{"title":"量子秘密共享方案的外部攻击","authors":"Jian-Hong Shi, Shengli Zhang, Zheng-Gang Chang","doi":"10.1109/ICIST.2013.6747680","DOIUrl":null,"url":null,"abstract":"This paper analyzes the security of a quantum secret sharing protocol between multiparty and multiparty, which was proposed by Yan and Gao. We show that this protocol is not secure because an external attacker can obtain the secret message shared by the two groups, making use of entanglement swapping. There are two reasons leading to this result. Firstly, the messages, which are transmitted on the quantum and classical channels, are not protected by message authentication. Secondly, the last participant in group 1 knows more information about the shared secret by the two groups. This result shows that there are some hidden security loopholes in this kind of quantum secret sharing protocols.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"External attack of a quantum secret sharing scheme\",\"authors\":\"Jian-Hong Shi, Shengli Zhang, Zheng-Gang Chang\",\"doi\":\"10.1109/ICIST.2013.6747680\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper analyzes the security of a quantum secret sharing protocol between multiparty and multiparty, which was proposed by Yan and Gao. We show that this protocol is not secure because an external attacker can obtain the secret message shared by the two groups, making use of entanglement swapping. There are two reasons leading to this result. Firstly, the messages, which are transmitted on the quantum and classical channels, are not protected by message authentication. Secondly, the last participant in group 1 knows more information about the shared secret by the two groups. This result shows that there are some hidden security loopholes in this kind of quantum secret sharing protocols.\",\"PeriodicalId\":415759,\"journal\":{\"name\":\"2013 IEEE Third International Conference on Information Science and Technology (ICIST)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-03-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE Third International Conference on Information Science and Technology (ICIST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIST.2013.6747680\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIST.2013.6747680","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
External attack of a quantum secret sharing scheme
This paper analyzes the security of a quantum secret sharing protocol between multiparty and multiparty, which was proposed by Yan and Gao. We show that this protocol is not secure because an external attacker can obtain the secret message shared by the two groups, making use of entanglement swapping. There are two reasons leading to this result. Firstly, the messages, which are transmitted on the quantum and classical channels, are not protected by message authentication. Secondly, the last participant in group 1 knows more information about the shared secret by the two groups. This result shows that there are some hidden security loopholes in this kind of quantum secret sharing protocols.