(t, n) Threshold d-Level Quantum Secret Sharing

Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants’ shares, even the trusted reconstructor Bob1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n − 1.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Gilles Brassard,et al.  An Update on Quantum Cryptography , 1985, CRYPTO.

[3]  Paul Feldman,et al.  A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[4]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[5]  L. Hsu Quantum secret-sharing protocol based on Grover's algorithm , 2003 .

[6]  Fuguo Deng,et al.  Circular quantum secret sharing , 2006, quant-ph/0612018.

[7]  D. Markham,et al.  Graph states for quantum secret sharing , 2008, 0808.1532.

[8]  K. Thas The geometry of generalized Pauli operators of N-qudit Hilbert space, and an application to MUBs , 2009 .

[9]  杨宇光,et al.  Threshold Quantum Secret Sharing of Secure Direct Communication , 2009 .

[10]  Wen Qiao-Yan,et al.  Threshold Quantum Secret Sharing of Secure Direct Communication , 2009 .

[11]  Jia Li-Qun,et al.  ホロノミックシステムのためのAppell方程式のLie対称性とHojman保存量【Powered by NICT】 , 2009 .

[12]  A. Klappenecker,et al.  Sharing classical secrets with Calderbank-Shor-Steane codes , 2009 .

[13]  D. Markham,et al.  Quantum secret sharing with qudit graph states , 2010, 1004.4619.

[14]  Qiaoyan Wen,et al.  Verifiable Quantum (k,n)-threshold Secret Key Sharing , 2011 .

[15]  Zijian Diao,et al.  Quantum Counting: Algorithm and Error Distribution , 2012 .

[16]  P. Sarvepalli Nonthreshold quantum secret-sharing schemes in the graph-state formalism , 2012, 1202.3433.

[17]  Hua Zhang,et al.  Verifiable quantum (k, n)-threshold secret sharing , 2012, Quantum Inf. Process..

[18]  Wansu Bao,et al.  Multiparty quantum secret sharing scheme based on the phase shift operations , 2013 .

[19]  Anmin Fu,et al.  Cryptanalysis of a new circular quantum secret sharing protocol for remote agents , 2013, Quantum Inf. Process..

[20]  Tian-Yin Wang,et al.  Cryptanalysis of dynamic quantum secret sharing , 2013, Quantum Inf. Process..

[21]  Tzonelih Hwang,et al.  New circular quantum secret sharing for remote agents , 2013, Quantum Inf. Process..

[22]  Chia-Wei Tsai,et al.  Dynamic quantum secret sharing , 2013, Quantum Inf. Process..

[23]  Runhua Shi,et al.  Secret sharing based on quantum Fourier transform , 2013, Quantum Inf. Process..

[24]  Qiaoyan Wen,et al.  Eavesdropping on Multiparty Quantum Secret Sharing Scheme Based on the Phase Shift Operations , 2014 .

[25]  V. Karimipour,et al.  Quantum secret sharing and random hopping: Using single states instead of entanglement , 2015, 1506.02966.

[26]  Xiaohua Zhu,et al.  (t, n) Threshold quantum secret sharing using the phase shift operation , 2015, Quantum Inf. Process..

[27]  Fei Gao,et al.  Quantum secret sharing via local operations and classical communication , 2015, Scientific Reports.

[28]  M. Żukowski,et al.  Secret sharing with a single d -level quantum system , 2015 .

[29]  Yanbing Liu,et al.  Cryptanalysis and improvement of verifiable quantum (k, n) secret sharing , 2016, Quantum Inf. Process..

[30]  Yi Mu,et al.  Secure Multiparty Quantum Computation for Summation and Multiplication , 2016, Scientific Reports.