Improving Continuous Variable Quantum Secret Sharing with Weak Coherent States
Abstract
:1. Introduction
2. The GMCS-Involved () Scheme for CVQSS
- The first participant generates the coherent state based on its Gaussian random numbers , laser and modulator, and sends it to the next participant .
- Each of the remained participants couples the locally prepared GMCS into the spatiotemporal mode at the same time as by using the highly asymmetric beam splitter.
- The dealer obtains by measuring the amplitude and phase quadratures of the received quantum state via double homodyne detection. The resulting is saved as raw data.
- Repeat above steps until the dealer gets enough raw data.
- A subset of the raw data is randomly chose and the dealer demands all the participants to publish the corresponding Gaussian random numbers. Combined with the corresponding measurement results, the transmittance can be achieved [32]. All participants abandon the disclosed data.
- The dealer randomly chooses a subset of remaining raw data after step 5. The dealer presumes each participant except is dishonest and demands them to publish their corresponding Gaussian random numbers.
- The dealer replaces the measurement result by and . In this case, and the raw data of are same subsets. Therefore, the dealer and can gain a lower bound of secure key rate of the GMCS-based quantum croptography.
- Repeat the step 7 for n times. Finally, the dealer gets secure key rates [18].
- Legitimate t participants are sorted by an agreed rule using for and .
- Supposing that the sequence of t participants is shown in Figure 2, the dealer randomly chooses a subset of the remained raw data and demands all participants except to publish the corresponding Gaussian random numbers. The dealer obtains with and .
- Repeat the step 2 for t times. Each of subset of the dealer is the same as of , for and .
- The dealer emerges the secure key S from raw data. Distribution of the secure key S can be described as follows
- The polynomial prepared by the dealer can be expressed asThe dealer calculates and obtains .
- The dealer recodes the by Pauli operation. Simultaneously, it prepares some decoy particles and randomly inserts them to the coding sequence. The dealer remembers the initial state and position of each decoy particles. The dealer selects the secure key rate R of the proposed protocol as the minimum of , [18] and sends them to all the participants according to the sequence of . After affirming has received the coding sequence, the dealer announces the initially inserted state and position of each decoy particles to . Then becomes the private key of .
- Legitimate participants restore the secret S by the Lagrange interpolation.
3. Security Analysis
3.1. Intercept-and-Resend Attack
3.2. Collective Attack
3.3. Dishonest Participants Attack
3.4. Entanglement Attack
4. Numerical Simulation
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612. [Google Scholar] [CrossRef]
- Nascimento, A.C.A.; Mueller-Quade, J.; Imai, H. Improving quantum secret sharing schemes. Phys. Rev. A 2001, 64, 042311. [Google Scholar] [CrossRef] [Green Version]
- Bai, C.M.; Li, Z.H.; Xu, T.T.; Li, Y.M. A generalized information theoretical model for quantum secret sharing. Int. J. Theor. Phys. 2016, 55, 4972–4986. [Google Scholar] [CrossRef] [Green Version]
- Dehkordi, M.H.; Fattahi, E.T. Threshold quantum secret sharing between multiparty and multiparty using Greenberger-Horne-zeilinger state. Quantum. Inf. Process. 2013, 12, 1299–1306. [Google Scholar] [CrossRef]
