Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.6.123

Authenticated Quantum Secret Sharing using GHZ state swapping  

Lee, Duk-Jin (Center for Information Secu, Korea University)
Lee, Hwa-Yean (Center for Information Secu, Korea University)
Hong, Chang-Ho (Center for Information Secu, Korea University)
Lim, Jong-In (Center for Information Secu, Korea University)
Yang, Hyoung-Jin (Center for Information Secu, Korea University)
Abstract
We propose a quantum secret sharing protocol which can authenticate more than half of members using GHZ state swapping. The Trusted Third Party, Trent can authenticate all members using previously shared ID among Trent distributing his message and the members wanting to reconstruct the message. Authenticated members can reconstruct a secret message through GHZ swapping. Moreover, this protocol is efficient to expand the number of members to arbitrary number n, so it is a close quantum secret sharing protocol to classical secret sharing protocol.
Keywords
GHZ state swapping; Quantum Secret Sharing;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 H. Bechmann-Pasquinucci and N. Gisin, 'Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography.' Phys. Rev. A 59, 4238, 1999   DOI
2 D. Boschi, S. Branca, F. D. Martini, L. Hardy, and S. Popescu. 'Experimental realization of teleporting an unknown pure quantum state via dual classical and Einstein- Podolski-Rosen channels.' Phys. Rev. Lett., 80:1121-1125, 1998   DOI   ScienceOn
3 홍창호, 이화연, 김지인, 임종인, 양형진, 'Entanglement Swapping을 이용한 안 전한 직접 통신 프로토콜', 한국정보보호학회논문지, 16(1), Feb 2005
4 Z. Zhang, Y. Hi, Z. Man, 'Multiparty quantum secret sharing', Phy. Rev. A 71, 044301, 2005   DOI   ScienceOn
5 D. Bouwmeester, J. W. Pan, K. Mattle, M. Eibl, H. Weinfurter, and A. Zeilinger. 'Experimental quantum teleportation.' Nature, 390(6660):575-579, 1997   DOI   ScienceOn
6 M. Murao, M. B. Plenio, S. Popescu, V. Vedral, P. L. Knight. 'Multipartite entanglement purification protocols.' Phys. Rev. 57, R4075, 1998
7 D. Bruss, 'Optimal Eavesdropping in Quantum Cryptography with Six States.' Phys. Rev. Lett. 81, 3018, 1998   DOI   ScienceOn
8 A. Cabello, 'Quantum key distribution without alternative measurements.' Phys. Rev. A 61, 052312, 2000   DOI   ScienceOn
9 C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), p.175
10 M. A. Nielsen, E. Knill, and R. Laflamme. 'Complete quantum teleportation using nuclear magnetic resornance.' Nature, 396(6706):52- 55, 1998   DOI   ScienceOn
11 D. Brouwmeester, Jian-Wei Pan, M. Daniell, H. Weinfurter, A. Zeilinger, 'Observation of Three- Photon Greenberger- Horne-Zeilinger Entanglement' Phys. Rev. Lett. 82, 1345-1349(1999)   DOI   ScienceOn
12 M. Hillery, V. Buzek, and A. Berthiaume, 'Quantum secret sharing.' Phys. Rev. A 59, 1829, 1999   DOI   ScienceOn
13 S. Bandyopadhyay, 'Teleportation and secret sharing with pure entangled states.' Phys. Rev. A 62, 012308, 2000   DOI   ScienceOn
14 이화연, 홍창호, 이덕진, 양형진, 임종인, '인증 된 양자 키 분배 프로토콜', 한국정보보호학회논문지, 14(2), April 2004
15 A. Ekert, 'Quantum cryptography based on Bell's theorem.' Phys. Rev. Lett. 67,661,1991   DOI   ScienceOn
16 S. Bose, V. Vedral, P.L. Knight, 'Multiparticle generalization of entanglement swapping.' Phys. Rev. A 46, 2229, 1992   DOI   ScienceOn
17 C. Bennett, D. P. DiVincenzo, J. A. Smolin, W. K. Wootters. 'Mixed-state entanglement and quantum error correction.' Phys. Rev. A 54, 3824-3851, 1996   DOI   ScienceOn
18 A. Ambainis, A. Smith, K. Yang. 'Extracting Quantum Entanglement( General Entanglement Purification protocols).' 17th Annual IEEE conference on Computational Complexity (CCC2002) p103
19 D. Song, 'Secure key distribution by swapping quantum entanglement.' J. Phys. A 69, 034301, 2004
20 A. Nielsen, L. Chuang. 'Quantum computation and Quantum information', CAMBRIDGE UNIVERSITY PRESS
21 W. T. Buttler, R. J. Hughes, P. G. Kwiat, S. K. Lamoreaux, G. G. Luther, G. L. Morgan, J. E. Nordholt, C. G. Peterson, C. M. Simmons. 'Pratical free-space Quantum key distribution over 1km', Phys. Rev. Lett. 81:3283-3286, 1998   DOI   ScienceOn
22 C. H. Bennett and G. Brassard, C. Crepeau, R. Jozsa, A. Pres, and W. Wootters. 'Teleporting an unknown quantum state via dual classical and EPR channels.' Phys. Rev. Lett. 70:1895-1899. 1993   DOI   ScienceOn
23 A. Cabello, 'Quantum key distribution without alternative measurements.' Phys. Rev. A 61, 052312, 2000   DOI   ScienceOn
24 R. Cleve, D. Gottesman, Hoi-Kwong Lo. 'How to Share a Quantum Secret.' Phys. Rev. Lett. 83:648-651, 1999   DOI
25 N. Gisin, G. Ribordy, W. Tittle, H. Zbinden, 'Quantum Cryptography' Rev. Mod. Phys. 74, 145-195, 2002   DOI   ScienceOn
26 P. Chen, C, Li. 'Distilling multi partite pure state from a finite number of copies of multiprtite mixed states', Phys. Rev. A 69, 012308, 2004   DOI   ScienceOn
27 C. Kurtsiefer, P. Zarda, M. Halder, H. Weinfurter, P. M. Goran, P. R. Tapster, J. G. Rarity, 'A step towards global key distribution', Nature 419:450, 2002
28 D. M. Greenberger, M. A. Horne, A. Shimony, and A. Zeilinger, 'Bell's theorem without inequalities' Am. J. Phys. 58, 1131   DOI