Security of a kind of quantum secret sharing with single photons

The security of a kind of quantum secret sharing with single photons was analyzed recently, and it was shown that almost all the present schemes in this kind were not secure in the sense that an unauthorized set of participants can gain access to the dealer's secret without introducing any error. In this paper, we give a general model for this kind of quantum secret sharing. Then we analyze the conditions that make it immune to all the present attacks. Finally, we give a feasible way to design secure quantum secret sharing schemes in the model.

[1]  Barry C. Sanders,et al.  Continuous-variable quantum-state sharing via quantum disentanglement , 2004, quant-ph/0411191.

[2]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[3]  P. Hayden,et al.  Possibility, impossibility, and cheat sensitivity of quantum-bit string commitment , 2005, quant-ph/0504078.

[4]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[5]  E. Knill,et al.  Resilient Quantum Computation , 1998 .

[6]  Qiaoyan Wen,et al.  Improving the security of multiparty quantum secret sharing against an attack with a fake signal , 2006 .

[7]  Hong-Yu Zhou,et al.  Fake-signal-and-cheating attack on quantum secret sharing , 2006 .

[8]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[9]  Hideki Imai,et al.  Improving quantum secret-sharing schemes , 2001 .

[10]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[11]  Deng Fu-Guo,et al.  Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)] , 2006 .

[12]  Xiu-Bo Chen,et al.  An efficient and secure multiparty quantum secret sharing scheme based on single photons , 2008 .

[13]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[14]  H. Weinfurter,et al.  Experimental demonstration of four-party quantum secret sharing. , 2006, Physical review letters.

[15]  Tzonelih Hwang,et al.  Comment on 'Quantum secret sharing between multiparty and multiparty without entanglement' , 2006 .

[16]  G. Long,et al.  Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.

[17]  M. Koashi,et al.  Quantum entanglement for secret sharing and secret splitting , 1999 .

[18]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[19]  Shengyu Zhang,et al.  Set discrimination of quantum states , 2002 .

[20]  Guang-Can Guo,et al.  Quantum secret sharing without entanglement , 2002 .

[21]  Qiaoyan Wen,et al.  Cryptanalysis and improvement of multiparty quantum secret sharing schemes , 2008 .

[22]  M. Bourennane,et al.  Experimental quantum secret sharing using telecommunication fiber , 2008 .

[23]  Jian-Wei Pan,et al.  Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.

[24]  Gan Gao,et al.  Reexamining the security of the improved quantum secret sharing scheme , 2009 .

[25]  Qiaoyan Wen,et al.  Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol , 2007, 0801.2418.

[26]  V. Karimipour,et al.  Entanglement swapping of generalized cat states and secret sharing , 2001, quant-ph/0112050.

[27]  Dominic Mayers Unconditionally secure quantum bit commitment is impossible , 1997 .

[28]  Johannes Skaar,et al.  Security of quantum key distribution with bit and basis dependent detector flaws , 2008, Quantum Inf. Comput..

[29]  R. Cleve,et al.  Quantum fingerprinting. , 2001, Physical review letters.

[30]  D. Gottesman Theory of quantum secret sharing , 1999, quant-ph/9910067.

[31]  N. Gisin,et al.  Experimental demonstration of quantum secret sharing , 2001 .

[32]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[33]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[34]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[35]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[36]  Runyao Duan,et al.  Entanglement is not necessary for perfect discrimination between unitary operations. , 2007, Physical review letters.

[37]  A. Klappenecker,et al.  Sharing classical secrets with Calderbank-Shor-Steane codes , 2009 .

[38]  Zhan-jun Zhang,et al.  Multiparty quantum secret sharing , 2004, quant-ph/0412203.

[39]  Fuguo Deng,et al.  Improving the security of secure direct communication based on the secret transmitting order of particles , 2006, quant-ph/0612016.

[40]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[41]  Fuguo Deng,et al.  Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs (4 pages) , 2005, quant-ph/0504158.

[42]  W. Bowen,et al.  Tripartite quantum state sharing. , 2003, Physical review letters.

[43]  Shi-Jinn Horng,et al.  Comment on"A special attack on the multiparty quantum secret sharing of secure direct communication using single photons" , 2010 .

[44]  S. Bandyopadhyay Teleportation and secret sharing with pure entangled states , 2000, quant-ph/0002032.

[45]  Marco Lucamarini,et al.  Secure deterministic communication without entanglement. , 2005, Physical review letters.

[46]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[47]  R. Cleve,et al.  HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.

[48]  E. Knill,et al.  A scheme for efficient quantum computation with linear optics , 2001, Nature.

[49]  P. Hayden,et al.  Security of quantum bit string commitment depends on the information measure. , 2006, Physical review letters.

[50]  Sellami Ali,et al.  DECOY STATE QUANTUM KEY DISTRIBUTION , 2010 .

[51]  Hoi-Kwong Lo,et al.  Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.

[52]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[53]  Fei Gao,et al.  Security of quantum secret sharing with two-particle entanglement against individual attacks , 2009, Quantum Inf. Comput..

[54]  L. Hsu Quantum secret-sharing protocol based on Grover's algorithm , 2003 .

[55]  Fuguo Deng,et al.  Bidirectional quantum key distribution protocol with practical faint laser pulses , 2004 .

[56]  V. Karimipour Reply to 'Comment on 'Quantum secret sharing based on reusable Greenberger-Horne- Zeilinger states as secure carriers'' , 2005 .

[57]  A. Acín Statistical distinguishability between unitary operations. , 2001, Physical review letters.

[58]  Yi-Min Liu,et al.  Multiparty quantum secret sharing of secure direct communication using single photons , 2008 .

[59]  John Preskill,et al.  Security of quantum key distribution using weak coherent states with nonrandom phases , 2007, Quantum Inf. Comput..

[60]  D. Markham,et al.  Graph states for quantum secret sharing , 2008, 0808.1532.

[61]  Christian Kurtsiefer,et al.  Experimental single qubit quantum secret sharing. , 2005, Physical review letters.

[62]  Z. D. Wang,et al.  Single qubit quantum secret sharing with improved security , 2007, Quantum Inf. Comput..