Abstract
Quantum secret sharing (QSS) is a fundamental primitive in quantum cryptography. The complex and secure multiparty quantum protocols can be built using QSS. The existing QSS protocols are either (n, n) threshold 2-level or (t, n) threshold d-level with a trusted player, where n denotes the number of players and t denotes the threshold number of players. Here, we propose a secure d-level QSS protocol for sharing a secret, where t players can reconstruct the secret without a trusted player. This protocol is more secure, flexible, and practical as compared to the existing QSS protocols: (n, n) threshold 2-level and (t, n) threshold d-level with a trusted player. Further, it does not disclose any information about the secret to players. Its security analysis shows that the intercept-resend, intercept, entangle-measure, forgery, collision and collusion attacks are not possible in this protocol.
Similar content being viewed by others
References
Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A. 59, 1829 (1999)
Bao-Kui, L., Yu-Guang, Y., Qiao-Yan, W.: Threshold quantum secret sharing of secure direct communication. Chin. Phys. Lett. 26, 010302 (2009)
Yang, W., Huang, L., Shi, R., He, L.: Secret sharing based on quantum Fourier transform. Quantum Inf. Process. 12, 2465–2474 (2013)
Chen, X.-B., Sun, Y.-R., Xu, G., Yang, Y.-X.: Quantum homomorphic encryption scheme with flexible number of evaluator based on (\(k, n\))-threshold quantum state sharing. Inf. Sci. 501(10), 172–181 (2019)
Changbin, L., Fuyou, M., Junpeng, H., Keju, M.: Verifiable threshold quantum secret sharing with sequential communication. Quant. Inf. Process. 17(11), 310 (2018)
Hoi-Kwan, L., Christian, W.: Quantum secret sharing with continuous-variable cluster states. Phys. Rev. A. 88(4), 042313 (2013)
Hao, C., Ma, W.: (\(t, n\)) Threshold quantum state sharing scheme based on linear equations and unitary operation. IEEE Photon. J. 9(1), 1–7 (2017)
Nielsen, M.: Quantum Computation and Quantum Information. Am. J. Phys. 70, 558 (2002)
Gang, X., Ke, X., Zongpeng, L., Xin-Xin, R.: Controlled secure direct communication protocol via the three-qubit partially entangled set of states. CMC-Comput. Mater. Con. 58, 809–827 (2019)
Xiu-Bo, C., Ya-Lan, W., Gang, X., Yi-Xian, Y.: Quantum network communication with a novel discrete-time quantum walk. IEEE Access 7, 13634–13642 (2019)
Gang, X., Xiu-Bo, C., Zhao, D., Jing, L., Xin, L., Zongpeng, L.: Novel criteria for deterministic remote state preparation via the entangled six-qubit state. Entropy 18, 267 (2016)
Nielsen, M.A., Chuang, I., Grover, L.K.: Quantum computation and quantum information. Am. J. Phys. 70, 558 (2002)
Qin, H., Zhu, X., Dai, Y.: (t, n) Threshold quantum secret sharing using the phase shift operation. Quantum Inf. Process. 14, 2997–3004 (2015)
Song, X., Liu, Y., Deng, H., Xiao, Y.: (t, n) Threshold d-level quantum secret sharing. Sci. Rep. 7, 6366 (2017)
Eastlake, D., Jones, P.: US Secure hash Algorithm 1 (SHA1). (2001)
Kao, S.-H., Hwang, T.: Comment on (t,n) threshold d-level quantum secret sharing. (2018)
Qin, H., Tso, R., Dai, Y.: Multi-dimensional quantum state sharing based on quantum Fourier transform. Quntum Inf. Process. 17, 48 (2018)
Mashhadi, S.: General secret sharing based on quantum Fourier transform. Quantum Inf. Process. 18, 114 (2019)
Weinstein, Y.S., Pravia, M.A., Fortunato, E.M., Lloyd, S., Cory, D.G.: Implementation of the quantum fourier transform. Phys. Rev. Lett. 86(9), 1889–1891 (2001)
Shamir, A.: How to share a secret. Commun. ACM. 22, 612–613 (1979)
Bennett, C., Brassard, G.: An update on quantum cryptography. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 475-480 (1984)
Cai, X.-Q., Wang, T.-Y., Wei, C.-Y., Gao, F.: Cryptanalysis of multiparty quantum digital signatures. Quant. Inf. Process. 18, 252 (2019)
Song, T.-T., Zhang, J., Gao, F., Wen, Q.-Y., Zhu, F.-C.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18(4), 1333–1337 (2009)
Wang, T.-Y., Wen, Q.-Y., Gao, F., Lin, S., Zhu, F.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)
Wang, T.-Y., Wen, Q.-Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. Comput. 11(5–6), 434–443 (2011)
Wang, T.-Y., Li, Y.-P.: Cryptanalysis of dynamic quantum secret sharing. Quant. Inf. Process. 12(5), 1991–1997 (2013)
Wang, T.-Y., Liu, Y.-Z., Wei, C.-Y., Cai, X.-Q., Ma, J.-F.: Security of a kind of quantum secret sharing with entangled states. Sci. Rep. 7, 2485 (2017)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Human and animal rights
This article does not contain any studies with human or animal subjects performed by the any of the authors. The manuscript has been prepared following the instructions provided in the Authors Guidelines of the journal.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sutradhar, K., Om, H. Efficient quantum secret sharing without a trusted player. Quantum Inf Process 19, 73 (2020). https://doi.org/10.1007/s11128-019-2571-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-019-2571-4