Abstract
This paper proposed a novel dynamic quantum secret sharing protocol in high-dimensional quantum system. Via transmitting the particles circularly and local unitary operations, the dealer and all agents can share the multi-particle entangled GHZ state in high-dimensional quantum system. The proposed protocol allows a dealer to share the predetermined dits without directly distributing any piece of shares to agents. To recover the secrets, dealer and all agents only need to perform the single-particle measurement operation and then implement the simple modular arithmetic operation according to their corresponding measurement results. Besides, in the proposed protocol, only a little fraction of entangled GHZ states are employed for eavesdropping check instead of lots of decoy (or detecting) particles used in previous protocols. Since the protocol is designed in the high-dimensional quantum system, it makes our protocol have higher resource capacity and better security in detecting the illegal eavesdropper than former protocols designed in two-dimensional quantum system. Security analyses indicate that the proposed protocol is immune to general attacks of intercept-and-resend, entangle-and-measure, collusion, and revoked a dishonest agent. Furthermore, the efficiency of proposed DQSS protocol in noise environment is deduced through quantum fidelity. The obtained results indicate that the efficiency of proposed protocol decreases with the increase in channel noise parameter and it has a quite different efficiency in four types of noise, i.e., dit-flip, d-phase-flip, amplitude-damping and depolarizing.



Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University, Cambridge, England (2010)
Zidan, M.: A novel quantum computing model based on entanglement degree. Mod. Phys. Lett. B 34, 2050401 (2020)
Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 1484 (1997)
Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79, 325 (1997)
Zidan, M., Abdel-Aty, A., Nguyene, D.M., et al.: A quantum algorithm based on entanglement measure for classifying multi-variate function into novel hidden classes. Results Phys. 15, 102549 (2019)
Gordon, G., Rigolin, G.: Generalized teleportation protocol. Phys. Rev. A. 73, 042309 (2006)
Deutsch, D.: Quantum theory, the church-turing principle and the universal quantum computer. Proc. R. Soc. Lond. A. 400, 97 (1985)
Zidan, M., Eleuch, H., Abdel-Aty, M.: Non-classical computing problems: Toward novel type of quantum computing problems. Results Phys. 21, 103536 (2021)
Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 560, 7–11 (2014)
Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991)
C.H. Bennett, G. Brassard, C. Crepeau, R. Jozsa, A, Peres, and W.K. Wootters, “Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels,” Phys. Rev. Lett., 70, 1895 (1993).
Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829 (1999)
Chen, X.B., Sun, Y.R., Xu, G., et al.: Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing. Inform. Sci. 501, 172 (2019)
Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)
Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)
Xu, G., Xiao, K., Li, Z.P., et al.: Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States. Cmc-Comput. Mater. Con. 58, 809–827 (2019)
Liu, X.S., Long, G.L., Tong, D.M., Li, F.: General scheme for super dense coding between multi-parties. Phys. Rev. A 65, 022304 (2002)
Gu, B., Li, C.Q., Xu, F., Chen, Y.L.: High-capacity three-party quantum secret sharing with superdense coding. Chin. Phys. B 18, 4690 (2009)
Li, Y.C., Zhou, R.G., Xu, R.Q., Luo, J., Hu, W.W.: A quantum deep convolutional neural network for image recognition. Quantum Sci. Technol. 5, 044003 (2020)
Li YC, Zhou RG, Xu RQ, J. Luo, S.X. Jiang, “A quantum mechanics-based framework for EEG signal feature extraction and classification,” in IEEE T. Emerg. Top Com. (2020), doi: https://doi.org/10.1109/TETC.2020.3000734.
Li, Y.C., Zhou, R.G., Xu, R.Q., Hu, W.W., Fan, P.: Quantum algorithm for the nonlinear dimensionality reduction with arbitrary kernel. Quantum Sci. Technol. 6, 014001 (2020)
Shamir, A.: How to share a secret. Commun. ACM. 22, 612–613 (1979)
G. R. Blakley, “Safeguarding cryptographic key,” In 1979 International Workshop on Managing Requirements Knowledge (MARK), New York, NY, USA, 1979, pp. 313-318https://doi.org/10.1109/MARK.1979.8817296
Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)
Li, X., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004)
T. Gao, F.L. Yan, LI, and Y.C. Li, “Quantum secret sharing between m-party and n-party with six states,” Sci. China Ser. G Phys. Mech. Astron., 52, 1191–1202 (2009).
