用户名: 密码: 验证码:
基于d维纠缠交换的(t,n)门限量子秘密共享
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:( t,n) threshold quantum secret sharing based on d-dimensional entanglement swapping
  • 作者:宋秀丽 ; 徐建坤 ; 周道洋
  • 英文作者:Song Xiuli;Xu Jiankun;Zhou Daoyang;Chongqing Key Laboratory of Network Information Security Technology,Chongqing University of Posts & Telecommunications;
  • 关键词:d维Hilbert空间 ; (t ; n)门限 ; 纠缠交换 ; 量子秘密共享 ; 投影测量
  • 英文关键词:d-dimensional Hilbert space;;(t,n) threshold;;entanglement swapping;;quantum secret sharing;;projection measurement
  • 中文刊名:JSYJ
  • 英文刊名:Application Research of Computers
  • 机构:重庆邮电大学网络信息安全技术重庆市重点工程实验室;
  • 出版日期:2018-03-14 17:31
  • 出版单位:计算机应用研究
  • 年:2019
  • 期:v.36;No.331
  • 基金:国家自然科学基金资助项目(61772098,61772099);; 重庆市科学技术委员会基础科学与前沿技术项目(cstc2016jcyjA 0571);; 重庆邮电大学高端人才培养项目(BYJS2016002)
  • 语种:中文;
  • 页:JSYJ201905051
  • 页数:5
  • CN:05
  • ISSN:51-1196/TP
  • 分类号:241-244+265
摘要
以d维纠缠交换为技术手段,提出了一个(t,n)门限量子秘密共享方案。该方案执行t次d维纠缠交换,秘密影子聚合于重建者的V_1粒子中。重建者测量该粒子,可重建出共享的秘密。通过安全性分析可知,提出的方案能够抵抗截获—重放攻击、纠缠—测量攻击、合谋攻击和伪造攻击。性能分析表明,相较于其他现有类似量子秘密共享方案,该方案具有更好的灵活性、实用性和普适性,而且总的计算和测量所花费的开销是最低的。
        This paper proposed a(t,n) threshold quantum secret sharing scheme by means of d-dimensional entanglement swapping. The proposed scheme executed t times of d-dimensional entanglement swapping,which aggregated secret shadows into V_1 particle of the reconstructor. Finally,the reconstructor measured this particle to reconstruct the original secret. Security analysis shows that the proposed scheme can resist intercept-resend,entangle-measure,collusion and forgery attacks. By comparison with other similar schemes in performance,the proposed scheme is more flexible,practical and universal. In addition,its total overheads of computation and measurement are lowest in current similar quantum secret sharing schemes.
引文
[1]Hillery M,Buzek V,Berthiaume A.Quantum secret sharing[J].Physical Review A,1999,59(3):1829-1834.
    [2]Wang Wenhua,Cao Huaixin.An improved multiparty quantum secret sharing with Bell states and Bell measurement[J].International Journal of Theoretical Physics,2013,52(6):2099-2111.
    [3]Qin Huawang,Dai Yuewei.Efficient quantum secret sharing[J].Quantum Information Processing,2016,15(5):2091-2100.
    [4]Tan Xiaoqing,Jiang Lianxia.Improved three-party quantum secret sharing based on Bell states[J].International Journal of Theoretical Physics,2013,52(10):3577-3585.
    [5]Zhang Zhanjun,Man Zhongxiao.Multiparty quantum secret sharing based on entanglement swapping[EB/OL].(2004-12-22).http://doi.org/10.1103/physreva.72.022303.
    [6]Yang Wei,Huang Liusheng,Shi Runhua,et al.Secret sharing based on quantum Fourier transform[J].Quantum Information Processing,2013,12(7):2465-2474.
    [7]Tavakoli A,Herbauts I,6)Zukowski M,et al.Secret sharing with a single d-level quantum system[EB/OL].(2015-06-15).http://doi.org/10.1103/physreva.92.030302.
    [8]Yang Yuguang,Wen Qiaoyan.Circular threshold quantum secret sharing[J].Chinese Physics B,2008,17(2):419-423.
    [9]Li Baokui,Yang Yuguang,Wen Qiaoyan.Threshold quantum secret sharing of secure direct communication[J].Chinese Physics Letters,2009,26(1):21-24.
    [10]Cleve R,Gottesman D,Lo H K.How to share a quantum secret[J].Physical Review Letters,1999,83(3):648-651.
    [11]Guo Ying,Huang Dazu,Zeng Guihua,et al.Multiparty quantum secret sharing of quantum states using entanglement states[J].Chinese Physics Letters,2008,25(1):16-19.
    [12]Qin Huawang,Zhu Xiaohua,Dai Yuewei.(t,n)threshold quantum secret sharing using the phase shift operation[J].Quantum Information Processing,2015,14(8):1-8.
    [13]Xiao Heling,Gao Jingliang.Multi-party d-level quantum secret sharing scheme[J].International Journal of Theoretical Physics,2013,52(6):2075-2082.
    [14]Huang Dazu,Chen Zhigang,Guo Ying.Multiparty quantum secret sharing using quantum Fourier transform[J].Communications in Theoretical Physics,2009,51(2):221-226.
    [15]Qin Huawang,Dai Yuewei.Proactive quantum secret sharing[J].Quantum Information Processing,2015,14(11):4237-4244.
    [16]Song Tingting,Wen Qiaoyan,Qin Sujuan,et al.The general theory of three-party quantum secret sharing protocols over phase-damping channels[J].Quantum Information Processing,2013,12(10):3291-3304.
    [17]Dehkordi M H,Fattahi E.Threshold quantum secret sharing between multiparty and multiparty using Greenberger-Horne-Zeilinger state[J].Quantum Information Processing,2013,12(2):1299-1306.
    [18]Yang Yuguang,Jia Xin,Wang Hongyang,et al.Verifiable quantum(k,n)-threshold secret sharing[J].International Journal of Theoretical Physics,2011,50(3):792-798.
    [19]Deng Fuguo,Li Xihan,Zhou Hongyu.Efficient high-capacity quantum secret sharing with two-photon entanglement[J].Physics Letters A,2006,372(12):1957-1962.
    [20]Song Xiuli,Liu Yanbing.Cryptanalysis and improvement of verifiable quantum(k,n)secret sharing[J].Quantum Information Processing,2016,15(2):851-868.
    [21]Karimipour V,Bahraminasab A,Bagherinezhad S.Entanglement swapping of generalized cat states and secret sharing[EB/OL].(2002-04-23).http://doi.org/10.1103/physreva.65.042320.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700