A Kind of (n,t)Threshold Quantum State Sharing Scheme Based on Chinese Reminder Theorem

Yanchang Li
{"title":"A Kind of (n,t)Threshold Quantum State Sharing Scheme Based on Chinese Reminder Theorem","authors":"Yanchang Li","doi":"10.56028/aetr.9.1.622.2024","DOIUrl":null,"url":null,"abstract":"Secret sharing is a key technology of data confidentiality, where one can distribute a secret among agents, and only the authorized agents can recover the original secret. Quantum information technology, including quantum communication, quantum computing can break through the bottlenecks of classical technology in information security and computing speed, based on quantum mechanics, such as quantum superposition, quantum uncertainty, quantum no-cloning and quantum entanglement. By combining quantum technology with classic secret sharing, the concept of quantum state sharing was presented. In this manuscript, a novel kind of (n,t) threshold quantum state sharing scheme is proposed, where the selected t agents among n agents can cooperate to reconstruct the target secret state. For implementing this scheme, the Chinese reminder theorem is introduced during the processing of the secret key distribution. In addition, to show the proposed scheme clearly, a concrete (5,3) example is given. Furthermore, the proof of the correctness of the scheme is shown. Our scheme will improve the development the quantum secret sharing and open up exploring the application of quantum information technology","PeriodicalId":355471,"journal":{"name":"Advances in Engineering Technology Research","volume":"277 1-2","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Engineering Technology Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.56028/aetr.9.1.622.2024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Secret sharing is a key technology of data confidentiality, where one can distribute a secret among agents, and only the authorized agents can recover the original secret. Quantum information technology, including quantum communication, quantum computing can break through the bottlenecks of classical technology in information security and computing speed, based on quantum mechanics, such as quantum superposition, quantum uncertainty, quantum no-cloning and quantum entanglement. By combining quantum technology with classic secret sharing, the concept of quantum state sharing was presented. In this manuscript, a novel kind of (n,t) threshold quantum state sharing scheme is proposed, where the selected t agents among n agents can cooperate to reconstruct the target secret state. For implementing this scheme, the Chinese reminder theorem is introduced during the processing of the secret key distribution. In addition, to show the proposed scheme clearly, a concrete (5,3) example is given. Furthermore, the proof of the correctness of the scheme is shown. Our scheme will improve the development the quantum secret sharing and open up exploring the application of quantum information technology
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于中国提醒定理的(n,t)阈值量子态共享方案
秘密共享是数据保密的一项关键技术,它可以在代理人之间分发秘密,只有被授权的代理人才能恢复原始秘密。量子信息技术,包括量子通信、量子计算可以突破经典技术在信息安全和计算速度方面的瓶颈,其基础是量子力学,如量子叠加、量子不确定性、量子不可克隆和量子纠缠。通过将量子技术与经典的秘密共享相结合,提出了量子态共享的概念。本文提出了一种新颖的(n,t)阈量子态共享方案,即在 n 个代理中选取 t 个代理进行合作,重建目标秘密状态。为实现该方案,在密钥分配处理过程中引入了中国提醒定理。此外,为了清楚地展示所提出的方案,给出了一个具体的(5,3)实例。此外,还展示了该方案的正确性证明。我们的方案将改善量子秘密共享的发展,并开启量子信息技术的应用探索。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Research on Response Characteristics of GPR Method for Detecting Phreatic Lines in Embankments Research on the composition of glass relics based on CART model Research on component content model of ancient glass products based on statistical analysis The Significance of Big Data to the Design and Transformation of Rural Art Space Coupled Vibration Analysis of a Beam-Arch Composite Continuous Rigid Structure with Parallel Traffic Flow
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1