A distributed and parallel $(k, n)$ QSS scheme with verification capability
- URL: http://arxiv.org/abs/2410.18643v1
- Date: Thu, 24 Oct 2024 11:12:38 GMT
- Title: A distributed and parallel $(k, n)$ QSS scheme with verification capability
- Authors: Theodore Andronikos,
- Abstract summary: This article introduces a novel Quantum Secret Sharing scheme with $( k, n )$ threshold and endowed with verification capability.
The primary novelty of the new protocol lies in its ability to operate completely parallelly in a fully distributed setup.
- Score: 0.0
- License:
- Abstract: This article introduces a novel Quantum Secret Sharing scheme with $( k, n )$ threshold and endowed with verification capability. The new protocol exploits the power of entanglement and evolves in three phases. The primary novelty of the new protocol lies in its ability to operate completely parallelly in a fully distributed setup, where the spymaster and her agents all are in different locations, in contrast to the vast majority of analogous protocols that assume a localized scenario in which all agents are at the same place. The spymaster sends all necessary information to all intended recipients simultaneously in one step. All phases are executed in parallel, minimizing the overall execution cost of the protocol. Given its comparative complexity, we provide a comprehensive and detailed analysis to establish its information-theoretic security in the sense of preventing both outside eavesdroppers from obtaining any useful information and inside rogue agents from sabotaging its successful completion. The protocol eliminates the need for a quantum signature scheme or pre-shared keys, thereby simplifying the process and lowering complexity. Finally, the possibility of its implementation by contemporary quantum computers is promising because the protocol relies exclusively on CNOT and Hadamard gates and all players operating on similar or identical quantum circuits.
Related papers
- Experimental Simulation of Two Pulses and Three Pulses Coherent One Way Quantum Key Distribution Protocol in Noisy/Noiseless and Wired/Wireless Environment [1.8638865257327277]
Coherent One Way (COW) protocol is one of the most famous protocol because of its ease of hardware deployment.
We demonstrate the encoding as well as decoding portions of the protocols under both noisy and noiseless scenario.
arXiv Detail & Related papers (2024-09-23T11:02:52Z) - A Multiparty Quantum Private Equality Comparison scheme relying on $\ket{ GHZ_{ 3 } }$ states [0.0]
This paper introduces an innovative entanglement-based protocol that accomplishes multiparty quantum private comparison.
It is made possible because the protocol uses only GHZ3 triplets, irrespective of the number of millionaires.
The protocol is information-theoretically secure, preventing outside parties from learning about fortunes or inside players from knowing each other's secret numbers.
arXiv Detail & Related papers (2024-07-07T14:21:22Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - A Secure Quantum Key Distribution Protocol Using Two-Particle Transmission [0.0]
Unextendible Product Bases (UPBs) hold promise in quantum cryptography due to their inherent indistinguishability.
This work introduces a protocol utilizing UPBs to establish quantum keys between distant parties.
arXiv Detail & Related papers (2024-03-20T14:33:17Z) - One-to-Many Simultaneous Secure Quantum Information Transmission [0.0]
This paper presents a new quantum protocol designed to simultaneously transmit information from one source to many recipients.
The proposed protocol is completely distributed and is provably information-theoretically secure.
arXiv Detail & Related papers (2023-11-05T00:41:55Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Multi-party Semi-quantum Secret Sharing Protocol based on Measure-flip and Reflect Operations [1.3812010983144802]
Semi-quantum secret sharing (SQSS) protocols serve as fundamental frameworks in quantum secure multi-party computations.
This paper proposes a novel SQSS protocol based on multi-particle GHZ states.
arXiv Detail & Related papers (2021-09-03T08:52:17Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [48.94443749859216]
We introduce a quantum copy-protection scheme for a class of evasive functions known as " compute-and-compare programs"
We prove that our scheme achieves non-trivial security against fully malicious adversaries in the quantum random oracle model (QROM)
As a complementary result, we show that the same scheme fulfils a weaker notion of software protection, called "secure software leasing"
arXiv Detail & Related papers (2020-09-29T08:41:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.