Skip to main content
Log in

Cryptanalysis of secret sharing with a single d-level quantum system

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

In this work, we point out that the multiparty secret sharing protocol of Tavakoli et al. (Phys Rev A 92:030302, 2015) based on a single d-level quantum system (where d is a prime number) is insecure and low efficient. In our paper, we show that all the secrets of distributor R1 can be stolen by q dishonest participants with the probability (q/N)ξ. An important improvement is proposed to fix up this security loophole. Besides, another improvement is given to increase the efficiency from 1/d to 1.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India. IEEE, New York, pp. 175–179 (1984)

  2. Ekert, A.K.: Quantum cryptography based on Bell theorem. Phys. Rev. Lett. 67(6), 661–663 (1991)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  3. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  4. Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)

    Article  ADS  Google Scholar 

  5. Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)

    Article  ADS  Google Scholar 

  6. Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)

    Article  ADS  Google Scholar 

  7. Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)

    Article  ADS  Google Scholar 

  8. Wang, J., Zhang, Q., Tang, C.: Quantum secure direct communication based on order rearrangement of single photons. Phys. Lett. A 358(4), 256–258 (2006)

    Article  ADS  MATH  Google Scholar 

  9. Lee, H., Lim, J., Yang, H.J.: Quantum direct communication with authentication. Phys. Rev. A 73(4), 042305 (2006)

    Article  ADS  Google Scholar 

  10. Lin, S., Wen, Q.Y., Gao, F., et al.: Quantum secure direct communication with Chi-type entangled states. Phys. Rev. A 78(6), 064304 (2008)

    Article  ADS  Google Scholar 

  11. Farouk, A., Zakaria, M., Megahed, A., et al.: A generalized architecture of quantum secure direct communication for N disjointed users with authentication. Sci. Rep. 5, 16080 (2015)

    Article  ADS  Google Scholar 

  12. Hu, J.Y., Yu, B., Jing, M.Y., et al.: Experimental quantum secure direct communication with single photons. Light Sci. Appl. 5, e16144 (2016)

    Article  Google Scholar 

  13. Zhu, F., Zhang, W., Sheng, Y., et al.: Experimental long-distance quantum secure direct communication. Sci. Bull. 62(22), 1519–1524 (2017)

    Article  Google Scholar 

  14. Zhang, W., Ding, D.S., Sheng, Y.B., et al.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118(22), 220501 (2017)

    Article  ADS  Google Scholar 

  15. Wu, F.Z., Yang, G.J., Wang, H.B., et al.: High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states. Sci. China Phys. Mech. Astron. 57, 2024 (2014)

    Article  ADS  Google Scholar 

  16. Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92, 030301 (2015)

    Article  ADS  MathSciNet  Google Scholar 

  17. Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829 (1999)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  18. Sen, A., Sen, U., Zukowski, M.: Unified criterion for security of secret sharing in terms of violation of Bell inequalities. Phys. Rev. A 68, 032309 (2003)

    Article  ADS  MathSciNet  Google Scholar 

  19. Yu, I.C., Lin, F.L., Huang, C.Y.: Quantum secret sharing with multilevel mutually (un)biased bases. Phys. Rev. A 78, 012344 (2008)

    Article  ADS  Google Scholar 

  20. Schmid, C., Trojek, P., Bourennane, M., et al.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95(23), 230505 (2005)

    Article  ADS  Google Scholar 

  21. He, G.P.: Comment on “Experimental single qubit quantum secret sharing”. Phys. Rev. Lett. 98(2), 028901 (2007)

    Article  ADS  Google Scholar 

  22. Tavakoli, A., Herbauts, I., Zukowski, M., et al.: Secret sharing with a single-level quantum system. Phys. Rev. A 92, 030302 (2015)

    Article  ADS  Google Scholar 

  23. Lin, S., Guo, G.D., Xu, Y.Z., et al.: Cryptanalysis of quantum secret sharing with d-level single particles. Phys. Rev. A 93, 062343 (2016)

    Article  ADS  Google Scholar 

  24. Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 052307 (1999)

    Article  Google Scholar 

  25. Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)

    Article  ADS  Google Scholar 

  26. Gottesman, D.: Theory of quantum secret sharing. Phys. Rev. A 61, 042311 (2000)

    Article  ADS  MathSciNet  Google Scholar 

  27. Xiao, L., Long, G.L., Deng, F.G., et al.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307 (2004)

    Article  ADS  Google Scholar 

  28. Zhang, Z., Li, Y., Man, Z.: Multiparty quantum secret sharing. Phys. Rev. A 71(4), 044301 (2005)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  29. Deng, F.G., Zhou, H.Y., Long, G.L.: Circular quantum secret sharing. J. Phys. A Math. Gen. 39(45), 14089–14099 (2006)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  30. Hao, L., Wang, C., Long, G.L.: Quantum secret sharing protocol with four state Grover algorithm and its proof-of-principle experimental demonstration. Opt. Commun. 284(14), 3639–3642 (2011)

