Cargando…

(t, n) Threshold d-Level Quantum Secret Sharing

Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares...

Descripción completa

Detalles Bibliográficos
Autores principales: Song, Xiu-Li, Liu, Yan-Bing, Deng, Hong-Yao, Xiao, Yong-Gang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5527125/
https://www.ncbi.nlm.nih.gov/pubmed/28743880
http://dx.doi.org/10.1038/s41598-017-06486-4
_version_ 1783252923288911872
author Song, Xiu-Li
Liu, Yan-Bing
Deng, Hong-Yao
Xiao, Yong-Gang
author_facet Song, Xiu-Li
Liu, Yan-Bing
Deng, Hong-Yao
Xiao, Yong-Gang
author_sort Song, Xiu-Li
collection PubMed
description Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants’ shares, even the trusted reconstructor Bob (1) is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n − 1.
format Online
Article
Text
id pubmed-5527125
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-55271252017-08-02 (t, n) Threshold d-Level Quantum Secret Sharing Song, Xiu-Li Liu, Yan-Bing Deng, Hong-Yao Xiao, Yong-Gang Sci Rep Article Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants’ shares, even the trusted reconstructor Bob (1) is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n − 1. Nature Publishing Group UK 2017-07-25 /pmc/articles/PMC5527125/ /pubmed/28743880 http://dx.doi.org/10.1038/s41598-017-06486-4 Text en © The Author(s) 2017 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
spellingShingle Article
Song, Xiu-Li
Liu, Yan-Bing
Deng, Hong-Yao
Xiao, Yong-Gang
(t, n) Threshold d-Level Quantum Secret Sharing
title (t, n) Threshold d-Level Quantum Secret Sharing
title_full (t, n) Threshold d-Level Quantum Secret Sharing
title_fullStr (t, n) Threshold d-Level Quantum Secret Sharing
title_full_unstemmed (t, n) Threshold d-Level Quantum Secret Sharing
title_short (t, n) Threshold d-Level Quantum Secret Sharing
title_sort (t, n) threshold d-level quantum secret sharing
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5527125/
https://www.ncbi.nlm.nih.gov/pubmed/28743880
http://dx.doi.org/10.1038/s41598-017-06486-4
work_keys_str_mv AT songxiuli tnthresholddlevelquantumsecretsharing
AT liuyanbing tnthresholddlevelquantumsecretsharing
AT denghongyao tnthresholddlevelquantumsecretsharing
AT xiaoyonggang tnthresholddlevelquantumsecretsharing