Cargando…
(t, n) Threshold d-Level Quantum Secret Sharing
Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5527125/ https://www.ncbi.nlm.nih.gov/pubmed/28743880 http://dx.doi.org/10.1038/s41598-017-06486-4 |
_version_ | 1783252923288911872 |
---|---|
author | Song, Xiu-Li Liu, Yan-Bing Deng, Hong-Yao Xiao, Yong-Gang |
author_facet | Song, Xiu-Li Liu, Yan-Bing Deng, Hong-Yao Xiao, Yong-Gang |
author_sort | Song, Xiu-Li |
collection | PubMed |
description | Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants’ shares, even the trusted reconstructor Bob (1) is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n − 1. |
format | Online Article Text |
id | pubmed-5527125 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-55271252017-08-02 (t, n) Threshold d-Level Quantum Secret Sharing Song, Xiu-Li Liu, Yan-Bing Deng, Hong-Yao Xiao, Yong-Gang Sci Rep Article Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants’ shares, even the trusted reconstructor Bob (1) is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n − 1. Nature Publishing Group UK 2017-07-25 /pmc/articles/PMC5527125/ /pubmed/28743880 http://dx.doi.org/10.1038/s41598-017-06486-4 Text en © The Author(s) 2017 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Song, Xiu-Li Liu, Yan-Bing Deng, Hong-Yao Xiao, Yong-Gang (t, n) Threshold d-Level Quantum Secret Sharing |
title | (t, n) Threshold d-Level Quantum Secret Sharing |
title_full | (t, n) Threshold d-Level Quantum Secret Sharing |
title_fullStr | (t, n) Threshold d-Level Quantum Secret Sharing |
title_full_unstemmed | (t, n) Threshold d-Level Quantum Secret Sharing |
title_short | (t, n) Threshold d-Level Quantum Secret Sharing |
title_sort | (t, n) threshold d-level quantum secret sharing |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5527125/ https://www.ncbi.nlm.nih.gov/pubmed/28743880 http://dx.doi.org/10.1038/s41598-017-06486-4 |
work_keys_str_mv | AT songxiuli tnthresholddlevelquantumsecretsharing AT liuyanbing tnthresholddlevelquantumsecretsharing AT denghongyao tnthresholddlevelquantumsecretsharing AT xiaoyonggang tnthresholddlevelquantumsecretsharing |