A detailed analysis has showed that the quantum secret sharing protocol based on the Grover algorithm (Phys Rev A, 2003, 68: 022306) is insecure. A dishonest receiver may obtain the full information without being dete...A detailed analysis has showed that the quantum secret sharing protocol based on the Grover algorithm (Phys Rev A, 2003, 68: 022306) is insecure. A dishonest receiver may obtain the full information without being detected. A quantum secret-sharing protocol is presents here, which mends the security loophole of the original secret-sharing protocol, and doubles the information capacity.展开更多
A protocol of quantum secret sharing between multiparty and multiparty with four states was presented. It was shown that this protocol can nullify the Trojan horse attack with a multi-photon signal, the fake-signal at...A protocol of quantum secret sharing between multiparty and multiparty with four states was presented. It was shown that this protocol can nullify the Trojan horse attack with a multi-photon signal, the fake-signal attack with Einstein-Podolsky- Rosen pairs, the attack with single photons, and the attack with invisible photons. In addition, the upper bounds of the average success probabilities were given for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states.展开更多
We present a quantum secret sharing scheme between multiparty (m members in Group 1) and multiparty (n members in Group 2), and analyze its security. This scheme takes EPR pairs in Bell states as quantum resources. In...We present a quantum secret sharing scheme between multiparty (m members in Group 1) and multiparty (n members in Group 2), and analyze its security. This scheme takes EPR pairs in Bell states as quantum resources. In order to obtain the shared key, all members only need to perform Bell measurements, rather than perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is not necessary except for the eavesdropping checks.展开更多
A quantum secret sharing scheme between an m-party group and an n-party group is proposed using three conjugate bases.A sequence of single photons,each of which is prepared in one of the six states,is used directly to...A quantum secret sharing scheme between an m-party group and an n-party group is proposed using three conjugate bases.A sequence of single photons,each of which is prepared in one of the six states,is used directly to encode classical information in the quantum secret sharing process.In this scheme,each of all m members in group 1 chooses randomly his/her own secret key individually and independently,and directly encodes his/her respective secret information on the states of single photons via unitary operations,then the last one sends 1/n of the resulting qubits to each member of group 2.By measuring their respective qubits,all members in group 2 share the secret information shared by all members in group 1.It renders impossible a Trojan horse attack with a multi-photon signal,a fake-signal attack with EPR pairs,an attack with single photons,and an attack with invisible photons.We give the upper bounds on the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states.展开更多
For the first time, a threshold quantum secure direct communication (TQSDC) scheme is presented. Similar to the classical Shamir's secret sharing scheme, the sender makes n shares, S1, …, Sn of secret key K and e...For the first time, a threshold quantum secure direct communication (TQSDC) scheme is presented. Similar to the classical Shamir's secret sharing scheme, the sender makes n shares, S1, …, Sn of secret key K and each receiver keeps a share secretly. If the sender wants to send a secret message M to the receivers, he en-codes the information of K and M on a single photon sequence and sends it to one of the receivers. According to the secret shares, the t receivers sequentially per-form the corresponding unitary operations on the single photon sequence and ob-tain the secret message M. The shared shares may be reusable if it can be judged that there is no eavesdropper in line. We discuss that our protocol is feasible with current technology.展开更多
In this review article,we will review the recent process of quantum communications.In the past decades,there are many developments in quantum communication,for instance,quantum key distribution,quantum teleportation,q...In this review article,we will review the recent process of quantum communications.In the past decades,there are many developments in quantum communication,for instance,quantum key distribution,quantum teleportation,quantum secure direct communication,deterministic secure quantum communication,quantum secret sharing and so on.And we focus our attention on the recent developments in quantum communication protocols.展开更多
A quantum secret sharing (QSS) protocol between multiparty and multiparty is proposed, based on Greenberger-Horne- Zeilinger (GHZ) state. The protocol utilizes quantum Fourier transform and entanglement swapping t...A quantum secret sharing (QSS) protocol between multiparty and multiparty is proposed, based on Greenberger-Horne- Zeilinger (GHZ) state. The protocol utilizes quantum Fourier transform and entanglement swapping to achieve a high intrinsic efficiency and source capacity. Then, the security of this protocol against some possible eavesdropping strategies has been analyzed. Furthermore, the presented protocol is generalized to the d-level case.展开更多
We propose a class of Quantum Secret Sharing (QSS) scheme based onmulti-particle entanglement. The eavesdropping analysis shows that the scheme is secure. Itsefficiency is 100% in principle. That is, one multi-particl...We propose a class of Quantum Secret Sharing (QSS) scheme based onmulti-particle entanglement. The eavesdropping analysis shows that the scheme is secure. Itsefficiency is 100% in principle. That is, one multi-particle entanglement can be used to share a bitof classical key among the parties. As a result, it is resource saving. The protocol can also beadjusted to split a classical secret message directly. The implementation of it is relativelyapplicable.展开更多
基金supported by the National Natural Science Foundation of China (GrantNos. 10775076 and 60635040)the National Basic Research Program of China (Grant No. 2006CB921106)the SRFPD Program of Education Ministry of China
文摘A detailed analysis has showed that the quantum secret sharing protocol based on the Grover algorithm (Phys Rev A, 2003, 68: 022306) is insecure. A dishonest receiver may obtain the full information without being detected. A quantum secret-sharing protocol is presents here, which mends the security loophole of the original secret-sharing protocol, and doubles the information capacity.
