{"title":"High Efficient Multi-party Quantum Secret Sharing Scheme","authors":"Xiaoqian Zhang, Xiaoqing Tan, Cui Liang","doi":"10.1109/3PGCIC.2014.70","DOIUrl":null,"url":null,"abstract":"Multi-party quantum secret sharing scheme with high efficient based on entanglement states is proposed and analyzed. A three-party which is presented shares a sequence of joint key bits. In this scheme, a general proof of the security against eavesdropping for three-party quantum secret sharing based on entanglement swapping is provided. The scheme which is showed is secure against a dishonest participant's intercept-and-resend attack and eavesdropper's entangle auxiliary-particles attack. In case of eavesdropping attacks with full information again, the detection bit needs to be transmitted except those for detection, the total efficiency of the scheme approaches to 100%. The protocol can be generalized to N-party system by using N-partite entanglement states.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"273 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3PGCIC.2014.70","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Multi-party quantum secret sharing scheme with high efficient based on entanglement states is proposed and analyzed. A three-party which is presented shares a sequence of joint key bits. In this scheme, a general proof of the security against eavesdropping for three-party quantum secret sharing based on entanglement swapping is provided. The scheme which is showed is secure against a dishonest participant's intercept-and-resend attack and eavesdropper's entangle auxiliary-particles attack. In case of eavesdropping attacks with full information again, the detection bit needs to be transmitted except those for detection, the total efficiency of the scheme approaches to 100%. The protocol can be generalized to N-party system by using N-partite entanglement states.