Detector-device-independent quantum secret sharing with source flaws
Abstract Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS pro...
Guardado en:
Autores principales: | , , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Nature Portfolio
2018
|
Materias: | |
Acceso en línea: | https://doaj.org/article/3f727ad5bdb4478b97eb445bf66ca847 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:3f727ad5bdb4478b97eb445bf66ca847 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:3f727ad5bdb4478b97eb445bf66ca8472021-12-02T15:07:49ZDetector-device-independent quantum secret sharing with source flaws10.1038/s41598-018-23876-42045-2322https://doaj.org/article/3f727ad5bdb4478b97eb445bf66ca8472018-04-01T00:00:00Zhttps://doi.org/10.1038/s41598-018-23876-4https://doaj.org/toc/2045-2322Abstract Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS protocol against all detector side-channels. We allow source flaws in practical QSS system, so that Charlie can securely distribute a key between the two agents Alice and Bob over long distances. Our protocol provides condition on the extracted key rate for the secret against both external eavesdropper and arbitrary dishonest participants. A tight bound for collective attacks can provide good bounds on the practical QSS with source flaws. Then we show through numerical simulations that using single-photon source a secure QSS over 136 km can be achieved.Xiuqing YangKejin WeiHaiqiang MaHongwei LiuZhenqiang YinZhu CaoLingan WuNature PortfolioarticleMedicineRScienceQENScientific Reports, Vol 8, Iss 1, Pp 1-6 (2018) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Medicine R Science Q |
spellingShingle |
Medicine R Science Q Xiuqing Yang Kejin Wei Haiqiang Ma Hongwei Liu Zhenqiang Yin Zhu Cao Lingan Wu Detector-device-independent quantum secret sharing with source flaws |
description |
Abstract Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS protocol against all detector side-channels. We allow source flaws in practical QSS system, so that Charlie can securely distribute a key between the two agents Alice and Bob over long distances. Our protocol provides condition on the extracted key rate for the secret against both external eavesdropper and arbitrary dishonest participants. A tight bound for collective attacks can provide good bounds on the practical QSS with source flaws. Then we show through numerical simulations that using single-photon source a secure QSS over 136 km can be achieved. |
format |
article |
author |
Xiuqing Yang Kejin Wei Haiqiang Ma Hongwei Liu Zhenqiang Yin Zhu Cao Lingan Wu |
author_facet |
Xiuqing Yang Kejin Wei Haiqiang Ma Hongwei Liu Zhenqiang Yin Zhu Cao Lingan Wu |
author_sort |
Xiuqing Yang |
title |
Detector-device-independent quantum secret sharing with source flaws |
title_short |
Detector-device-independent quantum secret sharing with source flaws |
title_full |
Detector-device-independent quantum secret sharing with source flaws |
title_fullStr |
Detector-device-independent quantum secret sharing with source flaws |
title_full_unstemmed |
Detector-device-independent quantum secret sharing with source flaws |
title_sort |
detector-device-independent quantum secret sharing with source flaws |
publisher |
Nature Portfolio |
publishDate |
2018 |
url |
https://doaj.org/article/3f727ad5bdb4478b97eb445bf66ca847 |
work_keys_str_mv |
AT xiuqingyang detectordeviceindependentquantumsecretsharingwithsourceflaws AT kejinwei detectordeviceindependentquantumsecretsharingwithsourceflaws AT haiqiangma detectordeviceindependentquantumsecretsharingwithsourceflaws AT hongweiliu detectordeviceindependentquantumsecretsharingwithsourceflaws AT zhenqiangyin detectordeviceindependentquantumsecretsharingwithsourceflaws AT zhucao detectordeviceindependentquantumsecretsharingwithsourceflaws AT linganwu detectordeviceindependentquantumsecretsharingwithsourceflaws |
_version_ |
1718388379260813312 |