A symmetric extensible protocol for quantum secret sharing
- URL: http://arxiv.org/abs/2204.13397v1
- Date: Thu, 28 Apr 2022 10:27:44 GMT
- Title: A symmetric extensible protocol for quantum secret sharing
- Authors: Michael Ampatzis and Theodore Andronikos
- Abstract summary: This paper introduces the Symmetric Quantum Secret Sharing protocol.
It is an entanglement based protocol that relies on the use of maximally entangled GHZs.
It offers uncompromising security, making virtually impossible for a malicious eavesdropper or a rogue double agent to disrupt its successful execution.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: This paper introduces the Symmetric Extensible Quantum Secret Sharing
protocol, which is a novel quantum protocol for secret sharing. At its heart,
it is an entanglement based protocol that relies on the use of maximally
entangled GHZ tuples, evenly distributed among the players, endowing the
spymaster with the ability to securely share a secret message with her agents.
It offers uncompromising security, making virtually impossible for a malicious
eavesdropper or a rogue double agent to disrupt its successful execution. It is
characterized by symmetry, since all agents are treated indiscriminately,
utilizing identical quantum circuits. Furthermore, it can be seamlessly
extended to an arbitrary number of agents. After the completion of the quantum
part of the protocol, the spymaster will have to publicly transmit some
information, in order to enable the agents to discover the secret message.
Finally, it has the additional advantage that the spymaster has the privilege
to decide when it is the right time for the agents to discover the secret
message.
Related papers
- Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a brand new quantum digital signature protocol without a trusted third party only with qubit technology to further improve the security.
We prove that the protocol has information-theoretical unforgeability. Moreover, it satisfies other important secure properties, including asymmetry, undeniability, and expandability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - Mask-coding-assisted continuous-variable quantum direct communication with orbital angular momentum multiplexing [31.687177215854717]
Quantum secure direct communication (QSDC) is a approach of communication to transmit secret messages base on quantum mechanics.
We report a continuous-variable QSDC scheme based on mask-coding and orbital angular momentum.
arXiv Detail & Related papers (2024-06-17T08:36:57Z) - Unclonable Secret Sharing [18.564937506648622]
Unclonable cryptography utilizes the principles of quantum mechanics to addresses cryptographic tasks that are impossible classically.
We introduce a novel unclonable primitive in the context of secret sharing, called unclonable secret sharing (USS)
arXiv Detail & Related papers (2024-06-16T16:50:15Z) - Quantum Secret Sharing Enhanced: Utilizing W States for Anonymous and
Secure Communication [11.077883755438053]
Quantum secret sharing (QSS) is the result of merging the principles of quantum mechanics with secret information sharing.
We propose a QASS protocol via W states, which can share secrets while ensuring recover-ability, recover-security, and recover-anonymity.
Our investigations reveal that W states exhibit good performance in mitigating noise interference, making them apt for practical applications.
arXiv Detail & Related papers (2024-02-04T09:15:02Z) - Secured Quantum Identity Authentication Protocol for Quantum Networks [2.3317857568404032]
This paper proposes a quantum identity authentication protocol that protects quantum networks from malicious entanglements.
Unlike the existing protocols, the proposed quantum authentication protocol does not require periodic refreshments of the shared secret keys.
arXiv Detail & Related papers (2023-12-10T05:36:49Z) - Secure Key from Quantum Discord [22.97866257572447]
We show how to make use of discord to analyze security in a specific quantum cryptography protocol.
Our method is robust against imperfections in qubit sources and qubit measurements as well as basis misalignment due to quantum channels.
arXiv Detail & Related papers (2023-04-12T14:21:49Z) - Approximate reconstructability of quantum states and noisy quantum
secret sharing schemes [19.170626575317907]
We analyse approximate quantum secret sharing in a formal cryptographic setting.
In particular, we show that approximate reconstructability of the quantum secret by these players is possible if and only if the information leakage is small.
arXiv Detail & Related papers (2023-02-06T00:32:01Z) - One-Time Universal Hashing Quantum Digital Signatures without Perfect
Keys [24.240914319917053]
We show that imperfect quantum keys with limited information leakage can be used for digital signatures and authentication without compromising security.
This study significantly reduces the delay for data postprocessing and is compatible with any quantum key generation protocols.
arXiv Detail & Related papers (2023-01-03T14:54:27Z) - Quantum secret aggregation utilizing a network of agents [0.0]
We consider a network of spies, all distributed in different locations in space, and assuming that each spy possesses a small, but incomplete by itself part of a big secret.
Is it possible to securely transmit all these partial secrets to the spymaster, so that they can be combined together in order to reveal the big secret?
We propose a protocol, in the form of a quantum game, with Alice taking over the role of the spymaster, that addresses this problem in complete generality.
arXiv Detail & Related papers (2022-11-28T20:27:05Z) - Semiquantum secret sharing by using x-type states [4.397981844057195]
A semiquantum secret sharing protocol based on x-type states is proposed.
It can accomplish the goal that only when two classical communicants cooperate together can they extract the shared secret key of a quantum communicant.
Detailed security analysis turns out that this protocol is completely robust against an eavesdropper.
arXiv Detail & Related papers (2022-08-03T08:58:45Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Oblivious Transfer is in MiniQCrypt [20.72168448608258]
MiniQCrypt is a world where quantum-secure one-way functions exist, and quantum communication is possible.
We construct an oblivious transfer protocol in MiniQCrypt that achieves simulation-security in the plain model against malicious quantum-time adversaries.
arXiv Detail & Related papers (2020-11-30T16:51:17Z) - Lightweight Mediated Semi-Quantum Secret Sharing Protocol [1.3419982985275638]
The proposed MSQSS protocol adopts the one-way quantum communication and thus it is free from the Trojan Horse attacks.
The security analysis is given for proving that the proposed protocol can be against the collective attack.
arXiv Detail & Related papers (2020-10-14T09:50:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.