{"title":"基于图态的动态量子秘密共享,并在测量前和测量后阶段进行代理管理","authors":"Jason Lin, Li-Yu Hsieh","doi":"10.1007/s11128-025-04910-7","DOIUrl":null,"url":null,"abstract":"<div><p>This paper proposes an advanced dynamic quantum secret sharing (DQSS) protocol that leverages the graphical properties of graph states. Unlike most existing DQSS protocols, the proposed scheme supports the dynamic addition and revocation of agents both before and after measurements are performed. In the pre-measurement phase, the dealer can adjust agent participation through graphical operations without requiring any action from the agents. In the post-measurement phase, two approaches are introduced to address different security requirements. In the first approach, agents’ shadow keys are hidden from the dealer, which enhances security but requires agent cooperation and incurs additional cost. In the second approach, the shadow keys are revealed to the dealer, which simplifies revocation without additional cost. Moreover, the proposed protocol requires only single-qubit measurements from agents. In terms of security, it resists collusion and attacks by dishonest revoked agents, and it relies solely on one-way quantum channels, thereby eliminating the need for additional devices to prevent Trojan horse attacks.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 10","pages":""},"PeriodicalIF":2.2000,"publicationDate":"2025-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Dynamic quantum secret sharing based on graph states with agent management in pre-measurement and post-measurement phases\",\"authors\":\"Jason Lin, Li-Yu Hsieh\",\"doi\":\"10.1007/s11128-025-04910-7\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>This paper proposes an advanced dynamic quantum secret sharing (DQSS) protocol that leverages the graphical properties of graph states. Unlike most existing DQSS protocols, the proposed scheme supports the dynamic addition and revocation of agents both before and after measurements are performed. In the pre-measurement phase, the dealer can adjust agent participation through graphical operations without requiring any action from the agents. In the post-measurement phase, two approaches are introduced to address different security requirements. In the first approach, agents’ shadow keys are hidden from the dealer, which enhances security but requires agent cooperation and incurs additional cost. In the second approach, the shadow keys are revealed to the dealer, which simplifies revocation without additional cost. Moreover, the proposed protocol requires only single-qubit measurements from agents. In terms of security, it resists collusion and attacks by dishonest revoked agents, and it relies solely on one-way quantum channels, thereby eliminating the need for additional devices to prevent Trojan horse attacks.</p></div>\",\"PeriodicalId\":746,\"journal\":{\"name\":\"Quantum Information Processing\",\"volume\":\"24 10\",\"pages\":\"\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2025-09-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Quantum Information Processing\",\"FirstCategoryId\":\"101\",\"ListUrlMain\":\"https://link.springer.com/article/10.1007/s11128-025-04910-7\",\"RegionNum\":3,\"RegionCategory\":\"物理与天体物理\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"PHYSICS, MATHEMATICAL\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Quantum Information Processing","FirstCategoryId":"101","ListUrlMain":"https://link.springer.com/article/10.1007/s11128-025-04910-7","RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PHYSICS, MATHEMATICAL","Score":null,"Total":0}
Dynamic quantum secret sharing based on graph states with agent management in pre-measurement and post-measurement phases
This paper proposes an advanced dynamic quantum secret sharing (DQSS) protocol that leverages the graphical properties of graph states. Unlike most existing DQSS protocols, the proposed scheme supports the dynamic addition and revocation of agents both before and after measurements are performed. In the pre-measurement phase, the dealer can adjust agent participation through graphical operations without requiring any action from the agents. In the post-measurement phase, two approaches are introduced to address different security requirements. In the first approach, agents’ shadow keys are hidden from the dealer, which enhances security but requires agent cooperation and incurs additional cost. In the second approach, the shadow keys are revealed to the dealer, which simplifies revocation without additional cost. Moreover, the proposed protocol requires only single-qubit measurements from agents. In terms of security, it resists collusion and attacks by dishonest revoked agents, and it relies solely on one-way quantum channels, thereby eliminating the need for additional devices to prevent Trojan horse attacks.
期刊介绍:
Quantum Information Processing is a high-impact, international journal publishing cutting-edge experimental and theoretical research in all areas of Quantum Information Science. Topics of interest include quantum cryptography and communications, entanglement and discord, quantum algorithms, quantum error correction and fault tolerance, quantum computer science, quantum imaging and sensing, and experimental platforms for quantum information. Quantum Information Processing supports and inspires research by providing a comprehensive peer review process, and broadcasting high quality results in a range of formats. These include original papers, letters, broadly focused perspectives, comprehensive review articles, book reviews, and special topical issues. The journal is particularly interested in papers detailing and demonstrating quantum information protocols for cryptography, communications, computation, and sensing.