(t, n) Threshold d-Level Quantum Secret Sharing

Abstract Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Xiu-Li Song, Yan-Bing Liu, Hong-Yao Deng, Yong-Gang Xiao
Formato: article
Lenguaje:EN
Publicado: Nature Portfolio 2017
Materias:
R
Q
Acceso en línea:https://doaj.org/article/b4ef697c72214d8386ba76bcde22e155
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:b4ef697c72214d8386ba76bcde22e155
record_format dspace
spelling oai:doaj.org-article:b4ef697c72214d8386ba76bcde22e1552021-12-02T11:53:06Z(t, n) Threshold d-Level Quantum Secret Sharing10.1038/s41598-017-06486-42045-2322https://doaj.org/article/b4ef697c72214d8386ba76bcde22e1552017-07-01T00:00:00Zhttps://doi.org/10.1038/s41598-017-06486-4https://doaj.org/toc/2045-2322Abstract Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants’ shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n − 1.Xiu-Li SongYan-Bing LiuHong-Yao DengYong-Gang XiaoNature PortfolioarticleMedicineRScienceQENScientific Reports, Vol 7, Iss 1, Pp 1-9 (2017)
institution DOAJ
collection DOAJ
language EN
topic Medicine
R
Science
Q
spellingShingle Medicine
R
Science
Q
Xiu-Li Song
Yan-Bing Liu
Hong-Yao Deng
Yong-Gang Xiao
(t, n) Threshold d-Level Quantum Secret Sharing
description Abstract Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants’ shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n − 1.
format article
author Xiu-Li Song
Yan-Bing Liu
Hong-Yao Deng
Yong-Gang Xiao
author_facet Xiu-Li Song
Yan-Bing Liu
Hong-Yao Deng
Yong-Gang Xiao
author_sort Xiu-Li Song
title (t, n) Threshold d-Level Quantum Secret Sharing
title_short (t, n) Threshold d-Level Quantum Secret Sharing
title_full (t, n) Threshold d-Level Quantum Secret Sharing
title_fullStr (t, n) Threshold d-Level Quantum Secret Sharing
title_full_unstemmed (t, n) Threshold d-Level Quantum Secret Sharing
title_sort (t, n) threshold d-level quantum secret sharing
publisher Nature Portfolio
publishDate 2017
url https://doaj.org/article/b4ef697c72214d8386ba76bcde22e155
work_keys_str_mv AT xiulisong tnthresholddlevelquantumsecretsharing
AT yanbingliu tnthresholddlevelquantumsecretsharing
AT hongyaodeng tnthresholddlevelquantumsecretsharing
AT yonggangxiao tnthresholddlevelquantumsecretsharing
_version_ 1718394887542407168