Semiquantum secret sharing by using x-type states
- URL: http://arxiv.org/abs/2208.01922v2
- Date: Sat, 10 Dec 2022 23:59:35 GMT
- Title: Semiquantum secret sharing by using x-type states
- Authors: Ying Chen, Tian-Yu Ye
- Abstract summary: A semiquantum secret sharing protocol based on x-type states is proposed.
It can accomplish the goal that only when two classical communicants cooperate together can they extract the shared secret key of a quantum communicant.
Detailed security analysis turns out that this protocol is completely robust against an eavesdropper.
- Score: 4.397981844057195
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this paper, a semiquantum secret sharing (SQSS) protocol based on x-type
states is proposed, which can accomplish the goal that only when two classical
communicants cooperate together can they extract the shared secret key of a
quantum communicant. Detailed security analysis turns out that this protocol is
completely robust against an eavesdropper. This protocol has some merits: (1)
it only requires one kind of quantum entangled state as the initial quantum
resource; (2) it doesn't employ quantum entanglement swapping or unitary
operations; and (3) it needn't share private keys among different participants
beforehand.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - A novel hybrid protocol for semiquantum key distribution and semiquantum
secret sharing [12.725520944579554]
A novel protocol for semiquantum key distribution (SQKD) and semiquantum secret sharing (SQSS) was constructed by using GHZ-like states.
This protocol is capable of establishing two different private keys between one quantum party and two semiquantum parties respectively.
arXiv Detail & Related papers (2023-08-16T00:37:50Z) - Quantum Secret Reconstruction [2.8233507229238177]
This paper proposes the first quantum secret reconstruction protocol based on cluster states.
It is shown that the proposed protocol is secure against several common attacks.
arXiv Detail & Related papers (2023-06-15T05:24:29Z) - Oblivious Quantum Computation and Delegated Multiparty Quantum
Computation [61.12008553173672]
We propose a new concept, oblivious computation quantum computation, where secrecy of the input qubits and the program to identify the quantum gates are required.
Exploiting quantum teleportation, we propose a two-server protocol for this task.
Also, we discuss delegated multiparty quantum computation, in which, several users ask multiparty quantum computation to server(s) only using classical communications.
arXiv Detail & Related papers (2022-11-02T09:01:33Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Three-party secure semiquantum summation without entanglement among
quantum user and classical users [15.220708214434984]
A three-party secure semiquantum summation protocol can calculate the modulo 2 addition of the private bits from one quantum participant and two classical participants.
This protocol needs none of quantum entanglement swapping, the unitary operation or a pre-shared private key.
arXiv Detail & Related papers (2022-05-15T01:22:10Z) - Circular semi-quantum secret sharing using single particles [0.0]
Semi-quantum secret sharing (SQSS) is an important branch of semi-quantum cryptography.
The proposed SQSS protocols are robust against some famous attacks from an eavesdropper.
arXiv Detail & Related papers (2022-05-11T15:09:17Z) - A lightweight three-user secure quantum summation protocol without a
third party based on single-particle states [0.0]
A lightweight three-user secure quantum summation protocol is put forward by using single-particle states.
This protocol only requires single-particle states rather than quantum entangled states as the initial quantum resource.
Security analysis proves that this protocol is secure against both the outside attacks and the participant attacks.
arXiv Detail & Related papers (2022-04-03T04:58:24Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.