This paper reconsiders carefully the possibility of using the Smolin bound entangled states as the carrier for sharing quantum secret. It finds that the process of quantum secret sharing based on Smolin states has ins...This paper reconsiders carefully the possibility of using the Smolin bound entangled states as the carrier for sharing quantum secret. It finds that the process of quantum secret sharing based on Smolin states has insecurity though the Smolin state was reported to violate maximally the two-setting Bell-inequlity. The general proof is given.展开更多
Based on x-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on x-type entangled stat...Based on x-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on x-type entangled states |X00〉3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed.展开更多
In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is...In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice's secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement.展开更多
We propose a new multiparty quantum secret sharing protocol via introducing auxiliary particles using a non-maximally entangled (pure) two-particle state without a Bell measurement. The communication parties utilize...We propose a new multiparty quantum secret sharing protocol via introducing auxiliary particles using a non-maximally entangled (pure) two-particle state without a Bell measurement. The communication parties utilize decoy particles tO check eavesdropping. After ensuring the security of the quantum channel, the sender encodes the secret message and transmits it to the receiver by using controlled-NOT operation and von Neumann measurement. If and only if all the agents agree to collaborate, they can read out the secret message.展开更多
This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 ...This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time.展开更多
The security of quantum secret sharing based on entanglement swapping is revisited and a participant attack is presented. In this attack two dishonest agents together can illegally recover the secret quantum state wit...The security of quantum secret sharing based on entanglement swapping is revisited and a participant attack is presented. In this attack two dishonest agents together can illegally recover the secret quantum state without the help of any other controller, and it will not be detected by any other users. Furthermore, by modifying the distribution process of particles and adding a detection step after each distribution process, we propose an improved protocol which can resist this kind of attack.展开更多
We discuss the security of the kind of multiparty quantum secret sharing protocols encrypting in series. It is secure against the eavesdroppers outside. However it is weak to withstand the attack of insider with a fak...We discuss the security of the kind of multiparty quantum secret sharing protocols encrypting in series. It is secure against the eavesdroppers outside. However it is weak to withstand the attack of insider with a fake signal and cheating. An idiographic attack strategy is given based on the protocol. Furthermore, we conclude the key leak of the protocols and present a possible way to prevent the dishonest agents from stealing the secret.展开更多
We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our ...We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our scheme simple and safe.The operations which are needed to recover secret message,are only exclusive-or addition and complement operation.Moreover it is shown that this scheme is secure against eavesdropping.Also this scheme provides the best quantum bit efficiency compared with some famous quantum secret sharing schemes.展开更多
We investigate schemes for quantum secret sharing and quantum dense coding via tripartite entangled states. We present a scheme for sharing classical information via entanglement swapping using two tripartite entangle...We investigate schemes for quantum secret sharing and quantum dense coding via tripartite entangled states. We present a scheme for sharing classical information via entanglement swapping using two tripartite entangled GHZ states. In order to throw light upon the security affairs of the quantum dense coding protocol, we also suggest a secure quantum dense coding scheme via W state by analogy with the theory of sharing information among involved users.展开更多
Very recently,Lee et al.proposed a secure quantum teleportation protocol to transfer shared quantum secret between multiple parties in a network[Phys.Rev.Lett.124060501(2020)].This quantum network is encoded with a ma...Very recently,Lee et al.proposed a secure quantum teleportation protocol to transfer shared quantum secret between multiple parties in a network[Phys.Rev.Lett.124060501(2020)].This quantum network is encoded with a maximally entangled GHZ state.In this paper,we consider a partially entangled GHZ state as the entanglement channel,where it can achieve,probabilistically,unity fidelity transfer of the state.Two kinds of strategies are given.One arises when an auxiliary particle is introduced and a general evolution at any receiver's location is then adopted.The other one involves performing a single generalized Bell-state measurement at the location of any sender.This could allow the receivers to recover the transmitted state with a certain probability,in which only the local Pauli operators are performed,instead of introducing an auxiliary particle.In addition,the successful probability is provided,which is determined by the degree of entanglement of the partially multipartite entangled state.Moreover,the proposed protocol is robust against the bit and phase flip noise.展开更多
基金Project supported by the National Natural Science Foundation of China (Grant Nos 10404007 and 60578055)the State Key Program for Basic Research of China (Grant No 2007CB925204)
文摘This paper reconsiders carefully the possibility of using the Smolin bound entangled states as the carrier for sharing quantum secret. It finds that the process of quantum secret sharing based on Smolin states has insecurity though the Smolin state was reported to violate maximally the two-setting Bell-inequlity. The general proof is given.
基金Project supported by the National High-Tech Research and Development Program of China (Grant Nos. 2006AA01Z440,2009AA012441 and 2009AA012437)National Basic Research Program of China (Grant No. 2007CB311100)+4 种基金the National Natural Science Foundation of China (Grant Nos. 60873191 and 60821001)the Scientific Research Common Program of Beijing Municipal Commission of Education (Grant No. KM200810005004)Beijing Natural Science Foundation (Grant Nos. 1093015 and 1102004)the ISN Open FoundationSpecialized Research Fund for the Doctoral Programm of Higher Education (Grant No. 20091103120014)
文摘Based on x-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on x-type entangled states |X00〉3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed.
