Skip to main content
Log in

Efficient quantum secret sharing without a trusted player

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Quantum secret sharing (QSS) is a fundamental primitive in quantum cryptography. The complex and secure multiparty quantum protocols can be built using QSS. The existing QSS protocols are either (nn) threshold 2-level or (tn) threshold d-level with a trusted player, where n denotes the number of players and t denotes the threshold number of players. Here, we propose a secure d-level QSS protocol for sharing a secret, where t players can reconstruct the secret without a trusted player. This protocol is more secure, flexible, and practical as compared to the existing QSS protocols: (nn) threshold 2-level and (tn) threshold d-level with a trusted player. Further, it does not disclose any information about the secret to players. Its security analysis shows that the intercept-resend, intercept, entangle-measure, forgery, collision and collusion attacks are not possible in this protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A. 59, 1829 (1999)

    Article  ADS  MathSciNet  Google Scholar 

  2. Bao-Kui, L., Yu-Guang, Y., Qiao-Yan, W.: Threshold quantum secret sharing of secure direct communication. Chin. Phys. Lett. 26, 010302 (2009)

    Article  Google Scholar 

  3. Yang, W., Huang, L., Shi, R., He, L.: Secret sharing based on quantum Fourier transform. Quantum Inf. Process. 12, 2465–2474 (2013)

    Article  ADS  MathSciNet  Google Scholar 

  4. Chen, X.-B., Sun, Y.-R., Xu, G., Yang, Y.-X.: Quantum homomorphic encryption scheme with flexible number of evaluator based on (\(k, n\))-threshold quantum state sharing. Inf. Sci. 501(10), 172–181 (2019)

    Article  MathSciNet  Google Scholar 

  5. Changbin, L., Fuyou, M., Junpeng, H., Keju, M.: Verifiable threshold quantum secret sharing with sequential communication. Quant. Inf. Process. 17(11), 310 (2018)

    Article  MathSciNet  Google Scholar 

  6. Hoi-Kwan, L., Christian, W.: Quantum secret sharing with continuous-variable cluster states. Phys. Rev. A. 88(4), 042313 (2013)

    Article  Google Scholar 

  7. Hao, C., Ma, W.: (\(t, n\)) Threshold quantum state sharing scheme based on linear equations and unitary operation. IEEE Photon. J. 9(1), 1–7 (2017)

    Article  Google Scholar 

  8. Nielsen, M.: Quantum Computation and Quantum Information. Am. J. Phys. 70, 558 (2002)

    Article  ADS  Google Scholar 

  9. Gang, X., Ke, X., Zongpeng, L., Xin-Xin, R.: Controlled secure direct communication protocol via the three-qubit partially entangled set of states. CMC-Comput. Mater. Con. 58, 809–827 (2019)

    Google Scholar 

  10. Xiu-Bo, C., Ya-Lan, W., Gang, X., Yi-Xian, Y.: Quantum network communication with a novel discrete-time quantum walk. IEEE Access 7, 13634–13642 (2019)

    Article  Google Scholar 

  11. Gang, X., Xiu-Bo, C., Zhao, D., Jing, L., Xin, L., Zongpeng, L.: Novel criteria for deterministic remote state preparation via the entangled six-qubit state. Entropy 18, 267 (2016)

    Article  MathSciNet  Google Scholar 

  12. Nielsen, M.A., Chuang, I., Grover, L.K.: Quantum computation and quantum information. Am. J. Phys. 70, 558 (2002)

    Article  ADS  Google Scholar 

  13. Qin, H., Zhu, X., Dai, Y.: (t, n) Threshold quantum secret sharing using the phase shift operation. Quantum Inf. Process. 14, 2997–3004 (2015)

    Article  ADS  MathSciNet  Google Scholar 

  14. Song, X., Liu, Y., Deng, H., Xiao, Y.: (t, n) Threshold d-level quantum secret sharing. Sci. Rep. 7, 6366 (2017)

    Article  ADS  Google Scholar 

  15. Eastlake, D., Jones, P.: US Secure hash Algorithm 1 (SHA1). (2001)

  16. Kao, S.-H., Hwang, T.: Comment on (t,n) threshold d-level quantum secret sharing. (2018)

  17. Qin, H., Tso, R., Dai, Y.: Multi-dimensional quantum state sharing based on quantum Fourier transform. Quntum Inf. Process. 17, 48 (2018)

    Article  ADS  MathSciNet  Google Scholar 

  18. Mashhadi, S.: General secret sharing based on quantum Fourier transform. Quantum Inf. Process. 18, 114 (2019)

    Article  ADS  MathSciNet  Google Scholar 

  19. Weinstein, Y.S., Pravia, M.A., Fortunato, E.M., Lloyd, S., Cory, D.G.: Implementation of the quantum fourier transform. Phys. Rev. Lett. 86(9), 1889–1891 (2001)

    Article  ADS  Google Scholar 

  20. Shamir, A.: How to share a secret. Commun. ACM. 22, 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  21. Bennett, C., Brassard, G.: An update on quantum cryptography. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 475-480 (1984)

  22. Cai, X.-Q., Wang, T.-Y., Wei, C.-Y., Gao, F.: Cryptanalysis of multiparty quantum digital signatures. Quant. Inf. Process. 18, 252 (2019)

    Article  ADS  MathSciNet  Google Scholar 

  23. Song, T.-T., Zhang, J., Gao, F., Wen, Q.-Y., Zhu, F.-C.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18(4), 1333–1337 (2009)

    Article  ADS  Google Scholar 

  24. Wang, T.-Y., Wen, Q.-Y., Gao, F., Lin, S., Zhu, F.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)

    Article  ADS  Google Scholar 

  25. Wang, T.-Y., Wen, Q.-Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. Comput. 11(5–6), 434–443 (2011)

    MathSciNet  MATH  Google Scholar 

  26. Wang, T.-Y., Li, Y.-P.: Cryptanalysis of dynamic quantum secret sharing. Quant. Inf. Process. 12(5), 1991–1997 (2013)

    Article  ADS  MathSciNet  Google Scholar 

  27. Wang, T.-Y., Liu, Y.-Z., Wei, C.-Y., Cai, X.-Q., Ma, J.-F.: Security of a kind of quantum secret sharing with entangled states. Sci. Rep. 7, 2485 (2017)

    Article  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kartick Sutradhar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Human and animal rights

This article does not contain any studies with human or animal subjects performed by the any of the authors. The manuscript has been prepared following the instructions provided in the Authors Guidelines of the journal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sutradhar, K., Om, H. Efficient quantum secret sharing without a trusted player. Quantum Inf Process 19, 73 (2020). https://doi.org/10.1007/s11128-019-2571-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-019-2571-4

Keywords

Navigation