Quantum cloning transformation unlocks the potential of W class of states in a secret sharing protocol
- URL: http://arxiv.org/abs/2408.06722v1
- Date: Tue, 13 Aug 2024 08:27:58 GMT
- Title: Quantum cloning transformation unlocks the potential of W class of states in a secret sharing protocol
- Authors: Rashi Jain, Satyabrata Adhikari,
- Abstract summary: We introduce a quantum secret sharing protocol exploiting a three-qubit W class of state shared between three parties.
We find that the protocol is probabilistic and have calculated the probability of success of the protocol.
Even a less entangled W class of state can also play a vital role in the proposed secret-sharing scheme.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: One of the most challenging problems is to share a secret because the sender does not trust the receiver completely. Thus, the sender provides one part of the information to the receiver and shares the other part of the information to a third party on whom the sender can rely. The secret can be revealed when the receiver and the third party agree to cooperate. This is the essence of the secret-sharing protocol. A lot of studies have been done on it using the three-qubit GHZ state, and only a few works have involved the W state. In this work, we introduce a quantum secret sharing protocol exploiting a three-qubit W class of state shared between three parties, Alice (Sender), Bob (Mediator), and Charlie (Receiver). In the proposed protocol, the shared state parameters and the secret are linked in such a way that it is very difficult to factor them. We will show that these parameters can be factored out easily if the receiver uses a quantum cloning machine (QCM) and thus can retrieve the secret. We find that the protocol is probabilistic and have calculated the probability of success of the protocol. Further, we establish the relation between the success probability and the efficiency of the QCM. In general, we find that the efficiency of the constructed QCM is greater than or equal to $\frac{1}{3}$, but we have shown that its efficiency can be enhanced when the parameters of the shared state are used as the parameters of the QCM. Moreover, we derived the linkage between the probability of success and the amount of entanglement in the shared W class of state. We analyzed the obtained result and found that even a less entangled W class of state can also play a vital role in the proposed secret-sharing scheme.
Related papers
- Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Quantum Secret Sharing Enhanced: Utilizing W States for Anonymous and
Secure Communication [11.077883755438053]
Quantum secret sharing (QSS) is the result of merging the principles of quantum mechanics with secret information sharing.
We propose a QASS protocol via W states, which can share secrets while ensuring recover-ability, recover-security, and recover-anonymity.
Our investigations reveal that W states exhibit good performance in mitigating noise interference, making them apt for practical applications.
arXiv Detail & Related papers (2024-02-04T09:15:02Z) - Verifying the security of a continuous variable quantum communication protocol via quantum metrology [1.6632263048576381]
Quantum mechanics offers the possibility of unconditionally secure communication between multiple remote parties.
Security proofs for such protocols typically rely on bounding the capacity of the quantum channel in use.
In this work we establish a connection between these two areas.
arXiv Detail & Related papers (2023-11-09T14:15:42Z) - Quantum advantage in a unified scenario and secure detection of
resources [55.2480439325792]
We consider a single task to study different approaches of having quantum advantage.
We show that the optimal success probability in the overall process for a qubit communication might be higher than that for a cbit communication.
arXiv Detail & Related papers (2023-09-22T23:06:20Z) - Quantum Secret Reconstruction [2.8233507229238177]
This paper proposes the first quantum secret reconstruction protocol based on cluster states.
It is shown that the proposed protocol is secure against several common attacks.
arXiv Detail & Related papers (2023-06-15T05:24:29Z) - Secure Computation with Shared EPR Pairs (Or: How to Teleport in
Zero-Knowledge) [26.90896904213257]
We show that em secure teleportation through quantum channels is possible.
Specifically, given the description of any quantum operation $Q$, a sender with (quantum) input $rho$ can send a single classical message that securely transmits $Q(rho)$ to a receiver.
arXiv Detail & Related papers (2023-04-20T17:29:26Z) - Semiquantum secret sharing by using x-type states [4.397981844057195]
A semiquantum secret sharing protocol based on x-type states is proposed.
It can accomplish the goal that only when two classical communicants cooperate together can they extract the shared secret key of a quantum communicant.
Detailed security analysis turns out that this protocol is completely robust against an eavesdropper.
arXiv Detail & Related papers (2022-08-03T08:58:45Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Revocation and Reconstruction of Shared Quantum Secrets [0.5735035463793007]
In existing protocols there are no means by which the dealer can retrieve back the secret once he/she finds all the share holders to be semi-honest.
In this work, we explicitly deal with shareholders who are semi-honest and not dishonest.
Our protocol makes a significant advancement in solving this problem by designing strategy in bringing back the secret in the worst possible situation.
arXiv Detail & Related papers (2021-12-31T17:08:12Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Gaussian conversion protocols for cubic phase state generation [104.23865519192793]
Universal quantum computing with continuous variables requires non-Gaussian resources.
The cubic phase state is a non-Gaussian state whose experimental implementation has so far remained elusive.
We introduce two protocols that allow for the conversion of a non-Gaussian state to a cubic phase state.
arXiv Detail & Related papers (2020-07-07T09:19:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.