689 - 1701
  • [42] d-Dimensional quantum state sharing with adversary structure
    Qin, Huawang
    Dai, Yuewei
    QUANTUM INFORMATION PROCESSING, 2016, 15 (04) : 1689 - 1701
  • [43] A quantum secret sharing scheme on access structure
    Qin, Huawang
    Zhu, Xiaohua
    Dai, Yuewei
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2016, 39 (02) : 186 - 191
  • [44] Advance Sharing Procedures for the Ramp Quantum Secret Sharing Schemes With the Highest Coding Rate
    Matsumoto, Ryutaroh
    IEEE TRANSACTIONS ON QUANTUM ENGINEERING, 2025, 6
  • [45] On identification secret sharing schemes
    Cai, N
    Lam, KY
    INFORMATION AND COMPUTATION, 2003, 184 (02) : 298 - 310
  • [46] On Proactive Secret Sharing Schemes
    Nikov, V
    Nikova, S
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 308 - 325
  • [47] Secret sharing schemes on graphs
    Csirmaz, Laszlo
    STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2007, 44 (03) : 297 - 306
  • [48] PERFECT SECRET SHARING SCHEMES
    Parvatov, K. G.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 50 - 57
  • [49] Partial Secret Sharing Schemes
    Jafari, Amir
    Khazaei, Shahram
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5364 - 5385
  • [50] Efficient Secret Sharing Schemes
    Lv, Chunli
    Jia, Xiaoqi
    Lin, Jingqiang
    Jing, Jiwu
    Tian, Lijun
    Sun, Mingli
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 114 - +