Browse > Article
http://dx.doi.org/10.3837/tiis.2020.07.021

Quantum Secret Sharing Scheme with Credible Authentication based on Quantum Walk  

Li, Xue-Yang (School of Cyberspace Security, Chengdu University of Information Technology)
Chang, Yan (School of Cyberspace Security, Chengdu University of Information Technology)
Zhang, Shi-Bin (School of Cyberspace Security, Chengdu University of Information Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.7, 2020 , pp. 3116-3133 More about this Journal
Abstract
Based on the teleportation by quantum walk, a quantum secret sharing scheme with credible authentication is proposed. Using the Hash function and quantum local operation, combined with the two-step quantum walks circuit on the line, the identity authentication and the teleportation of the secret information in distribution phase are realized. Participants collaborate honestly to recover secret information based on particle measurement results, preventing untrusted agents and external attacks from obtaining useful information. Due to the application of quantum walk, the sender does not need to prepare the necessary entangled state in advance, simply encodes the information to be sent in the coin state, and applies the conditional shift operator between the coin space and the position space to produce the entangled state necessary for quantum teleportation. Security analysis shows that the protocol can effectively resist intercept/resend attacks, entanglement attacks, participant attacks, and impersonation attacks. In addition, the quantum walk circuit used has been implemented in many different physical systems and experiments, so this quantum secret sharing scheme may be achievable in the future.
Keywords
Quantum Secret Sharing; Authentication; Quantum Walk; Teleportation; Qubit;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Ambainis, E. Bachy, A. Nayakz, et al, "One-dimensional quantum walks," in Proc. of the thirty-third annual ACM symposium on Theory of computing STOC01, pp. 37-49, 2001.
2 A. Cabello, "Quantum Key Distribution in the Holevo Limit," Physical Review Letters, vol. 85, pp. 5635, January, 2000.   DOI
3 Y. Du, W. Bao, "Multiparty quantum secret sharing scheme based on the phase shift operations," Optics Communications, vol. 308, no. 1, pp. 159-163, November, 2013.   DOI
4 Z. Zhu, A. Hu, A. Fu, "Cryptanalysis of a new circular quantum secret sharing protocol for remote agents," Quantum Information Processing, vol. 12, no. 2, pp. 1173-1183, February, 2013.   DOI
5 R. Shi, L. Huang, W. Yang, et al, "Multiparty quantum secret sharing with Bell states and Bell measurements," Optics Communications, vol. 283, no. 11, pp. 2476-2480, June, 2010.   DOI
6 G. Gan, "Multiparty Quantum Secret Sharing Using Two-Photon Three-Dimensional Bell States," Communications in Theoretical Physics, vol. 52, no. 3, pp. 421-424, September, 2009.   DOI
7 M. Dusek, O. Haderka, M. Hendrych, et al, "Quantum identification system," Physical Review A, vol. 60, pp. 149, January, 1999.   DOI
8 Q. Cai, "Eavesdropping on the two-way quantum communication protocols with invisible photons," Physics Letters A, vol. 351, no. 1-2, pp. 23-25, February, 2006.   DOI
9 J. Lin, T. Hwang, "New circular quantum secret sharing for remote agents," Quantum Information Processing, vol. 12, no. 1, pp. 685-697, April, 2013.   DOI
10 F. Liu, Q. Su, Q. Wen, "Eavesdropping on Multiparty Quantum Secret Sharing Scheme Based on the Phase Shift Operations," International Journal of Theoretical Physics, vol. 53, no. 5, pp. 1730-1737, April, 2014.   DOI
11 H. Qin, X. Zhu, Y. Dai, "(t, n) Threshold quantum secret sharing using the phase shift operation," Quantum Information Processing, vol. 14, no. 8, pp. 2997-3004, August, 2015.   DOI
12 T. Hwang, C. Hwang, C. Li, "Multiparty quantum secret sharing based on GHZ states," Physica Scripta, vol. 83, no. 4, pp. 045004, March, 2011.   DOI
13 X. Liu, R. Pan, "Cryptanalysis of quantum secret sharing based on GHZ states," Physica Scripta, vol. 84, no. 4, pp. 045015, September, 2011.   DOI
14 P. Xue, R. Zhang, H. Qin, et al, "Experimental quantum-walk revival with a time-dependent coin," Physical Review Letters, vol. 114, no. 14, pp. 140502, April, 2015.   DOI
15 H. Wang, Y. Huang, X. Fang, et al, "High-Capacity Three-Party Quantum Secret Sharing with Single Photons in Both the Polarization and the Spatial-Mode Degrees of Freedom," International Journal of Theoretical Physics, vol. 52, no. 4, pp.1043-1051, April, 2013.   DOI
16 S. Hao, B. Yu, "Multiparty Quantum Secret Information Sharing in Enterprise Management Based on Single Qubit with Random Rotation Angle," International Journal of Theoretical Physics, vol. 51, no. 6, pp. 1674-1679, June, 2012.   DOI
17 Y. Yang, Q.Wen, X. Zhang, "Multiparty simultaneous quantum identity authentication with secret sharing," Science in China Series G: Physics, Mechanics and Astronomy, vol. 51, no. 3, pp. 321-327, January, 2008.   DOI
18 X. Zhang, D. Ji, "Analysis of a kind of quantum cryptographic schemes based on secret sharing," Science in China Series G: Physics, Mechanics and Astronomy, vol. 52, no. 9, pp. 1313-1316, September, 2009.   DOI
19 Y. Yang, H. Wang, X. Jia, H. Zhang, "A Quantum Protocol for (t,n)-Threshold Identity Authentication Based on Greenberger-Horne-Zeilinger States," International Journal of Theoretical Physics, vol. 52, no. 2, pp. 524-530, 2013.   DOI
20 H. Abulkasim, S. Hamad, K. Bahnasy, et al, "Authenticated quantum secret sharing with quantum dialogue based on Bell states," Physica Scripta, vol. 91, no. 8, pp. 085101, July, 2016.   DOI
21 Y. Aharonov, L. Davidovich, N. Zagury, "Quantum random walks," Physical Review A, vol. 48, no. 2, pp. 1687-1690, 1993.   DOI
22 J. Kempe, "Quantum random walks - an introductory overview," Contemporary Physics, vol. 44, no. 4, pp. 307-327, January, 2003.   DOI
23 X. Chen, Y. Wang, G. Xu, et al, "Quantum Network Communication With a Novel Discrete-Time Quantum Walk," IEEE Access, vol. 7, pp. 13634-13642, January, 2019.   DOI
24 S.E. Venegas-Andraca, "Quantum walks: a comprehensive review," Quantum Information Processing, vol. 11, no. 5, pp. 1015-1106, January, 2012.   DOI
25 Y.Wang, Y. Shang, P. Xue, "Generalized teleportation by quantum walks," Quantum Information Processing, vol. 16, no. 221, September, 2017.
