Please wait a minute...
Chin. Phys. B, 2009, Vol. 18(6): 2149-2153    DOI: 10.1088/1674-1056/18/6/007
GENERAL Prev   Next  

Enhancing the security of quantum secret sharing against multiphoton attack

Zhang Bin-Bin(张彬彬)a)†, Wang Da-Qing(王大庆)a), Huang Shan-Shan(黄珊珊)b), and Liu Yu(刘玉)b)‡
a College of Optoelectronic Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074, China; b Department of Electronic Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074, China
Abstract  It is generally believed that nonorthogonal operations which can realize the state transformation between two nonorthogonal bases may ensure the security of many quantum communication protocols. However, in this paper, we present a powerful attack against quantum secret sharing protocols of these kinds. Applying entangled photons as fake signals, Eve can successfully steal the exact information without being revealed. We also give our effective modification to improve it. Under the suggested checking strategy, even to Eve's most general attack, it is robust and secure.
Keywords:  quantum secret sharing      cryptanalysis      entangled photons      security  
Received:  29 October 2008      Revised:  05 December 2008      Accepted manuscript online: 
PACS:  03.67.Hk (Quantum communication)  
  03.65.Ud (Entanglement and quantum nonlocality)  
  42.50.Dv (Quantum state engineering and measurements)  

Cite this article: 

Zhang Bin-Bin(张彬彬), Wang Da-Qing(王大庆), Huang Shan-Shan(黄珊珊), and Liu Yu(刘玉) Enhancing the security of quantum secret sharing against multiphoton attack 2009 Chin. Phys. B 18 2149

[1] Measurement-device-independent quantum secret sharing with hyper-encoding
Xing-Xing Ju(居星星), Wei Zhong(钟伟), Yu-Bo Sheng(盛宇波), and Lan Zhou(周澜). Chin. Phys. B, 2022, 31(10): 100302.
[2] Experimental study on age and gender differences in microscopic movement characteristics of students
Jiayue Wang(王嘉悦), Maik Boltes, Armin Seyfried, Antoine Tordeux, Jun Zhang(张俊), and Wenguo Weng(翁文国). Chin. Phys. B, 2021, 30(9): 098902.
[3] Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme
Jing-Wen Zhang(张静文), Xiu-Bo Chen(陈秀波), Gang Xu(徐刚), and Yi-Xian Yang(杨义先). Chin. Phys. B, 2021, 30(7): 070309.
[4] Three-party reference frame independent quantum key distribution protocol
Comfort Sekga and Mhlambululi Mafu. Chin. Phys. B, 2021, 30(12): 120301.
[5] Dynamic quantum secret sharing protocol based on two-particle transform of Bell states
Yu-Tao Du(杜宇韬), Wan-Su Bao(鲍皖苏). Chin. Phys. B, 2018, 27(8): 080304.
[6] Controlling a sine wave gating single-photon detector by exploiting its filtering loophole
Lin-Xi Feng(冯林溪), Mu-Sheng Jiang(江木生), Wan-Su Bao(鲍皖苏), Hong-Wei Li(李宏伟), Chun Zhou(周淳), Yang Wang(汪洋). Chin. Phys. B, 2018, 27(8): 080305.
[7] A novel image encryption scheme based on Kepler's third law and random Hadamard transform
Yu-Ling Luo(罗玉玲), Rong-Long Zhou(周戎龙), Jun-Xiu Liu(刘俊秀), Sen-Hui Qiu(丘森辉), Yi Cao(曹弋). Chin. Phys. B, 2017, 26(12): 120504.
[8] Relating Maxwell's demon and quantitative analysis of information leakage for practical imperative programs
Kushal Anjaria, Arun Mishra. Chin. Phys. B, 2017, 26(10): 100507.
[9] A self-cited pixel summation based image encryption algorithm
Guo-Dong Ye(叶国栋), Xiao-Ling Huang(黄小玲), Leo Yu Zhang(张愉), Zheng-Xia Wang(王政霞). Chin. Phys. B, 2017, 26(1): 010501.
[10] Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad
Zhi-Hao Liu(刘志昊), Han-Wu Chen(陈汉武). Chin. Phys. B, 2016, 25(8): 080308.
[11] Intercept-resend attack on six-state quantum key distribution over collective-rotation noise channels
Kevin Garapo, Mhlambululi Mafu, Francesco Petruccione. Chin. Phys. B, 2016, 25(7): 070303.
[12] Improving the secrecy rate by turning foes to allies: An auction scheme
Ma Ya-Yan (马亚燕), Wang Bao-Yun (王保云). Chin. Phys. B, 2015, 24(9): 090209.
[13] An efficient three-party password-based key agreement protocol using extended chaotic maps
Shu Jian (舒剑). Chin. Phys. B, 2015, 24(6): 060509.
[14] An encryption scheme based on phase-shifting digital holography and amplitude-phase disturbance
Hua Li-Li (花丽丽), Xu Ning (徐宁), Yang Geng (杨庚). Chin. Phys. B, 2014, 23(6): 064201.
[15] Security of biased BB84 quantum key distribution with finite resource
Zhao Liang-Yuan (赵良圆), Li Hong-Wei (李宏伟), Yin Zhen-Qiang (银振强), Chen Wei (陈巍), You Juan (尤娟), Han Zheng-Fu (韩正甫). Chin. Phys. B, 2014, 23(10): 100304.
No Suggested Reading articles found!