Skip to main content
Log in

General secret sharing based on quantum Fourier transform

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

In this paper, we based on the quantum Fourier transform and monotone span program design a hybrid secret sharing. This hybrid scheme has the advantages of both classical and quantum secret sharing. For example, it has general access structure, and is secure against quantum computation and eavesdropper attacks. Moreover, any one of the participants does not know the other participants’ shares.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Cai, Q.Y., Li, W.B.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601–603 (2004)

    Article  ADS  Google Scholar 

  2. Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)

    Article  ADS  Google Scholar 

  3. Guo, C., Chang, C.-C., Qin, C.: A multi-threshold secret image sharing scheme based on MSP. Pattern Recognit. Lett. 33, 1594–1600 (2012)

    Article  Google Scholar 

  4. Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 18291834 (1999)

    Article  MathSciNet  Google Scholar 

  5. Hsu, C.-F., Cheng, Q., Tang, X., Zeng, B.: An ideal multi-secret sharing scheme based on MSP. Inf. Sci. 181, 1403–1409 (2011)

    Article  MathSciNet  Google Scholar 

  6. Hsu, C.-F., Cui, G.-H., Cheng, Q., Chen, J.: A novel linear multi-secret sharing scheme for group communication in wireless mesh networks. J. Netw. Comput. Appl. 34, 464–468 (2011)

    Article  Google Scholar 

  7. Hsu, C.-F., Harn, L., Cui, G.: An ideal multi-secret sharing scheme based on connectivity of graphs. Wirel. Pers. Commun. 77, 383–394 (2014)

    Article  Google Scholar 

  8. Kao, S.-H., Hwang, T.: Comment on \((t,n)\) threshold \(d\)-level quantum secret sharing, arXiv:1803.00216v1 (2018)

  9. Karchmer, M., Wigderson, A.: On span programs. In: Proceedings of the Eighth Annual Conference on Structure in Complexity, San Diego, CA, pp. 102–111 (1993)

  10. Karimifard, Z., Mashhadi, S., Ebrahimi, D.: Semiquantum secret sharing using three particles without entanglement. J. Electron. Cyber Def. 4, 83–92 (2016)

    Google Scholar 

  11. Liu, M., Xiao, L., Zhang, Z.: Linear multi-secret sharing schemes based on multi-party computation. Finite Fields Their Appl. 12, 704–713 (2006)

    Article  MathSciNet  Google Scholar 

  12. Ma, C., Ding, X.: Proactive verifiable linear integer secret sharing scheme. Inf. Commun. Secur. LNCS 5927, 439–448 (2009)

    Article  Google Scholar 

  13. Mashhadi, S.: Secure publicly verifiable and proactive secret sharing schemes with general access structure. Inf. Sci. 378, 99–108 (2017)

    Article  MathSciNet  Google Scholar 

  14. Mashhadi, S., Hadian Dehkordi, M., Kiamari, N.: Provably secure verifiable multi-stage secret sharing scheme based on monotone span program. IET Inf. Secur. 11, 326331 (2017)

    Article  Google Scholar 

  15. Qin, H.: \(d\)-Dimensional quantum secret sharing without entanglement. J. Chin. Inst. Eng. 39, 623–626 (2016)

    Article  Google Scholar 

  16. Qin, H., Dai, Y.: \(d\)-Dimensional quantum state secret sharing with adversary structure. Quntum Inf. Process. 15, 1689–1701 (2016)

    Article  ADS  Google Scholar 

  17. Qin, H., Dai, Y.: Verifiable \((t, n)\) threshold quantum secret sharing using \(d\)-dimensional Bell state. Inf. Process. Lett. 116, 351–355 (2016)

    Article  MathSciNet  Google Scholar 

  18. Qin, H., Tso, R., Dai, Y.: Multi-dimensional quantum state sharing based on quantum Fourier transform. Quntum Inf. Process. 17, 48 (2018). https://doi.org/10.1007/s11128-018-1827-8

    Article  ADS  MathSciNet  MATH  Google Scholar 

  19. Qin, H., Zhu, X., Dai, Y.: A quantum secret sharing scheme on access structure. J. Chin. Inst. Eng. 39, 186–191 (2016)

    Article  Google Scholar 

  20. Qin, H., Zhu, X., Dai, Y.: \((t, n)\) threshold quantum secret sharing using the phase shift operation. Quntum Inf. Process. 14, 2997–3004 (2015). https://doi.org/10.1007/s11128-015-1037-6

    Article  ADS  MathSciNet  MATH  Google Scholar 

  21. Shamir, A.: How to share a secret. Commun. ACM. 22, 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  22. Song, X.-L., Liu, Y.-B., Deng, H.-Y., Xiao, Y.-G.: \((t, n)\) threshold \(d-\)level quantum secret sharing. Sci. Rep. 7, 6366 (2017). https://doi.org/10.1038/s41598-017-06486-4

    Article  ADS  Google Scholar 

  23. Yang, W., Huang, L., Shi, R.: Secret sharing based on quantum Fourier transform. Quntum Inf. Process. 12, 2465–2474 (2013)

    Article  ADS  MathSciNet  Google Scholar 

  24. Zhang, J., Zhang, F.: Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its application. Fut. Gener. Comput. Syst. 52, 109–115 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samaneh Mashhadi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mashhadi, S. General secret sharing based on quantum Fourier transform. Quantum Inf Process 18, 114 (2019). https://doi.org/10.1007/s11128-019-2233-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-019-2233-6

Keywords

Navigation