(t, n) Threshold d-Level Quantum Secret Sharing
Abstract Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least...
Guardado en:
Autores principales: | , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Nature Portfolio
2017
|
Materias: | |
Acceso en línea: | https://doaj.org/article/b4ef697c72214d8386ba76bcde22e155 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:b4ef697c72214d8386ba76bcde22e155 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:b4ef697c72214d8386ba76bcde22e1552021-12-02T11:53:06Z(t, n) Threshold d-Level Quantum Secret Sharing10.1038/s41598-017-06486-42045-2322https://doaj.org/article/b4ef697c72214d8386ba76bcde22e1552017-07-01T00:00:00Zhttps://doi.org/10.1038/s41598-017-06486-4https://doaj.org/toc/2045-2322Abstract Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants’ shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n − 1.Xiu-Li SongYan-Bing LiuHong-Yao DengYong-Gang XiaoNature PortfolioarticleMedicineRScienceQENScientific Reports, Vol 7, Iss 1, Pp 1-9 (2017) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Medicine R Science Q |
spellingShingle |
Medicine R Science Q Xiu-Li Song Yan-Bing Liu Hong-Yao Deng Yong-Gang Xiao (t, n) Threshold d-Level Quantum Secret Sharing |
description |
Abstract Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants’ shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n − 1. |
format |
article |
author |
Xiu-Li Song Yan-Bing Liu Hong-Yao Deng Yong-Gang Xiao |
author_facet |
Xiu-Li Song Yan-Bing Liu Hong-Yao Deng Yong-Gang Xiao |
author_sort |
Xiu-Li Song |
title |
(t, n) Threshold d-Level Quantum Secret Sharing |
title_short |
(t, n) Threshold d-Level Quantum Secret Sharing |
title_full |
(t, n) Threshold d-Level Quantum Secret Sharing |
title_fullStr |
(t, n) Threshold d-Level Quantum Secret Sharing |
title_full_unstemmed |
(t, n) Threshold d-Level Quantum Secret Sharing |
title_sort |
(t, n) threshold d-level quantum secret sharing |
publisher |
Nature Portfolio |
publishDate |
2017 |
url |
https://doaj.org/article/b4ef697c72214d8386ba76bcde22e155 |
work_keys_str_mv |
AT xiulisong tnthresholddlevelquantumsecretsharing AT yanbingliu tnthresholddlevelquantumsecretsharing AT hongyaodeng tnthresholddlevelquantumsecretsharing AT yonggangxiao tnthresholddlevelquantumsecretsharing |
_version_ |
1718394887542407168 |