Shi, R.H., Huang, L.S., Yang, W., Zhong, H.: Quantum secret sharing between multiparty and multiparty with Bell states and Bell measurements. Sci. China-Phys. Mech. Astron. 53, 2238–2244 (2010)
Tsai, C.W., Hwang, T.: Multi-party quantum secret sharing based on two special entangled states. Sci. China-Phys. Mech. Astron. 55, 460–464 (2012)
Massoud, H.D., Elham, F.: A novel and efficient multiparty quantum secret sharing scheme using entangled states. Sci. China-Phys. Mech. Astron. 55, 1828–1831 (2012)
Yang, Y.G., Wen, Q.Y.: Sci. China Ser. G-Phys. Mech. Astron. 51(9), 1308–1315 (2008)
Song, X.L., Liu, Y.B., Deng, H.Y., Xiao, Y.G.: Threshold quantum secret sharing between multi-party and multi-party. Sci. Rep. 7, 6366 (2017)
Kartick, S., Hari, O.: Efficient quantum secret sharing without a trusted player. Quantum Inf. Process. 19, 73 (2020)
Wang, M.M., Chen, X.B., Yang, Y.X.: Quantum secret sharing for general access structures based on multiparticle entanglements. Quantum Inf. Process. 13, 429–443 (2014)
Mashhadi, S.: General secret sharing based on quantum Fourier transform. Quantum Inf. Process. 18, 114 (2019)
Jia, H.Y., Wen, Q.Y., Gao, F., Qin, S.J., Guo, F.Z.: Dynamic quantum secret sharing. Phys. Letts. A 376, 1035–1041 (2012)
Hsu, J.L., Chong, S.K., Hwang, T., Tsai, C.W.: Dynamic quantum secret sharing. Quantum Inf. Process. 12, 331–344 (2013)
Wang, T.Y., Li, Y.P.: Cryptanalysis of dynamic quantum secret sharing. Quantum Inf. Process. 12, 1991–1997 (2013)
Liao, C.H., Yang, C.W., Hwang, T.: Comment on “Dynamic quantum secret sharing.” Quantum Inf. Process. 12, 3143–3147 (2013)
Liao, C.H., Yang, C.W., Hwang, T.: Dynamic quantum secret sharing protocol based on GHZ state. Quantum Inf. Process. 13, 1907–1916 (2014)
Mishra, S., Shukla, C., Pathak, A., Srikanth, R., Venugopalan, A.: An integrated hierarchical dynamic quantum secret sharing protocol. Int. J. Theor. Phys. 54, 3143–3154 (2015)
Liu, H., Ma, H., Wei, K., Yang, X., Qu, W., Dou, T., Chen, Y., Li, R., Zhu, W.: Multi-group dynamic quantum secret sharing with single photons. Phys. Lett. A 380, 2349–2353 (2016)
Qin, H.W., Dai, Y.W.: Dynamic quantum secret sharing by using d-dimensional GHZ state. Quantum Inf. Process. 16, 64 (2017)
Song, Y., Li, Z.H., Li, Y.M.: A dynamic multiparty quantum direct secret sharing based on generalized GHZ states. Quantum Inf. Process. 17, 244 (2018)
Yang, C.W., Tsai, C.W.: Efficient and secure dynamic quantum secret sharing protocol based on bell states. Quantum Inf. Process. 19, 162 (2020)
Vahid, K., Alireza, B., Saber, B.: Entanglement swapping of generalized cat states and secret sharing. Phys. Rev. A 65, 042320 (2002)
Wang, X., Liu, Y.M., Han, L.F., Zhang, Z.J.: Multiparty quantum secret sharing of secure direct communication with high-dimensional quantum superdense coding. Int. J. Quantum Inf. 6, 1155–1163 (2008)
Yu, I.C., Lin, F.L., Huang, C.Y.: Quantum secret sharing with multi-level mutually (un-)biased bases. Phys. Rev. A 78, 012344 (2008)
Liu, Z.H., Chen, H.W., Xu, J.: High-dimensional deterministic multiparty quantum secret sharing without unitary operations. Quantum Inf. Process. 11, 1785–1795 (2012)
M.M. Wang, L.T. Tian, and Z.G. Qu, “Efficient Multiparty Quantum Secret Sharing Scheme in High-dimensional System,” In International Conference on Cloud Computing and Security, Lecture Notes in Computer Science, pp: 23–31. Available: https://doi.org/https://doi.org/10.1007/978-3-030-00012-7_3.
