{"title":"Authenticable quantum multi-secret sharing scheme based on monotone span program","authors":"Lele Li, Zhaowei Han, Feiting Guan","doi":"10.1007/s11128-023-04084-0","DOIUrl":null,"url":null,"abstract":"<div><p>Quantum multi-secret sharing plays a vital role in secure multi-key management. In this paper, an authenticable quantum multi-secret sharing scheme based on monotone span program is proposed. In our scheme, the distributor/participants run a quantum state digital signature algorithm to identify dishonest participants, strengthening the proposed scheme’s security. During the reconstruction phase, the participants encode their shares onto the generalized Bell states with the generalized Pauli operator to reconstruct multiple secrets. Here, the phase shift operator is utilized to share d-dimensional quantum states. Furthermore, security analysis shows that the proposed scheme can resist the entangle-measure attack, intercept-resend attack, and common internal attacks such as forgery attack, collusion attack, and denial attack.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"22 9","pages":""},"PeriodicalIF":2.2000,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Quantum Information Processing","FirstCategoryId":"101","ListUrlMain":"https://link.springer.com/article/10.1007/s11128-023-04084-0","RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PHYSICS, MATHEMATICAL","Score":null,"Total":0}
引用次数: 0
Abstract
Quantum multi-secret sharing plays a vital role in secure multi-key management. In this paper, an authenticable quantum multi-secret sharing scheme based on monotone span program is proposed. In our scheme, the distributor/participants run a quantum state digital signature algorithm to identify dishonest participants, strengthening the proposed scheme’s security. During the reconstruction phase, the participants encode their shares onto the generalized Bell states with the generalized Pauli operator to reconstruct multiple secrets. Here, the phase shift operator is utilized to share d-dimensional quantum states. Furthermore, security analysis shows that the proposed scheme can resist the entangle-measure attack, intercept-resend attack, and common internal attacks such as forgery attack, collusion attack, and denial attack.
期刊介绍:
Quantum Information Processing is a high-impact, international journal publishing cutting-edge experimental and theoretical research in all areas of Quantum Information Science. Topics of interest include quantum cryptography and communications, entanglement and discord, quantum algorithms, quantum error correction and fault tolerance, quantum computer science, quantum imaging and sensing, and experimental platforms for quantum information. Quantum Information Processing supports and inspires research by providing a comprehensive peer review process, and broadcasting high quality results in a range of formats. These include original papers, letters, broadly focused perspectives, comprehensive review articles, book reviews, and special topical issues. The journal is particularly interested in papers detailing and demonstrating quantum information protocols for cryptography, communications, computation, and sensing.