Abstract
We analyze the security of a dynamic quantum secret sharing scheme. The analysis shows that the first agent and the last one can gain access to the dealer’s master key without the others’ cooperation by a special participant attack in this scheme.
Similar content being viewed by others
References
Shamir, A.: How to shair a secret. Commun. ACM 22(11), 612–613 (1979)
Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829–1834 (1999)
Tittel, W., Zbinden, H., Gisin, N.: Experimental demonstration of quantum secret sharing. Phys. Rev. A 63(4), 042301 (2001)
Xiao, L., Long, G.L., Deng, F.G., et al.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307 (2004)
Schmid, C., Trojek, P., Bourennane, M., et al.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95(23), 230505 (2005)
Wang, T.Y., Wen, Q.Y., Chen, X.B., et al.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281(24), 6130–6134 (2008)
Sun, Y., Wen, Q.Y., Gao, F., et al.: Multiparty quantum secret sharing based on Bell measurement. Opt. Commun. 282(17), 3647–3651 (2009)
Shi, R.H., Huang, L.S., Yang, W., et al.: Multiparty quantum secret sharing with Bell states and Bell measurements. Opt. Commun. 283(11), 2476–2480 (2010)
Shi, R.H., Huang, L.S., Yang, W., et al.: Quantum secret sharing between multiparty and multiparty with Bell states and Bell measurements. Sci. Chi. Ser. G 53(12), 2238–2244 (2010)
Shi, J.J., Shi, R.H., Tang, Y., et al.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform. Quantum Inf. Process. 10(5), 653–670 (2011)
Shi, R.H., Zhong, H.: Multiparty quantum secret sharing with the pure entangled two-photon states. Quantum Inf. Process. 11(1), 161–169 (2012)
Yang, Y.G., Wang, Y., Chai, H.P., et al.: Member expansion in quantum (t, n) threshold secret sharing schemes. Opt. Commun. 284(13), 3479–3482 (2011)
Hsu, J.L., Chong S.K., Hwang, T., et al.: Dynamic quantum secret sharing. Quantum Inf. Process. doi:10.1007/s11128-012-0380-0
Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)
Wang, T.Y., Wen, Z.L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11(2), 455–463 (2012)
Lo, H.K., Ko, T.-M.: Some attacks on quantum-based cryptographic protocols. Quant. Inf. Comput. 5(1), 40–47 (2005)
Gao, F., Wen, Q.Y., Zhu, F.C.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189–3194 (2008)
Gao, F., Qin, S.J., Guo, F.Z., et al.: Dense-coding attack on threeparty quantum key distribution protocols. IEEE J. Quant. Electron. 47(5), 630–635 (2011)
Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on “Quantum exam”. Phys. Lett. A 360(6), 748–750 (2007)
Qin, S.J., Gao, F., Guo, F.Z., et al.: Comment on “Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair”. Phys. Rev. A 82(3), 036301 (2010)
Cai, Q.Y.: The “Ping-Pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91(10), 109801 (2003)
Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77(1), 014302 (2008)
Gao, F., Qin, S.J., Wen, Q.Y., et al.: A simple participant attack on the Bradler-Dusek protocol. Quant. Inf. Comput. 7(4), 329–334 (2007)
Qin, S.J., Gao, F., Wen, Q.Y., et al.: Cryptanalysis of the Hillery-Bužek-Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76(6), 062324 (2007)
Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Comment on “experimental demonstration of a quantum protocol for Byzantine agreement and liar detection”. Phys. Rev. Lett. 101(20), 208901 (2008)
Song, T.T., Zhang, J., Gao, F.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18(4), 1333–1337 (2009)
Gao, F., Qin, S.J., Wen, Q.Y., et al.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. Opt. Commun. 283(1), 192–195 (2010)
Guo, F.Z., Qin, S.J., Gao, F., et al.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D. 56(3), 445–448 (2010)
Wang, T.Y., Wen, Q.Y., Gao, F., et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)
Wang, S.H., Chong, S.K., Hwang, T.: On “multiparty quantum secret sharing with Bell states and Bell measurements”. Opt. Commun. 283(21), 4405–4407 (2010)
Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty quantum secret sharing with Bell states and Bell measurements. Opt. Commun. 284(6), 1711–1713 (2011)
Wang, T.Y., Wen, Q.Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. Comput. 11(5–6), 434–443 (2011)
Acknowledgments
We are grateful to the anonymous reviewers for helpful comments. This work was supported by the National Natural Science Foundation of China (Grant Nos. 61152002, 61202317), the Open Foundation of State Key Laboratory of Information Security (Grant No. 01-04-2), the Natural Science Foundation of Henan Province (Grant No. 112300410192), the Young Key Teacher Foundation of Henan Province’s Universities (Grant No. 2012GGJS-157), the Natural Science Foundation of Education Bureau of Henan Province (Grant No. 2011A120006), and the Fundamental Research Funds for the Central Universities (Grant No. GK20-1002041).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, TY., Li, YP. Cryptanalysis of dynamic quantum secret sharing. Quantum Inf Process 12, 1991–1997 (2013). https://doi.org/10.1007/s11128-012-0508-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-012-0508-2