摘要
In this paper,two new efficient multiparty quantum direct secret sharing schemes are proposed via a six-particle GHZ state and Bell measurements.In the first scheme,based on the theory of security cryptanalysis,the secret message of the sender is directly encoded into the transmitted particles,and all the agents can obtain their information by performing bell measurement on the received particles,and then cooperate to recover the information of the sender.In the second scheme,we define a new secret shared coding method by performing local unitary operations on the transmitted particles,then agents perform Bell measurements on their own particles respectively,and feedback the measurement to the dealer.If the agent’s results are matched with the previous coding method,the protocol will work out.In addition,the proposed two schemes have the following common advantages:the sender can send all prepared particles to the receiver,and can send an arbitrary key to the receiver,rather than a random secret key;the proposed schemes do not need to insert any detection sets to detect eavesdropping and can resist both existing attacks and spoofing attacks by dishonest agents.The sender need not to retain any photons,so the sender’s quantum memory could be omitted here.
In this paper, two new efficient multiparty quantum direct secret sharing schemes are proposed via a six-particle GHZ state and Bell measurements. In the first scheme, based on the theory of security cryptanalysis, the secret message of the sender is directly encoded into the transmitted particles, and all the agents can obtain their information by performing bell measurement on the received particles, and then cooperate to recover the information of the sender. In the second scheme, we define a new secret shared coding method by performing local unitary operations on the transmitted particles, then agents perform Bell measurements on their own particles respectively, and feedback the measurement to the dealer. If the agent’s results are matched with the previous coding method, the protocol will work out.In addition, the proposed two schemes have the following common advantages: the sender can send all prepared particles to the receiver, and can send an arbitrary key to the receiver, rather than a random secret key; the proposed schemes do not need to insert any detection sets to detect eavesdropping and can resist both existing attacks and spoofing attacks by dishonest agents. The sender need not to retain any photons, so the sender’s quantum memory could be omitted here.
基金
supported by the National Natural Science Foundation of China(Grant No.10902083).