Skip to main content
Log in

Cryptanalysis of dynamic quantum secret sharing

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

We analyze the security of a dynamic quantum secret sharing scheme. The analysis shows that the first agent and the last one can gain access to the dealer’s master key without the others’ cooperation by a special participant attack in this scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir, A.: How to shair a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  2. Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829–1834 (1999)

    Article  ADS  MathSciNet  Google Scholar 

  3. Tittel, W., Zbinden, H., Gisin, N.: Experimental demonstration of quantum secret sharing. Phys. Rev. A 63(4), 042301 (2001)

    Article  ADS  Google Scholar 

  4. Xiao, L., Long, G.L., Deng, F.G., et al.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307 (2004)

    Article  ADS  Google Scholar 

  5. Schmid, C., Trojek, P., Bourennane, M., et al.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95(23), 230505 (2005)

    Article  ADS  Google Scholar 

  6. Wang, T.Y., Wen, Q.Y., Chen, X.B., et al.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281(24), 6130–6134 (2008)

    Article  ADS  Google Scholar 

  7. Sun, Y., Wen, Q.Y., Gao, F., et al.: Multiparty quantum secret sharing based on Bell measurement. Opt. Commun. 282(17), 3647–3651 (2009)

    Article  ADS  Google Scholar 

  8. Shi, R.H., Huang, L.S., Yang, W., et al.: Multiparty quantum secret sharing with Bell states and Bell measurements. Opt. Commun. 283(11), 2476–2480 (2010)

    Article  ADS  Google Scholar 

  9. Shi, R.H., Huang, L.S., Yang, W., et al.: Quantum secret sharing between multiparty and multiparty with Bell states and Bell measurements. Sci. Chi. Ser. G 53(12), 2238–2244 (2010)

    Article  Google Scholar 

  10. Shi, J.J., Shi, R.H., Tang, Y., et al.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform. Quantum Inf. Process. 10(5), 653–670 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  11. Shi, R.H., Zhong, H.: Multiparty quantum secret sharing with the pure entangled two-photon states. Quantum Inf. Process. 11(1), 161–169 (2012)

    Google Scholar 

  12. Yang, Y.G., Wang, Y., Chai, H.P., et al.: Member expansion in quantum (t, n) threshold secret sharing schemes. Opt. Commun. 284(13), 3479–3482 (2011)

    Article  ADS  Google Scholar 

  13. Hsu, J.L., Chong S.K., Hwang, T., et al.: Dynamic quantum secret sharing. Quantum Inf. Process. doi:10.1007/s11128-012-0380-0

  14. Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)

    Article  ADS  Google Scholar 

  15. Wang, T.Y., Wen, Z.L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11(2), 455–463 (2012)

    Google Scholar 

  16. Lo, H.K., Ko, T.-M.: Some attacks on quantum-based cryptographic protocols. Quant. Inf. Comput. 5(1), 40–47 (2005)

    MATH  MathSciNet  Google Scholar 

  17. Gao, F., Wen, Q.Y., Zhu, F.C.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189–3194 (2008)

    Article  ADS  Google Scholar 

  18. Gao, F., Qin, S.J., Guo, F.Z., et al.: Dense-coding attack on threeparty quantum key distribution protocols. IEEE J. Quant. Electron. 47(5), 630–635 (2011)

    Article  ADS  Google Scholar 

  19. Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on “Quantum exam”. Phys. Lett. A 360(6), 748–750 (2007)

    Article  ADS  Google Scholar 

  20. Qin, S.J., Gao, F., Guo, F.Z., et al.: Comment on “Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair”. Phys. Rev. A 82(3), 036301 (2010)

    Article  ADS  MathSciNet  Google Scholar 

  21. Cai, Q.Y.: The “Ping-Pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91(10), 109801 (2003)

    Article  ADS  Google Scholar 

  22. Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77(1), 014302 (2008)

    Article  ADS  Google Scholar 

  23. Gao, F., Qin, S.J., Wen, Q.Y., et al.: A simple participant attack on the Bradler-Dusek protocol. Quant. Inf. Comput. 7(4), 329–334 (2007)

    Google Scholar 

  24. Qin, S.J., Gao, F., Wen, Q.Y., et al.: Cryptanalysis of the Hillery-Bužek-Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76(6), 062324 (2007)

    Article  ADS  Google Scholar 

  25. Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Comment on “experimental demonstration of a quantum protocol for Byzantine agreement and liar detection”. Phys. Rev. Lett. 101(20), 208901 (2008)

    Article  ADS  Google Scholar 

  26. Song, T.T., Zhang, J., Gao, F.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18(4), 1333–1337 (2009)

    Article  ADS  Google Scholar 

  27. Gao, F., Qin, S.J., Wen, Q.Y., et al.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. Opt. Commun. 283(1), 192–195 (2010)

    Article  ADS  Google Scholar 

  28. Guo, F.Z., Qin, S.J., Gao, F., et al.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D. 56(3), 445–448 (2010)

    Article  ADS  MathSciNet  Google Scholar 

  29. Wang, T.Y., Wen, Q.Y., Gao, F., et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)

    Article  ADS  MATH  Google Scholar 

  30. Wang, S.H., Chong, S.K., Hwang, T.: On “multiparty quantum secret sharing with Bell states and Bell measurements”. Opt. Commun. 283(21), 4405–4407 (2010)

    Article  ADS  Google Scholar 

  31. Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty quantum secret sharing with Bell states and Bell measurements. Opt. Commun. 284(6), 1711–1713 (2011)

    Article  ADS  MathSciNet  Google Scholar 

  32. Wang, T.Y., Wen, Q.Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. Comput. 11(5–6), 434–443 (2011)

    Google Scholar 

Download references

Acknowledgments

We are grateful to the anonymous reviewers for helpful comments. This work was supported by the National Natural Science Foundation of China (Grant Nos. 61152002, 61202317), the Open Foundation of State Key Laboratory of Information Security (Grant No. 01-04-2), the Natural Science Foundation of Henan Province (Grant No. 112300410192), the Young Key Teacher Foundation of Henan Province’s Universities (Grant No. 2012GGJS-157), the Natural Science Foundation of Education Bureau of Henan Province (Grant No. 2011A120006), and the Fundamental Research Funds for the Central Universities (Grant No. GK20-1002041).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tian-Yin Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, TY., Li, YP. Cryptanalysis of dynamic quantum secret sharing. Quantum Inf Process 12, 1991–1997 (2013). https://doi.org/10.1007/s11128-012-0508-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-012-0508-2

Keywords

Navigation