Some directions beyond traditional quantum secret sharing

We investigate two directions beyond the traditional quantum secret sharing (QSS). Firstly, a restriction on QSS that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets are permissible, provided some shares are withheld by the share dealer. We show that no more than λ−1 withheld shares are required, where λ is the minimum number of partially linked classes among the authorized sets for the QSS. Our result means that such applications of QSS need not be thwarted by the no-cloning theorem. Secondly, we point out a way of combining the features of QSS and quantum key distribution (QKD) for applications where classical information is shared by quantum means. We observe that in such case, it is often possible to reduce the security proof of QSS to that of QKD.

[1]  M. Koashi,et al.  Quantum entanglement for secret sharing and secret splitting , 1999 .

[2]  Josh Benaloh,et al.  Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.

[3]  S. Bandyopadhyay Teleportation and secret sharing with pure entangled states , 2000, quant-ph/0002032.

[4]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[5]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[6]  Sudhir Kumar Singh,et al.  Generalized quantum secret sharing , 2003, quant-ph/0307200.

[7]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[8]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[9]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[10]  W. Bowen,et al.  Tripartite quantum state sharing. , 2003, Physical review letters.

[11]  V. Karimipour,et al.  Entanglement swapping of generalized cat states and secret sharing , 2001, quant-ph/0112050.

[12]  Shor,et al.  Good quantum error-correcting codes exist. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[13]  V. Karimipour,et al.  Quantum secret sharing based on reusable GHZ states as secure carriers , 2002, quant-ph/0204124.

[14]  T. Beth,et al.  Codes for the quantum erasure channel , 1996, quant-ph/9610042.

[15]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[16]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[17]  R. Cleve,et al.  HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.

[18]  Fuguo Deng,et al.  Circular quantum secret sharing , 2006, quant-ph/0612018.

[19]  Ujjwal Sen,et al.  Unified criterion for security of secret sharing in terms of violation of Bell inequalities , 2003 .

[20]  Hideki Imai,et al.  Improving quantum secret-sharing schemes , 2001 .

[21]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[22]  Adan Cabello Quantum key distribution without alternative measurements , 2000 .

[23]  Yong-Sheng Zhang,et al.  Quantum key distribution via quantum encryption , 2000, quant-ph/0011034.

[24]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.