Quantum ($t$,$n$) Threshold Multi-Secret Sharing based on Cluster States
- URL: http://arxiv.org/abs/2505.09317v1
- Date: Wed, 14 May 2025 12:14:16 GMT
- Title: Quantum ($t$,$n$) Threshold Multi-Secret Sharing based on Cluster States
- Authors: Rui-Hai Ma, Hui-Nan Chen, Bin-Bin Cai, Song Lin, Xiao-Chen Zhang,
- Abstract summary: The first quantum ($t,n$) threshold multi-secret sharing protocol based on Lagrangian and cluster states is proposed.<n>The protocol exploits the security properties of the cluster state to transmit shared information in two parts, quantum and classical.<n>It is proven to be theoretically secure against external and internal attacks by analyzing the protocol.
- Score: 1.2932412290302255
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum secret sharing is an encryption technique based on quantum mechanics, which utilizes uncertainty principle to achieve security in transmission. Most protocols focus on the study of quantum ($n,n$) or ($t,n$) threshold single secret sharing. In this paper, the first quantum ($t,n$) threshold multi-secret sharing protocol based on Lagrangian interpolation and cluster states is proposed, which requires only $t$ instead of $n$ participants to reconstruct multiple quantum secrets. The protocol exploits the security properties of the cluster state to transmit shared information in two parts, quantum and classical, where the shares remain private after reconstructing quantum secrets. Meanwhile, extending the new measurement basis in cluster states enables participants to transmit quantum information without preparing particles. In the presented protocol, the dealer can be offline after sending secrets. And required quantum operations are all common quantum operations, thus the protocol is practical under the current technical conditions. It is proven to be theoretically secure against external and internal attacks by analyzing the protocol under several common external attacks and internal attacks. In addition, experiments on IMB Q prove that the protocol satisfies correctness and feasibility.
Related papers
- Quantum Homogenization as a Quantum Steady State Protocol on NISQ Hardware [42.52549987351643]
Quantum homogenization is a reservoir-based quantum state approximation protocol.<n>We extend the standard quantum homogenization protocol to the dynamically-equivalent ($mathttSWAP$)$alpha$ formulation.<n>We show that our proposed protocol yields a completely positive, trace preserving (CPTP) map under which the code subspace is correctable.
arXiv Detail & Related papers (2024-12-19T05:50:54Z) - Security and Fairness in Multi-Party Quantum Secret Sharing Protocol [0.0]
Quantum secret sharing (QSS) is a cryptographic protocol that leverages quantum mechanics to distribute a secret among multiple parties.<n>We introduce a new concept of QSS which leans on a generic distributed quantum-network, based on a threshold scheme.<n>We show the effectiveness and performance of the proposed protocol by testing it against the main classical and quantum attacks.
arXiv Detail & Related papers (2024-12-16T11:18:52Z) - Quantum Scheme for Private Set Intersection and Union Cardinality based on Quantum Homomorphic Encryption [8.715631190576067]
A novel quantum private set intersection and union cardinality protocol is proposed, accompanied by the corresponding quantum circuits.<n>Based on quantum homomorphic encryption, the protocol allows the intersection and union cardinality of users' private sets to be computed on quantum-encrypted data.
arXiv Detail & Related papers (2024-12-02T01:31:06Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Secured Quantum Identity Authentication Protocol for Quantum Networks [2.3317857568404032]
This paper proposes a quantum identity authentication protocol that protects quantum networks from malicious entanglements.
Unlike the existing protocols, the proposed quantum authentication protocol does not require periodic refreshments of the shared secret keys.
arXiv Detail & Related papers (2023-12-10T05:36:49Z) - Quantum Secret Reconstruction [2.8233507229238177]
This paper proposes the first quantum secret reconstruction protocol based on cluster states.
It is shown that the proposed protocol is secure against several common attacks.
arXiv Detail & Related papers (2023-06-15T05:24:29Z) - Simple Tests of Quantumness Also Certify Qubits [69.96668065491183]
A test of quantumness is a protocol that allows a classical verifier to certify (only) that a prover is not classical.
We show that tests of quantumness that follow a certain template, which captures recent proposals such as (Kalai et al., 2022) can in fact do much more.
Namely, the same protocols can be used for certifying a qubit, a building-block that stands at the heart of applications such as certifiable randomness and classical delegation of quantum computation.
arXiv Detail & Related papers (2023-03-02T14:18:17Z) - Semiquantum secret sharing by using x-type states [4.397981844057195]
A semiquantum secret sharing protocol based on x-type states is proposed.
It can accomplish the goal that only when two classical communicants cooperate together can they extract the shared secret key of a quantum communicant.
Detailed security analysis turns out that this protocol is completely robust against an eavesdropper.
arXiv Detail & Related papers (2022-08-03T08:58:45Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Multi-party Semi-quantum Secret Sharing Protocol based on Measure-flip and Reflect Operations [1.3812010983144802]
Semi-quantum secret sharing (SQSS) protocols serve as fundamental frameworks in quantum secure multi-party computations.
This paper proposes a novel SQSS protocol based on multi-particle GHZ states.
arXiv Detail & Related papers (2021-09-03T08:52:17Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Post-Quantum Multi-Party Computation [32.75732860329838]
We study multi-party computation for classical functionalities (in the plain model) with security against malicious-time quantum adversaries.
We assume superpolynomial quantum hardness of learning with errors (LWE), and quantum hardness of an LWE-based circular security assumption.
Along the way, we develop cryptographic primitives that may be of independent interest.
arXiv Detail & Related papers (2020-05-23T00:42:52Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.