基金Project supported by the National Natural Science Foundation of China(Grant No.60970140)
文摘In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice's secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement.
基金National Natural Science Foundation of China under Grant No.10575017
文摘We propose a new multiparty quantum secret sharing protocol via introducing auxiliary particles using a non-maximally entangled (pure) two-particle state without a Bell measurement. The communication parties utilize decoy particles tO check eavesdropping. After ensuring the security of the quantum channel, the sender encodes the secret message and transmits it to the receiver by using controlled-NOT operation and von Neumann measurement. If and only if all the agents agree to collaborate, they can read out the secret message.
基金supported by the Key Program of the National Natural Science Foundation of China (Grant No. 90718007)the National Natural Science Foundation of China (Grant Nos. 60773135 and 60970140)
文摘This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time.
基金Project supported by the National High Technology Research and Development Program of China (Grant No 2006AA01Z419)the Major Research Plan of the National Natural Science Foundation of China (Grant Nos 90604023, 60873191 and 60821001)+2 种基金the National Laboratory for Modern Communications Science Foundation of China (Grant No 9140C1101010601)the Natural Science Foundation of Beijing, China (Grant No 4072020)the Integrated Service Network Open Foundation
文摘The security of quantum secret sharing based on entanglement swapping is revisited and a participant attack is presented. In this attack two dishonest agents together can illegally recover the secret quantum state without the help of any other controller, and it will not be detected by any other users. Furthermore, by modifying the distribution process of particles and adding a detection step after each distribution process, we propose an improved protocol which can resist this kind of attack.
基金Supported by the Major Research Plan of the Na-tional Natural Science Foundation of China (90604023) the NationalNatural Science Foundation of China (60373059) +2 种基金the National Re-search Foundation for the Doctoral Program of Higher Education ofChina (20040013007) the National Laboratory for Modern Commu-nications Science Foundation of China (9140C1101010601)the Graduate Students Innovation Foundation and the Integrated ServiceNetworks Open Foundation
文摘We discuss the security of the kind of multiparty quantum secret sharing protocols encrypting in series. It is secure against the eavesdroppers outside. However it is weak to withstand the attack of insider with a fake signal and cheating. An idiographic attack strategy is given based on the protocol. Furthermore, we conclude the key leak of the protocols and present a possible way to prevent the dishonest agents from stealing the secret.
文摘We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our scheme simple and safe.The operations which are needed to recover secret message,are only exclusive-or addition and complement operation.Moreover it is shown that this scheme is secure against eavesdropping.Also this scheme provides the best quantum bit efficiency compared with some famous quantum secret sharing schemes.
基金Project supported by Anhui Provincial Natural Science Foundation, China (Grant No 03042401), the Key Program of the Education Department of Anhui Province, China (Grant Nos 2002kj029zd and 2006kj070A), and the Talent Foundation of Anhui University, China. 0ne of the authors, Xue Zheng-Yuan, is also supported by the Postgraduate Innovation Research Plan from Anhui university, China.
文摘We investigate schemes for quantum secret sharing and quantum dense coding via tripartite entangled states. We present a scheme for sharing classical information via entanglement swapping using two tripartite entangled GHZ states. In order to throw light upon the security affairs of the quantum dense coding protocol, we also suggest a secure quantum dense coding scheme via W state by analogy with the theory of sharing information among involved users.
基金Project supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province,China(Grant No.SKLACSS-202108)the Open Research Fund of Key Laboratory of Cryptography of Zhejiang Province,China(Grant No.ZCL21006)+3 种基金the National Natural Science Foundation of China(Grant Nos.U1636106,92046001,61671087,61962009,and 61170272)the BUPT Excellent Ph.D.Students Foundation(Grant No.CX2020310)Natural Science Foundation of Beijing Municipality,China(Grant No.4182006)the Fundamental Research Funds for the Central Universities,China(Grant No.2019XD-A02).
文摘Very recently,Lee et al.proposed a secure quantum teleportation protocol to transfer shared quantum secret between multiple parties in a network[Phys.Rev.Lett.124060501(2020)].This quantum network is encoded with a maximally entangled GHZ state.In this paper,we consider a partially entangled GHZ state as the entanglement channel,where it can achieve,probabilistically,unity fidelity transfer of the state.Two kinds of strategies are given.One arises when an auxiliary particle is introduced and a general evolution at any receiver's location is then adopted.The other one involves performing a single generalized Bell-state measurement at the location of any sender.This could allow the receivers to recover the transmitted state with a certain probability,in which only the local Pauli operators are performed,instead of introducing an auxiliary particle.In addition,the successful probability is provided,which is determined by the degree of entanglement of the partially multipartite entangled state.Moreover,the proposed protocol is robust against the bit and phase flip noise.