    Article  ADS  Google Scholar 

  31. Wei, K.J., Ma, H.Q., Yang, J.H.: Experimental circular quantum secret sharing over telecom fiber network. Opt. Express 21(14), 16663–16669 (2013)

    Article  ADS  Google Scholar 

  32. Huang, W., Su, Q., Xu, B.J., et al.: Improved multiparty quantum key agreement in travelling mode. Sci. China Phys. Mech. Astron. 59(12), 120311 (2016)

    Article  Google Scholar 

  33. Zhang, K.J., Zhang, L., Song, T.T., et al.: A potential application in quantum networks—deterministic quantum operation sharing schemes with Bell states. Sci. China Phys. Mech. Astron. 59(6), 660302 (2016)

    Article  Google Scholar 

  34. Song, X., Liu, Y.: Cryptanalysis and improvement of verifiable quantum (k, n) secret sharing. Quantum Inf. Process. 15(2), 851–868 (2016)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  35. Jiang, T.S., Jiang, Z.W., Ling, S.T.: An algebraic method for quaternion and complex least squares coneigen-problem in quantum mechanics. Appl. Math. Comput. 249, 222–228 (2014)

    MathSciNet  MATH  Google Scholar 

  36. Dong, H.H., Zhang, Y.F., Zhang, Y.F., Yin, B.S.: Generalized bilinear differential operators, binary bell polynomials, and exact periodic wave solution of boiti-leon-manna-pempinelli equation. Abstr. Appl. Anal. 2014, 738609 (2014)

  37. Qin, H., Dai, Y.: Dynamic quantum secret sharing by using d-dimensional GHZ state. Quantum Inf. Process. 16(3), 64 (2017)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  38. Deng, F.G., Ren, B.C., Li, X.H.: Quantum hyperentanglement and its applications in quantum information processing. Sci. Bull. 62(1), 46–68 (2017)

    Article  Google Scholar 

  39. Adhikari, S.: Quantum secret sharing with two qubit bipartite mixed states (2010). arXiv:1011.2868

  40. Adhikari, S., Chakrabarty, I., Agrawal, P.: Probabilistic secret sharing through noise quantum channel. Quantum Inf. Comput. 12, 0253 (2012)

    MathSciNet  MATH  Google Scholar 

  41. Sazim, S., Chiranjeevi, V., Chakrabarty, I., et al.: Retrieving and routing quantum information in a quantum network. Quantum Inf. Process. 14(12), 4651–4664 (2015)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  42. Ray, M., Chatterjee, S., Chakrabarty, I.: Sequential quantum secret sharing in a noisy environment aided with weak measurements. Eur. Phys. J. D 70, 114 (2016)

    Article  ADS  Google Scholar 

  43. Gisin, N., Ribordy, G., Tittel, W., et al.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)

    Article  ADS  MATH  Google Scholar 

  44. Qin, S.J., Gao, F., Wen, Q.Y., et al.: Cryptanalysis of the Hillery–Bužek–Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76, 062324 (2007)

    Article  ADS  Google Scholar 

  45. Gao, F., Qin, S.J., Wen, Q.Y., et al.: A simple participant attack on the Brádler–Dušek protocol. Quantum Inf. Comput. 7, 329 (2007)

    MathSciNet  MATH  Google Scholar 

  46. Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Comment on “Experimental demonstration of a quantum protocol for byzantine agreement and liar detection”. Phys. Rev. Lett. 101, 208901 (2008)

    Article  ADS  Google Scholar 

  47. Gao, F., Qin, S.J., Wen, Q.Y., et al.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283, 192 (2010)

    Article  ADS  Google Scholar 

Download references

Acknowledgements

This project was supported by NSFC (Grant Nos. 61671087, 61272514, 61170272, 61003287), the Fok Ying Tong Education Foundation (Grant No. 131067), the Major Science and Technology Support Program of Guizhou Province under Grant 20183001 and Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data (2017BDKFJJ007).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gang Xu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, XB., Tang, X., Xu, G. et al. Cryptanalysis of secret sharing with a single d-level quantum system. Quantum Inf Process 17, 225 (2018). https://doi.org/10.1007/s11128-018-1988-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-018-1988-5

Keywords

Navigation