- Guo, C.; Yuan, Q.Q.; Lu, K. (t,n) Threshold secret image sharing scheme with adversary structure. Multimed. Tools Appl. 2017, 7, 21193–21210. [Google Scholar] [CrossRef]
- Maitra, A.; Paul, G. A Resilient Quantum Secret Sharing Scheme. Int. J. Theor. Phys. 2015, 54, 398–408. [Google Scholar] [CrossRef]
- Lu, C.B.; Miao, F.Y.; Hou, J.P. Verifiable threshold quantum secret sharing with sequential communication. Quantum. Inf. Process. 2018, 17, 310. [Google Scholar] [CrossRef] [Green Version]
- Chen, Y.H.; Zhang, N.; Tian, H. A Novel Connection Correlation Scheme Based on Threshold Secret Sharing. IEEE Commun. Lett. 2016, 20, 2414–2417. [Google Scholar] [CrossRef]
- Qin, H.W.; Dai, Y.W.; Wang, Z.Q. A secret sharing scheme based on (t,n) threshold and adversary structure. Int. J. Inf. Secur. 2009, 8, 379–385. [Google Scholar] [CrossRef]
- Hillery, M.; Buzek, V.; Berthiaume, A. Quantum secret sharing. Phys. Rev. A 1993, 59, 1829–1834. [Google Scholar] [CrossRef] [Green Version]
- Cleve, R.; Gottesman, D.; Lo, H.K. How to share a quantum secret. Phys. Rev. Lett. 1999, 83, 648. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Z. Controlled teleportation of an arbitrary n-qubit quantum information using quantum secret sharing of classical message. Phys. Lett. A 2006, 352, 55–58. [Google Scholar] [CrossRef]
- Qin, H.; Tso, R. Efficient quantum secret sharing based on special multi-dimensional GHZ state. Opt. Quant. Electron. 2018, 50, 167. [Google Scholar] [CrossRef]
- Khakbiz, P.; Asoudeh, M. Sequential quantum secret sharing in noisy environments. Quantum. Inf. Process. 2019, 18, 11. [Google Scholar] [CrossRef] [Green Version]
- Zhao, Y.Q.; Guo, Y. High-efficient quantum secret sharing based on the Chinese remainder theorem via the orbital angular momentum entanglement analysis. Quantum. Inf. Process. 2013, 12, 1125–1139. [Google Scholar]
- Lance, A.M.; Symul, T.; Bowen, W.P. Continuous variable (2, 3) threshold quantum secret sharing schemes. New J. Phys. 2003, 5, 4. [Google Scholar] [CrossRef]
- Yang, Y.G.; Wen, Q.Y. Threshold quantum secret sharing between multi-party and multi-party. Sci. China Ser. G 2008, 51, 1308–1315. [Google Scholar] [CrossRef]
- Diamanti, E.; Leverrier, A. Distributing secret keys with quantum continuous variables: Principle, security and implementations. Entropy 2015, 17, 6072–6092. [Google Scholar] [CrossRef]
- Grosshans, F.; Assche, G.V.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature (London) 2003, 421, 238. [Google Scholar] [CrossRef] [Green Version]
- Li, J.J.; Wang, N.; Wang, Z.H. New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval. IEEE Access 2018, 6, 49348–49357. [Google Scholar] [CrossRef]
- Wu, X.D.; Wang, Y.J.; Huang, D. Passive continuous-variable quantum secret sharing using a thermal source. Phys. Rev. A 2020, 101, 022301. [Google Scholar] [CrossRef]
- Kogias, I.; Xiang, Y.; He, Q.Y.; Adesso, G. Unconditional security of entanglement-based continuous-variable quantum secret sharing. Phys. Rev. A 2017, 95, 012315. [Google Scholar] [CrossRef] [Green Version]
- Tyc, T.; Sanders, B.C. How to share a continuous-variable quantum secret by optical interferometry. Phys. Rev. A 2002, 65, 042310. [Google Scholar] [CrossRef] [Green Version]
- Grice, W.P.; Qi, B. Quantum secret sharing using weak coherent states. Phys. Rev. A 2019, 100, 022339. [Google Scholar] [CrossRef] [Green Version]
- Wang, Y.J.; Fu, J.; Guo, Y. Photon-monitoring attack on continuous-variable quantum key distribution with source in middle. Quantum. Inf. Process. 2014, 13, 2745–2757. [Google Scholar] [CrossRef]
- Wang, Y.J.; Wang, X.D.; Li, J.W.; Guo, Y. Self-referenced continuous-variable measurement-device-independent quantum key distribution. Phys. Lett. A 2018, 382, 1149–1156. [Google Scholar] [CrossRef]
