Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state

Recently, Liu et al (2011 Phys. Scr. 84045015) pointed out that the multiparty quantum secret sharing (MQSS) protocol based on the GHZ state (Hwang et al 2011 Phys. Scr. 83045004) is insecure. They found that an inside participant can deduce half of the sender's secret information directly just by his piece of the secret. In order to resist this attack, an improvement was put forward. However, in this paper, we find that Liu et al's improved protocol is still insecure. We give details of three attack strategies to steal the secret information. It is shown that the eavesdropper can steal half or all of the secret information. Furthermore, a simple and ingenious MQSS protocol is proposed. We perform explicit cryptanalysis to prove that our improved protocol can resist the attacks from both the outside attackers and the inside participants, even the collusion attack.

[1]  Mitsugu Iwamoto,et al.  Quantum secret sharing schemes and reversibility of quantum operations (7 pages) , 2005 .

[2]  Deng Fu-Guo,et al.  Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)] , 2006 .

[3]  Xiu-Bo Chen,et al.  CRYPTANALYSIS AND IMPROVEMENT OF THE SECURE QUANTUM SEALED-BID AUCTION WITH POSTCONFIRMATION , 2011 .

[4]  Hoi-Kwong Lo,et al.  Some attacks on quantum-based cryptographic protocols , 2005, Quantum Inf. Comput..

[5]  Qiaoyan Wen,et al.  Quantum circuits for controlled teleportation of two-particle entanglement via a W state , 2008 .

[6]  Yixian Yang,et al.  Multi-party quantum secret sharing with the single-particle quantum state to encode the information , 2013, Quantum Inf. Process..

[7]  W. Munro,et al.  Quantum error correction for beginners , 2009, Reports on progress in physics. Physical Society.

[8]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[9]  Xiao-Fen Liu,et al.  Cryptanalysis of quantum secret sharing based on GHZ states , 2011 .

[10]  Yixian Yang,et al.  Centrally controlled quantum teleportation , 2010 .

[11]  H. Lo Classical-communication cost in distributed quantum-information processing: A generalization of quantum-communication complexity , 1999, quant-ph/9912009.

[12]  N. Gisin,et al.  Experimental demonstration of quantum secret sharing , 2001 .

[13]  Yixian Yang,et al.  Information leakage in three-party simultaneous quantum secure direct communication with EPR pairs , 2011 .

[14]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[15]  Haiming Long,et al.  The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution , 2013, Quantum Inf. Process..

[16]  Qiaoyan Wen,et al.  Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol , 2007, 0801.2418.

[17]  Tian-Yin Wang,et al.  CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM ENCRYPTION , 2008 .

[18]  L. Ioffe,et al.  Physical implementation of protected qubits , 2012, Reports on progress in physics. Physical Society.

[19]  Mitsugu Iwamoto,et al.  Quantum secret sharing schemes and reversibility of quantum operations , 2005 .

[20]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[21]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[22]  Tzonelih Hwang,et al.  Multiparty quantum secret sharing based on GHZ states , 2011 .

[23]  R. Cleve,et al.  HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.

[24]  W. Bowen,et al.  Tripartite quantum state sharing. , 2003, Physical review letters.