In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle,which it can realize a general access structure via the thought of concatenation. In addition, Our scheme in...In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle,which it can realize a general access structure via the thought of concatenation. In addition, Our scheme includes all advantages of Tavakoli's scheme [Phys. Rev. A 92 (2015) 030302(R)]. In contrast to Tavakoli's scheme, the efficiency of our scheme is 1 for the same situation, and the access structure is more general and has advantages in practical significance. Furthermore, we also analyze the security of our scheme in the primary quantum attacks.展开更多
This paper focuses on quantum information masking for the quantum state in two-dimensional Hilbert space.We present a system of equations as the condition of quantum information masking.It is shown that quantum inform...This paper focuses on quantum information masking for the quantum state in two-dimensional Hilbert space.We present a system of equations as the condition of quantum information masking.It is shown that quantum information contained in a single qubit state can be masked,if and only if the coefficients of the quantum state satisfy the given system of equations.By observing the characteristics of non-orthogonal maskable quantum states,we obtain a related conclusion,namely,if two non-orthogonal two-qubit quantum states can mask a single qubit state,they have the same number of terms and the same basis.Finally,for maskable orthogonal quantum states,we analyze two special examples and give their images for an intuitive description.展开更多
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
基金Sponsored by the National Natural Science Foundation of China under Grant Nos.61373150 and 61602291Industrial Research and Development Project of Science and Technology of Shaanxi Province under Grant No.2013k0611
文摘In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle,which it can realize a general access structure via the thought of concatenation. In addition, Our scheme includes all advantages of Tavakoli's scheme [Phys. Rev. A 92 (2015) 030302(R)]. In contrast to Tavakoli's scheme, the efficiency of our scheme is 1 for the same situation, and the access structure is more general and has advantages in practical significance. Furthermore, we also analyze the security of our scheme in the primary quantum attacks.
基金supported by the Natural Science Foundation of Hebei Province(Grant No.A2019210057)。
文摘This paper focuses on quantum information masking for the quantum state in two-dimensional Hilbert space.We present a system of equations as the condition of quantum information masking.It is shown that quantum information contained in a single qubit state can be masked,if and only if the coefficients of the quantum state satisfy the given system of equations.By observing the characteristics of non-orthogonal maskable quantum states,we obtain a related conclusion,namely,if two non-orthogonal two-qubit quantum states can mask a single qubit state,they have the same number of terms and the same basis.Finally,for maskable orthogonal quantum states,we analyze two special examples and give their images for an intuitive description.