- Wang, Y.J.; Mao, Y.Y.; Huang, W.T.; Guo, Y. Optical frequency comb-based multichannel parallel continuous-variable quantum key distribution. Opt. Express 2019, 27, 25314–25329. [Google Scholar] [CrossRef]
- Liu, W.Q.; Peng, G.Y.; Huang, P.; Wang, S.Y.; Wang, T.; Zeng, G.H. Continuous-variable quantum key distribution based on continuous random basis choice. Chin. Phys. B 2018, 27, 070305. [Google Scholar] [CrossRef]
- Lodewyck, J.; Bloch, M.; García-Patrón, R.; Fossier, S.; Karpov, E.; Diamanti, E.; Debuisschert, T.; Cerf, N.J.; Tualle-Brouri, R.; McLaughlin, S.W.; et al. Quantum key distribution over 25 km with an all-fiber continuous-variable system. Phys. Rev. A 2007, 76, 042305. [Google Scholar] [CrossRef] [Green Version]
- Wang, Y.J.; Wu, X.D.; Zhang, L.; Guo, Y. Performance improvement of free-space continuous-variable quantum key distribution with an adaptive optics unit. Quantum. Inf. Process. 2019, 18, UNSP 251. [Google Scholar] [CrossRef]
- Guo, Y.; Liao, Q.; Wang, Y.; Huang, D.; Huang, P.; Zeng, G. Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction. Phys. Rev. A 2017, 95, 032304. [Google Scholar] [CrossRef] [Green Version]
- Guo, Y.; Ye, W.; Zhong, H.; Liao, Q. Continuous-variable quantum key distribution with non-Gaussian quantum catalysis. Phys. Rev. A 2019, 99, 032327. [Google Scholar] [CrossRef] [Green Version]
- Qin, H.W.; Zhu, X.H.; Dai, Y.W. (t,n) Threshold quantum secret sharing using the phase shift operation. Quantum. Inf. Process. 2015, 14, 2997–3004. [Google Scholar] [CrossRef]
- Yang, Y.G.; Gao, S.; Li, D.; Zhou, Y.H.; Shi, W.M. Three-party quantum secret sharing against collective noise. Quantum. Inf. Process. 2019, 18, 215. [Google Scholar] [CrossRef]
- Binu, V.P.; Sreekumar, A. Secure and Efficient Secret Sharing Scheme with General Access Structures Based on Elliptic Curve and Pairing. Wirel. Pers Commun. 2017, 92, 1531–1543. [Google Scholar] [CrossRef]
- Guo, Y.; Xie, C.; Huang, P.; Li, J.; Zhang, L.; Huang, D.; Zeng, G. Channel-parameter estimation for satellite-to-submarine continuous-variable quantum key distribution. Phys. Rev. A 2018, 97, 052326. [Google Scholar] [CrossRef]
- Chen, D.; Lu, W.; Xing, W.W. An Efficient Verifiable Threshold Multi-Secret Sharing Scheme with Different Stages. IEEE Access 2019, 7, 107104–107110. [Google Scholar] [CrossRef]
- Cai, X.Q.; Wang, T.Y.; Zhang, R.L. Security of Verifiable Threshold Quantum Secret Sharing with Sequential Communication. IEEE Access 2019, 7, 134854–134861. [Google Scholar] [CrossRef]
- Rfifi, S. Exploiting a Fock Cavity Field to Enhance Quantum Secret Sharing Through a Phase-Damping Noisy Channel. Int. J. Theor. Phys. 2016, 55, 4553–4563. [Google Scholar] [CrossRef]
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, Y.; Jia, B.; Mao, Y.; Wu, X.; Guo, Y. Improving Continuous Variable Quantum Secret Sharing with Weak Coherent States. Appl. Sci. 2020, 10, 2411. https://doi.org/10.3390/app10072411
Wang Y, Jia B, Mao Y, Wu X, Guo Y. Improving Continuous Variable Quantum Secret Sharing with Weak Coherent States. Applied Sciences. 2020; 10(7):2411. https://doi.org/10.3390/app10072411
Chicago/Turabian StyleWang, Yijun, Bing Jia, Yun Mao, Xuelin Wu, and Ying Guo. 2020. "Improving Continuous Variable Quantum Secret Sharing with Weak Coherent States" Applied Sciences 10, no. 7: 2411. https://doi.org/10.3390/app10072411
APA StyleWang, Y., Jia, B., Mao, Y., Wu, X., & Guo, Y. (2020). Improving Continuous Variable Quantum Secret Sharing with Weak Coherent States. Applied Sciences, 10(7), 2411. https://doi.org/10.3390/app10072411