基金Supported by the National Natural Science Foundation of China (Grant No. 10671054)the Key Project of Science and Technology Research of Education Ministry of China (Grant No. 207011)the Natural Science Foundation of Hebei Province, China (Grant Nos. A2005000140 and 07M006)
文摘A protocol of quantum secret sharing between multiparty and multiparty with four states was presented. It was shown that this protocol can nullify the Trojan horse attack with a multi-photon signal, the fake-signal attack with Einstein-Podolsky- Rosen pairs, the attack with single photons, and the attack with invisible photons. In addition, the upper bounds of the average success probabilities were given for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states.
基金supported by the Major Research Plan of the National Natural Science Foundation of China (Grant No. 90818005)the National Natural Science Foundation of China (Grant Nos. 60903217, 60773032and 60773114)the Ph.D. Program Foundation of Ministry of Education of China (Grant No. 20060358014)
文摘We present a quantum secret sharing scheme between multiparty (m members in Group 1) and multiparty (n members in Group 2), and analyze its security. This scheme takes EPR pairs in Bell states as quantum resources. In order to obtain the shared key, all members only need to perform Bell measurements, rather than perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is not necessary except for the eavesdropping checks.
基金Supported by the National Natural Science Foundation of China (Grant No. 10671054)the Key Project of Science and Technology Research of Education Ministry of China (Grant No. 207011)the Natural Science Foundation of Hebei Province, China (Grant Nos. 07M006 and F2009000311)
文摘A quantum secret sharing scheme between an m-party group and an n-party group is proposed using three conjugate bases.A sequence of single photons,each of which is prepared in one of the six states,is used directly to encode classical information in the quantum secret sharing process.In this scheme,each of all m members in group 1 chooses randomly his/her own secret key individually and independently,and directly encodes his/her respective secret information on the states of single photons via unitary operations,then the last one sends 1/n of the resulting qubits to each member of group 2.By measuring their respective qubits,all members in group 2 share the secret information shared by all members in group 1.It renders impossible a Trojan horse attack with a multi-photon signal,a fake-signal attack with EPR pairs,an attack with single photons,and an attack with invisible photons.We give the upper bounds on the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states.
基金the National Basic Research Program of China (973 Program) (Grant No. 2007CB311100)the National High Technology Research and Development Program of China (Grant Nos. 2006AA01Z419 and 20060101Z4015)+6 种基金the Major Research Plan of the National Natural Science Foundation of China (Grant No. 90604023)the 2008 Scientific Research Common Program of Beijing Municipal Commission of Educationthe Scientific Research Foundation for the Youth of Beijing University of Technology (Grant No. 97007016200701)the National Research Foundation for the Doctoral Program of Higher Education of China (Grant No. 20040013007)the National Laboratory for Modern Communications Science Foundation of China (Grants No. 9140C1101010601)the Doctor Scientific Research Activation Foundation of Beijing University of Technology (No. 52007016200702)the Open Foundation of State Key Laboratory of Information Security (Graduate School of the Chinese Academy of Sciences)
文摘For the first time, a threshold quantum secure direct communication (TQSDC) scheme is presented. Similar to the classical Shamir's secret sharing scheme, the sender makes n shares, S1, …, Sn of secret key K and each receiver keeps a share secretly. If the sender wants to send a secret message M to the receivers, he en-codes the information of K and M on a single photon sequence and sends it to one of the receivers. According to the secret shares, the t receivers sequentially per-form the corresponding unitary operations on the single photon sequence and ob-tain the secret message M. The shared shares may be reusable if it can be judged that there is no eavesdropper in line. We discuss that our protocol is feasible with current technology.
基金supported by the National Basic Research Program of China (2010CB923202)Specialized Research Fund for the Doctoral Program of Education Ministry of China(20090005120008)Fundamental Research Funds for the Central Universities and National Natural Science Foundation of China(61205117)
文摘In this review article,we will review the recent process of quantum communications.In the past decades,there are many developments in quantum communication,for instance,quantum key distribution,quantum teleportation,quantum secure direct communication,deterministic secure quantum communication,quantum secret sharing and so on.And we focus our attention on the recent developments in quantum communication protocols.
基金the Hi-Tech Research and Development Program of China (2006AA01Z419)the National Natural Science Foundation of China (90604023, 60873191, 60821001)+2 种基金the National Laboratory for Modern Communications Science Foundation of China (9140C1101010601)the Natural Science Foundation of Beijing (4072020)the Foundation of Fujian Education Bureau (JA08044)
文摘A quantum secret sharing (QSS) protocol between multiparty and multiparty is proposed, based on Greenberger-Horne- Zeilinger (GHZ) state. The protocol utilizes quantum Fourier transform and entanglement swapping to achieve a high intrinsic efficiency and source capacity. Then, the security of this protocol against some possible eavesdropping strategies has been analyzed. Furthermore, the presented protocol is generalized to the d-level case.
基金This work is supported by the National Natural Science Foundation of China (No.60373059) the National Laboratory for Modern Communications Science Foundationof China (No. 51436020103DZ4001) National Research Foundation for the Doctoral Program of Hig
文摘We propose a class of Quantum Secret Sharing (QSS) scheme based onmulti-particle entanglement. The eavesdropping analysis shows that the scheme is secure. Itsefficiency is 100% in principle. That is, one multi-particle entanglement can be used to share a bitof classical key among the parties. As a result, it is resource saving. The protocol can also beadjusted to split a classical secret message directly. The implementation of it is relativelyapplicable.