Qin, H.W., Tang, W., Tso, R.L.: Hierarchical Quantum Secret Sharing Based On Special High-dimensional Entangled State. IEEE J. Sel. Top. Quant. 26, 6600106 (2020)
Vahid, K., Alireza, B., Saber, B.: Quantum key distribution for d-level systems with generalized Bell states. Phys. Rev. A 65, 052331 (2002)
Wootters, W.K., Fields, B.D.: Optimal state-determination by mutually unbiased measurements. Ann. Phys. 191, 363–381 (1989)
Pittenge, A.O., Rubin, M.H.: Mutually unbiased bases, generalized spin matrices and separability. Linear Algebra Appl. 390, 255 (2004)
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)
Fonseca, A.: High-dimensional quantum teleportation under noisy environments. Phys. Rev. A 100, 062311 (2019)
Bertlmann, R.A., Krammer, P.: Bloch vectors for qudits. J. Phys. A 41, 235303 (2008)
Acknowledgements
The author expresses his/her thanks to the people helping with this work, and acknowledges the valuable suggestions from the peer reviewers. This work is supported by the Shanghai Science and Technology Project in 2020 under Grant No.20040501500; the National Natural Science Foundation of China under Grant No. 61763014 and No. 62062035; the Science and technology research project of Jiangxi Provincial Education Department under Grant No. GJJ190297.
Author information
Authors and Affiliations
Corresponding author
Appendix A
Appendix A
Let us assume that Alice first prepares the generalized Bell state \(\left| {\psi \left( {0,0} \right)} \right\rangle = \frac{1}{\sqrt d }\sum\limits_{m = 0}^{d - 1} {\left| {m,m} \right\rangle_{12} }\), and transmits the second particle among all agents (Bob1, Bob2, …, Bobn) and herself. After each agent’s local unitary operation RSc, it would form a (n + 2)-particle generalized GHZ state \(\left| {\psi \left( {0,0,0, \cdots ,0} \right)} \right\rangle_{1,2,3, \cdots ,n + 2}\), and the whole operation can be expressed as:
where \(RS_{C} \left( {2,j} \right)\) represents the implementation of local unitary operation RSC on two qudits, and the second qudit and j-th qudit, respectively, act as the control qudit and target qudit.
When Alice performs local unitary operation LSC on two qudits (i.e., the first qudit and second qudit), where the first qudit acts control qudit and second qudit acts the target qudit, the above (n + 2)-qudit GHZ state would transform into following forms:
Now, it is easy to find that second qudit in above quantum state \(\left| {\psi^{ * } } \right\rangle\) (i.e., particles in sequence ST) being quantum state \(\left| 0 \right\rangle\) has disentangled with other (n + 1) qudits. Thus, when Alice measures the second qudit in Z-basis, the remaining (n + 1) qudits transform into following GHZ state:
Hence, when the generalized Hadamard transform Hd is performed on each qudit in state \(\left| {\psi \left( {0,0, \cdots ,0} \right)} \right\rangle_{1,2,3, \cdots ,n + 1}\), Eq. (48) would transform into following form:
The last equation in Eq. (49) can be further proved as follows:
Let us denote that \(S = \sum\nolimits_{m = 0}^{d - 1} {w^{km} }\) and accordingly denotes \(k = s_{H} + s_{1} + \cdots + s_{n}\), where \(w = e^{{{{2\pi i} \mathord{\left/ {\vphantom {{2\pi i} d}} \right. \kern-\nulldelimiterspace} d}}}\), then we can calculate the sum S as:
If \(k \ne 0 \, \left( {mod \, d} \right)\), then \(w = e^{{{{2\pi ik} \mathord{\left/ {\vphantom {{2\pi ik} d}} \right. \kern-\nulldelimiterspace} d}}} \ne 1\). Hence, the sum S is calculated as:
In other case, if \(k \equiv 0 \, \left( {mod \, d} \right)\), then we have \(e^{{{{2\pi ikm} \mathord{\left/ {\vphantom {{2\pi ikm} d}} \right. \kern-\nulldelimiterspace} d}}} = e^{2\pi im} = 1\) for any \(m \in \left\{ {0, \, d - 1} \right\}\). Thus, the sum S is calculated as:
In summary, we have:
Hence, based on Eq. (52), we can verify the last equation of above-mentioned Eq. (49). And accordingly, the correctness of previous mentioned Eq. (11) is proved.
Rights and permissions
About this article
Cite this article
Hu, W., Zhou, RG., Li, X. et al. A novel dynamic quantum secret sharing in high-dimensional quantum system. Quantum Inf Process 20, 159 (2021). https://doi.org/10.1007/s11128-021-03103-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-021-03103-2