26 Y. Shang, Y. Wang, M. Li, et al, "Quantum communication protocols by quantum walks with two coins," Europhysics Letters, vol. 124, no. 6, pp. 60009, February, 2019.   DOI
27 Z. Bian, J. Li, X. Zhan, et al, "Experimental implementation of a quantum walk on a circle with single photons," Physical Review A, vol. 95, no. 5, pp. 052338, May, 2017.   DOI
28 M. Hillery, V. Buzek, A. Berthiaume, "Quantum secret sharing," Physical Review A, vol. 59, no. 3, pp. 1829-1834, March 1999.   DOI
29 W. Liu, P. Gao, W. Yu, et al, "Quantum Relief algorithm," Quantum Information Processing, vol. 17, no. 10, pp. 280, October, 2018.   DOI
30 X. Zou, Y. Dong, G. Guo, "Optical implementation of one-dimensional quantum random walks using orbital angular momentum of a single photon," New Journal of Physics, vol. 8, no. 81, May, 2006.
31 H. Tang, X. Lin, Z. Feng, et al, "Experimental two-dimensional quantum walk on a photonic chip," Science Advances, vol. 4, no. 5, pp.3174, December, 2018.
32 Y. Feng, R. Shi, J. Shi, et al, "Arbitrated quantum signature scheme with quantum walk-based teleportation," Quantum Information Processing, vol. 18, no. 5, pp. 15, April, 2019.   DOI
33 J. Shi, H. Chen, F. Zhou, et al, "Quantum Blind Signature Scheme with Cluster States Based on Quantum Walk Cryptosystem," International Journal of Theoretical Physics, vol. 58, no. 4, pp. 1337-1349, February, 2019.   DOI
34 H. Lee, H. Yang, J. Lim, "Quantum Direct Communication with Authentication," Physical Review A, vol. 73, no. 4, pp. 543-543, April 2006.
35 Z. Qu, Z. Li, G. Xu, et al, "Quantum Image Steganography Protocol Based on Quantum Image Expansion and Grover Search Algorithm," IEEE Access, vol. 7, pp. 50849-50857, January, 2019.   DOI
36 Y. Chang, S. Zhang, L. Yan, et al, "A Quantum Authorization Management Protocol Based on EPR-Pairs," Computers, Materials & Continua, vol. 59, no. 3, pp. 1005-1014, 2019.   DOI
37 W. Liu, P. Gao, Z. Liu, et al, "A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment," Security and Communication Networks, vol. 2019, pp.1-14, 2019.
38 Z. Qu, S. Wu, M. Wang, et al, "Effect of quantum noise on deterministic remote state preparation of an arbitrary two-particle state via various quantum entangled channels," Quantum Information Processing, vol. 16, no.12, pp. 306, December, 2017.   DOI
39 Z. Qu, Z. Wen, X. Wang, "Matrix Coding-Based Quantum Image Steganography Algorithm", IEEE Access, vol. 7, pp. 35684-35698, January, 2019.   DOI
40 L. Yan, Y. Chang, S. Zhang, et al, "Measure-Resend Semi-Quantum Private Compari-son Scheme Using GHZ Class States," Computers, Materials & Continua, vol. 61, no. 2, pp. 877-887, 2019.   DOI
41 S. Zhang, Y. Chang, L. Yan, et al, "Quantum Communication Networks and Trust Management: A Survey," Computers, Materials & Continua, vol. 61, no.3, pp.1145-1174, January, 2019.   DOI
42 W. Liu, Y. Xu, M. Zhang, et al, "A Novel Quantum Visual Secret Sharing Scheme," IEEE Access, vol. 7, pp. 114374-114384, 2019.   DOI
43 X. Chen, X. Niu, X. Zhou, et al, "Multi-party quantum secret sharing with the single-particle quantum state to encode the information," Quantum Information Processing, vol. 12, no. 1, pp. 365-380, March, 2013.   DOI