| 注册
首页|期刊导航|密码学报(中英文)|基于G-Like量子态的可验证半量子秘密分享

基于G-Like量子态的可验证半量子秘密分享

苏伟杰 黄琼 张猜

密码学报(中英文)2024,Vol.11Issue(6):1320-1330,11.
密码学报(中英文)2024,Vol.11Issue(6):1320-1330,11.DOI:10.13868/j.cnki.jcr.000739

基于G-Like量子态的可验证半量子秘密分享

Verifiable Semi-Quantum Secret Sharing Based on G-Like States

苏伟杰 1黄琼 1张猜1

作者信息

  • 1. 华南农业大学,广州 510642
  • 折叠

摘要

Abstract

Secret sharing is a cryptographic technique for keeping secrets divided and it has a wide range of application scenarios.In this study,a new four-body quantum entangled state is prepared by a G-like three-body entangled state and a single-particle quantum state.A verifiable semi-quantum secret-sharing protocol is designed based on the measurements'correlation with the Z basis of the four different particles in the entangled state.The protocol's security relies on quantum mechanical principles rather than the mathematically difficult problems in conventional cryptography.The pro-tocol involves one secret holder,Trent,who has full quantum capabilities,i.e.,Trent can perform any operation that does not violate the principles of quantum mechanics,and three secret reconstructors,Alice,Bob,and Charlie,who have only restricted quantum capabilities,i.e.,these participants can only perform certain specific quantum operations.Trent splits the key used to recover the secret into quantum measurement results of the four-body entangled state.The secret information Trent wants to share can only be recovered if the three recovers cooperate and provide the correct measurement results,and any less than three secret recovers will not get the secret information.To ensure the confidentiality of the measurements used to recover the secret information,this study exploits the properties of Bell entangled states for eavesdropping detection.In addition,in order to make the pro-tocol resistant to an attack that a malicious secret reconstructor provides wrong measurement results and the honest secret reconstructor gets wrong secret information,the protocol additionally adds a key for verifying and decrypting the secret information,which is distributed to the secret reconstructors after ensuring that all secret reconstructors have provided correct measurement results.The security analysis shows that the proposed protocol can resist common external attacks and internal attacks by malicious participants.In addition,the effect of quantum noise is also analyzed such as bit flipping,phase flipping,depolarization,and amplitude damping on the proposed protocol.

关键词

半量子协议/秘密分享/G-like量子态

Key words

semi-quantum protocols/secret sharing/G-like state

分类

信息技术与安全科学

引用本文复制引用

苏伟杰,黄琼,张猜..基于G-Like量子态的可验证半量子秘密分享[J].密码学报(中英文),2024,11(6):1320-1330,11.

基金项目

广东省基础与应用基础研究基金(2021A1515011985) (2021A1515011985)

广东省基础与应用基础研究基金重大项目(2019B030302008)Guangdong Basic and Applied Basic Research Fund(2021A1515011985) (2019B030302008)

Major Project of Guangdong Basic and Applied Basic Research Fund(2019B030302008) (2019B030302008)

密码学报(中英文)

OA北大核心CSTPCD

2095-7025

访问量0
|
下载量0
段落导航相关论文