Quantum multi-secret sharing scheme with access structures and cheat identification

IF 0.7 4区 物理与天体物理 Q3 COMPUTER SCIENCE, THEORY & METHODS International Journal of Quantum Information Pub Date : 2024-03-21 DOI:10.1142/s0219749924500151
Deepa Rathi, Sanjeev Kumar
{"title":"Quantum multi-secret sharing scheme with access structures and cheat identification","authors":"Deepa Rathi, Sanjeev Kumar","doi":"10.1142/s0219749924500151","DOIUrl":null,"url":null,"abstract":"<p>This work proposes a <span><math altimg=\"eq-00001.gif\" display=\"inline\" overflow=\"scroll\"><mi>d</mi></math></span><span></span>-dimensional quantum multi-secret sharing scheme with a cheat-detection mechanism. The dealer creates multiple secrets and distributes the shares of these secrets using multi-access structures and a monotone span program. The dealer detects the cheating of each participant using the black box’s cheat-detection mechanism. To detect the participants’ deceit, the dealer distributes secret shares’ shadows derived from a randomly invertible matrix <span><math altimg=\"eq-00002.gif\" display=\"inline\" overflow=\"scroll\"><mi>X</mi></math></span><span></span> to the participants, stored in the black box. The black box identifies the participant’s deceitful behavior during the secret recovery phase. Only honest participants authenticated by the black box acquire their secret shares to recover the multiple secrets. After the black box cheating verification, the participants reconstruct the secrets by utilizing the unitary operations and quantum Fourier transform. The proposed protocol is reliable in preventing attacks from eavesdroppers and participants. The scheme’s efficiency is demonstrated in different noise environments: dit-flip noise, <span><math altimg=\"eq-00003.gif\" display=\"inline\" overflow=\"scroll\"><mi>d</mi></math></span><span></span>-phase-flip noise and amplitude-damping noise, indicating its robustness in practical scenarios. The proposed protocol provides greater versatility, security and practicality.</p>","PeriodicalId":51058,"journal":{"name":"International Journal of Quantum Information","volume":"20 1","pages":""},"PeriodicalIF":0.7000,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Quantum Information","FirstCategoryId":"101","ListUrlMain":"https://doi.org/10.1142/s0219749924500151","RegionNum":4,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

This work proposes a d-dimensional quantum multi-secret sharing scheme with a cheat-detection mechanism. The dealer creates multiple secrets and distributes the shares of these secrets using multi-access structures and a monotone span program. The dealer detects the cheating of each participant using the black box’s cheat-detection mechanism. To detect the participants’ deceit, the dealer distributes secret shares’ shadows derived from a randomly invertible matrix X to the participants, stored in the black box. The black box identifies the participant’s deceitful behavior during the secret recovery phase. Only honest participants authenticated by the black box acquire their secret shares to recover the multiple secrets. After the black box cheating verification, the participants reconstruct the secrets by utilizing the unitary operations and quantum Fourier transform. The proposed protocol is reliable in preventing attacks from eavesdroppers and participants. The scheme’s efficiency is demonstrated in different noise environments: dit-flip noise, d-phase-flip noise and amplitude-damping noise, indicating its robustness in practical scenarios. The proposed protocol provides greater versatility, security and practicality.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
具有访问结构和作弊识别功能的量子多机密共享方案
这项研究提出了一种具有作弊检测机制的 d 维量子多秘密共享方案。交易者使用多访问结构和单调跨度程序创建多个秘密并分配这些秘密的份额。庄家利用黑盒的作弊检测机制检测每个参与者的作弊行为。为了检测参与者的欺骗行为,庄家会将存储在黑盒中的随机可逆矩阵 X 得出的秘密份额阴影分配给参与者。黑盒会在秘密恢复阶段识别参与者的欺骗行为。只有通过黑盒验证的诚实参与者才能获得他们的秘密份额,从而恢复多个秘密。黑盒验证作弊行为后,参与者利用单元运算和量子傅里叶变换重建秘密。所提出的协议能可靠地防止窃听者和参与者的攻击。该方案在不同的噪声环境中都表现出了高效性:dit-flip 噪声、d-phase-flip 噪声和振幅阻尼噪声,表明其在实际应用中的鲁棒性。所提出的协议具有更高的通用性、安全性和实用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Quantum Information
International Journal of Quantum Information 物理-计算机:理论方法
CiteScore
2.20
自引率
8.30%
发文量
36
审稿时长
10 months
期刊介绍: The International Journal of Quantum Information (IJQI) provides a forum for the interdisciplinary field of Quantum Information Science. In particular, we welcome contributions in these areas of experimental and theoretical research: Quantum Cryptography Quantum Computation Quantum Communication Fundamentals of Quantum Mechanics Authors are welcome to submit quality research and review papers as well as short correspondences in both theoretical and experimental areas. Submitted articles will be refereed prior to acceptance for publication in the Journal.
期刊最新文献
Low-ground/High-ground capacity regions analysis for bosonic gaussian channels Interpreting symplectic linear transformations in a two-qubit phase space Continuity of the relative entropy of resource Alexander S. Holevo’s researches in quantum information theory in 20th century Pretty good measurement for bosonic Gaussian ensembles
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1