具有 (m, n) 门限的量子秘密共享:QFT 和身份验证

IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL
Priyanka Mawlia, Vikash Siwach, Pankaj Bijaranian, Deepak Singh
{"title":"具有 (m, n) 门限的量子秘密共享:QFT 和身份验证","authors":"Priyanka Mawlia,&nbsp;Vikash Siwach,&nbsp;Pankaj Bijaranian,&nbsp;Deepak Singh","doi":"10.1007/s11128-024-04532-5","DOIUrl":null,"url":null,"abstract":"<div><p>In the field of quantum cryptography, quantum secret sharing (QSS) holds substantial importance, with identity authentication emerging as a key strategy for safeguarding information. It efficiently certifies the identification of both persons involved in the conversation, which contributes to increased security measures. Our proposed, <span>\\((m, n)\\)</span> threshold quantum secret sharing (QSS) scheme introduces a unique approach to mutual identity authentication, utilizing mutually unbiased bases. Alice employs a symmetric bivariate polynomial to distribute the secret share among all participants in this algorithm. For secret reconstruction, a trusted participant, <span>\\({Bob}_{1}\\)</span>, shares a GHZ state with a qualified group of <span>\\(m\\)</span> participants, including himself. Each participant applies QFT and a unitary transformation (related to their part of the shared secret) on their particle. During the secret recovery phase, the scheme ensures that secrets exclusively held by participants remain undisclosed and are not transmitted, reinforcing the security of the communication process. As a result, external eavesdroppers are left empty-handed in their attempt to access information about secrets during this phase. Our protocol surpasses in terms of security, effectiveness, and practicality, proving its resilience against intercept–resend attacks, collision attacks, collective attacks, entangle-measure attacks, and forgery attacks according to a comprehensive security analysis.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"23 10","pages":""},"PeriodicalIF":2.2000,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Quantum secret sharing with (m, n) threshold: QFT and identity authentication\",\"authors\":\"Priyanka Mawlia,&nbsp;Vikash Siwach,&nbsp;Pankaj Bijaranian,&nbsp;Deepak Singh\",\"doi\":\"10.1007/s11128-024-04532-5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>In the field of quantum cryptography, quantum secret sharing (QSS) holds substantial importance, with identity authentication emerging as a key strategy for safeguarding information. It efficiently certifies the identification of both persons involved in the conversation, which contributes to increased security measures. Our proposed, <span>\\\\((m, n)\\\\)</span> threshold quantum secret sharing (QSS) scheme introduces a unique approach to mutual identity authentication, utilizing mutually unbiased bases. Alice employs a symmetric bivariate polynomial to distribute the secret share among all participants in this algorithm. For secret reconstruction, a trusted participant, <span>\\\\({Bob}_{1}\\\\)</span>, shares a GHZ state with a qualified group of <span>\\\\(m\\\\)</span> participants, including himself. Each participant applies QFT and a unitary transformation (related to their part of the shared secret) on their particle. During the secret recovery phase, the scheme ensures that secrets exclusively held by participants remain undisclosed and are not transmitted, reinforcing the security of the communication process. As a result, external eavesdroppers are left empty-handed in their attempt to access information about secrets during this phase. Our protocol surpasses in terms of security, effectiveness, and practicality, proving its resilience against intercept–resend attacks, collision attacks, collective attacks, entangle-measure attacks, and forgery attacks according to a comprehensive security analysis.</p></div>\",\"PeriodicalId\":746,\"journal\":{\"name\":\"Quantum Information Processing\",\"volume\":\"23 10\",\"pages\":\"\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2024-10-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Quantum Information Processing\",\"FirstCategoryId\":\"101\",\"ListUrlMain\":\"https://link.springer.com/article/10.1007/s11128-024-04532-5\",\"RegionNum\":3,\"RegionCategory\":\"物理与天体物理\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"PHYSICS, MATHEMATICAL\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Quantum Information Processing","FirstCategoryId":"101","ListUrlMain":"https://link.springer.com/article/10.1007/s11128-024-04532-5","RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PHYSICS, MATHEMATICAL","Score":null,"Total":0}
引用次数: 0

摘要

在量子密码学领域,量子秘密共享(QSS)具有非常重要的意义,其中身份验证已成为保护信息的关键策略。它能有效地认证对话双方的身份,有助于提高安全措施。我们提出的 \((m, n)\)阈量子秘密共享(QSS)方案利用互不偏倚的基础,引入了一种独特的相互身份验证方法。在该算法中,爱丽丝使用对称双变量多项式在所有参与者之间分配秘密共享。为了进行秘密重构,受信任的参与者({Bob}_{1}\)与包括他自己在内的一组合格的参与者共享 GHZ 状态。每个参与者都会在自己的粒子上应用 QFT 和单元变换(与共享秘密中自己的部分相关)。在秘密恢复阶段,该方案确保参与者独有的秘密不被泄露和传输,从而加强了通信过程的安全性。因此,外部窃听者在这一阶段试图获取秘密信息时将一无所获。我们的协议在安全性、有效性和实用性方面均有超越,通过全面的安全性分析,证明了它对拦截-发送攻击、碰撞攻击、集体攻击、纠缠-测量攻击和伪造攻击的抵御能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Quantum secret sharing with (m, n) threshold: QFT and identity authentication

In the field of quantum cryptography, quantum secret sharing (QSS) holds substantial importance, with identity authentication emerging as a key strategy for safeguarding information. It efficiently certifies the identification of both persons involved in the conversation, which contributes to increased security measures. Our proposed, \((m, n)\) threshold quantum secret sharing (QSS) scheme introduces a unique approach to mutual identity authentication, utilizing mutually unbiased bases. Alice employs a symmetric bivariate polynomial to distribute the secret share among all participants in this algorithm. For secret reconstruction, a trusted participant, \({Bob}_{1}\), shares a GHZ state with a qualified group of \(m\) participants, including himself. Each participant applies QFT and a unitary transformation (related to their part of the shared secret) on their particle. During the secret recovery phase, the scheme ensures that secrets exclusively held by participants remain undisclosed and are not transmitted, reinforcing the security of the communication process. As a result, external eavesdroppers are left empty-handed in their attempt to access information about secrets during this phase. Our protocol surpasses in terms of security, effectiveness, and practicality, proving its resilience against intercept–resend attacks, collision attacks, collective attacks, entangle-measure attacks, and forgery attacks according to a comprehensive security analysis.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Quantum Information Processing
Quantum Information Processing 物理-物理:数学物理
CiteScore
4.10
自引率
20.00%
发文量
337
审稿时长
4.5 months
期刊介绍: Quantum Information Processing is a high-impact, international journal publishing cutting-edge experimental and theoretical research in all areas of Quantum Information Science. Topics of interest include quantum cryptography and communications, entanglement and discord, quantum algorithms, quantum error correction and fault tolerance, quantum computer science, quantum imaging and sensing, and experimental platforms for quantum information. Quantum Information Processing supports and inspires research by providing a comprehensive peer review process, and broadcasting high quality results in a range of formats. These include original papers, letters, broadly focused perspectives, comprehensive review articles, book reviews, and special topical issues. The journal is particularly interested in papers detailing and demonstrating quantum information protocols for cryptography, communications, computation, and sensing.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信