Quantum Secret Reconstruction
- URL: http://arxiv.org/abs/2306.08863v1
- Date: Thu, 15 Jun 2023 05:24:29 GMT
- Title: Quantum Secret Reconstruction
- Authors: Ruihai Ma, Fei Gao, and Song Lin
- Abstract summary: This paper proposes the first quantum secret reconstruction protocol based on cluster states.
It is shown that the proposed protocol is secure against several common attacks.
- Score: 2.8233507229238177
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In addition to secret splitting, secret reconstruction is another important
component of secret sharing. In this paper, the first quantum secret
reconstruction protocol based on cluster states is proposed. Before the
protocol, a classical secret is divided into multiple shares, which are
distributed among shareholders via secret splitting. In the protocol, the
dealer utilizes her secret to encrypt a private quantum state, and sends the
encrypted state to a combiner chosen by her from the shareholders. With the
help of other shareholders, the combiner utilizes the properties of cluster
states to recover the privacy quantum state. It is shown that the proposed
protocol is secure against several common attacks, including external and
internal attacks. Compared with classical secret reconstruction protocols, this
protocol not only achieves theoretical security of all shares, but also is more
efficient due to reducing the distribution cost and computation cost. To
demonstrate the feasibility of the protocol, a corresponding simulation quantum
experiment is conducted on the IBM Q platform. Furthermore, in conjunction with
quantum fingerprinting, it can be directly applied to achieve the task of
multiple secrets sharing, because the classical shares can be reused in the
proposed protocol.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - One-Time Universal Hashing Quantum Digital Signatures without Perfect
Keys [24.240914319917053]
We show that imperfect quantum keys with limited information leakage can be used for digital signatures and authentication without compromising security.
This study significantly reduces the delay for data postprocessing and is compatible with any quantum key generation protocols.
arXiv Detail & Related papers (2023-01-03T14:54:27Z) - Semiquantum secret sharing by using x-type states [4.397981844057195]
A semiquantum secret sharing protocol based on x-type states is proposed.
It can accomplish the goal that only when two classical communicants cooperate together can they extract the shared secret key of a quantum communicant.
Detailed security analysis turns out that this protocol is completely robust against an eavesdropper.
arXiv Detail & Related papers (2022-08-03T08:58:45Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Multi-party Semi-quantum Secret Sharing Protocol based on Measure-flip and Reflect Operations [1.3812010983144802]
Semi-quantum secret sharing (SQSS) protocols serve as fundamental frameworks in quantum secure multi-party computations.
This paper proposes a novel SQSS protocol based on multi-particle GHZ states.
arXiv Detail & Related papers (2021-09-03T08:52:17Z) - Anonymous Quantum Conference Key Agreement [0.0]
Conference Key Agreement (CKA) is a cryptographic effort of multiple parties to establish a shared secret key.
We provide a definition of anonymity for general protocols and present a CKA protocol that is provably anonymous under realistic adversarial scenarios.
arXiv Detail & Related papers (2020-10-09T12:49:26Z) - A Hybrid Quantum Secret Sharing Scheme based on Mutually Unbiased Bases [6.42717893572633]
We propose a hybrid quantum secret sharing scheme based on mutually unbiased bases and monotone span program.
The correctness and security of the scheme are proved and our scheme is secure against the general eavesdropper attacks.
arXiv Detail & Related papers (2020-06-23T06:59:03Z) - Quantum secret sharing using GHZ state qubit positioning and selective
qubits strategy for secret reconstruction [4.378411442784295]
The work presents a novel quantum secret sharing strategy based on GHZ product state sharing between three parties.
Unlike the other protocols, this protocol does not involve the entire initial state reconstruction, rather uses selective qubits to discard the redundant qubits at the time of reconstruction to decrypt the secret.
The protocol also allows for security against malicious attacks by an adversary without affecting the integrity of the secret.
arXiv Detail & Related papers (2020-02-21T08:45:07Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.