基于非对称二元多项式的可验证(t,n)阈值量子秘密共享方案

IF 1.2 4区 物理与天体物理 Q4 OPTICS
Feiting Guan, Jiansheng Guo, Lele Li
{"title":"基于非对称二元多项式的可验证(t,n)阈值量子秘密共享方案","authors":"Feiting Guan, Jiansheng Guo, Lele Li","doi":"10.1088/1555-6611/ad04c2","DOIUrl":null,"url":null,"abstract":"Abstract Threshold quantum secret sharing is a typical method for quantum secret sharing (QSS) schemes. In this paper, we propose a verifiable <?CDATA $\\left( {t,n} \\right)$?> <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" overflow=\"scroll\"> <mml:mfenced close=\")\" open=\"(\"> <mml:mrow> <mml:mi>t</mml:mi> <mml:mo>,</mml:mo> <mml:mi>n</mml:mi> </mml:mrow> </mml:mfenced> </mml:math> threshold QSS scheme based on the <?CDATA $d$?> <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" overflow=\"scroll\"> <mml:mi>d</mml:mi> </mml:math> -dimensional Bell state and asymmetric binary polynomial. In this scheme, the dealer encodes the secret using the asymmetric binary polynomial and generates the corresponding secret share for each participant. Then, the dealer prepares the <?CDATA $d$?> <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" overflow=\"scroll\"> <mml:mi>d</mml:mi> </mml:math> -dimensional Bell state, and the participants perform corresponding unitary operations on the particles in transmission to recover the secret. With the hash function and the session key pairs, not only the cheating behavior of the dishonest participants can be detected, but also the specific cheaters can be identified. Furthermore, we consider the case when no less than <?CDATA $t$?> <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" overflow=\"scroll\"> <mml:mi>t</mml:mi> </mml:math> participants cooperate to recover the secret, which makes the proposed scheme more practical. Analyses show that the scheme can resist forgery attack, collusion attack and other common attacks.","PeriodicalId":17976,"journal":{"name":"Laser Physics","volume":"97 12","pages":"0"},"PeriodicalIF":1.2000,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A verifiable (t,n) threshold quantum secret sharing scheme based on asymmetric binary polynomial\",\"authors\":\"Feiting Guan, Jiansheng Guo, Lele Li\",\"doi\":\"10.1088/1555-6611/ad04c2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract Threshold quantum secret sharing is a typical method for quantum secret sharing (QSS) schemes. In this paper, we propose a verifiable <?CDATA $\\\\left( {t,n} \\\\right)$?> <mml:math xmlns:mml=\\\"http://www.w3.org/1998/Math/MathML\\\" overflow=\\\"scroll\\\"> <mml:mfenced close=\\\")\\\" open=\\\"(\\\"> <mml:mrow> <mml:mi>t</mml:mi> <mml:mo>,</mml:mo> <mml:mi>n</mml:mi> </mml:mrow> </mml:mfenced> </mml:math> threshold QSS scheme based on the <?CDATA $d$?> <mml:math xmlns:mml=\\\"http://www.w3.org/1998/Math/MathML\\\" overflow=\\\"scroll\\\"> <mml:mi>d</mml:mi> </mml:math> -dimensional Bell state and asymmetric binary polynomial. In this scheme, the dealer encodes the secret using the asymmetric binary polynomial and generates the corresponding secret share for each participant. Then, the dealer prepares the <?CDATA $d$?> <mml:math xmlns:mml=\\\"http://www.w3.org/1998/Math/MathML\\\" overflow=\\\"scroll\\\"> <mml:mi>d</mml:mi> </mml:math> -dimensional Bell state, and the participants perform corresponding unitary operations on the particles in transmission to recover the secret. With the hash function and the session key pairs, not only the cheating behavior of the dishonest participants can be detected, but also the specific cheaters can be identified. Furthermore, we consider the case when no less than <?CDATA $t$?> <mml:math xmlns:mml=\\\"http://www.w3.org/1998/Math/MathML\\\" overflow=\\\"scroll\\\"> <mml:mi>t</mml:mi> </mml:math> participants cooperate to recover the secret, which makes the proposed scheme more practical. Analyses show that the scheme can resist forgery attack, collusion attack and other common attacks.\",\"PeriodicalId\":17976,\"journal\":{\"name\":\"Laser Physics\",\"volume\":\"97 12\",\"pages\":\"0\"},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2023-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Laser Physics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1088/1555-6611/ad04c2\",\"RegionNum\":4,\"RegionCategory\":\"物理与天体物理\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"OPTICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Laser Physics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1088/1555-6611/ad04c2","RegionNum":4,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"OPTICS","Score":null,"Total":0}
引用次数: 0

摘要

阈值量子秘密共享是量子秘密共享(QSS)方案的典型方法。本文提出了一种基于d维贝尔状态和非对称二元多项式的可验证的t, n阈值QSS方案。在该方案中,交易商使用非对称二进制多项式对秘密进行编码,并为每个参与者生成相应的秘密共享。然后,经销商准备d维贝尔状态,参与者对传输中的粒子进行相应的幺正操作,恢复秘密。利用哈希函数和会话密钥对,不仅可以检测出不诚实参与者的作弊行为,还可以识别出具体的作弊者。此外,我们考虑了不少于t个参与者合作恢复秘密的情况,使所提出的方案更具实用性。分析表明,该方案能够抵御伪造攻击、串通攻击等常见攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A verifiable (t,n) threshold quantum secret sharing scheme based on asymmetric binary polynomial
Abstract Threshold quantum secret sharing is a typical method for quantum secret sharing (QSS) schemes. In this paper, we propose a verifiable t , n threshold QSS scheme based on the d -dimensional Bell state and asymmetric binary polynomial. In this scheme, the dealer encodes the secret using the asymmetric binary polynomial and generates the corresponding secret share for each participant. Then, the dealer prepares the d -dimensional Bell state, and the participants perform corresponding unitary operations on the particles in transmission to recover the secret. With the hash function and the session key pairs, not only the cheating behavior of the dishonest participants can be detected, but also the specific cheaters can be identified. Furthermore, we consider the case when no less than t participants cooperate to recover the secret, which makes the proposed scheme more practical. Analyses show that the scheme can resist forgery attack, collusion attack and other common attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Laser Physics
Laser Physics 物理-光学
CiteScore
2.60
自引率
8.30%
发文量
127
审稿时长
2.2 months
期刊介绍: Laser Physics offers a comprehensive view of theoretical and experimental laser research and applications. Articles cover every aspect of modern laser physics and quantum electronics, emphasizing physical effects in various media (solid, gaseous, liquid) leading to the generation of laser radiation; peculiarities of propagation of laser radiation; problems involving impact of laser radiation on various substances and the emerging physical effects, including coherent ones; the applied use of lasers and laser spectroscopy; the processing and storage of information; and more. The full list of subject areas covered is as follows: -physics of lasers- fibre optics and fibre lasers- quantum optics and quantum information science- ultrafast optics and strong-field physics- nonlinear optics- physics of cold trapped atoms- laser methods in chemistry, biology, medicine and ecology- laser spectroscopy- novel laser materials and lasers- optics of nanomaterials- interaction of laser radiation with matter- laser interaction with solids- photonics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信