Skip to main content
Log in

Quantum strongly secure ramp secret sharing

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced. This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can no longer be leaked.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Blakley, G.R., Meadows, C.: Security of ramp schemes. In: Advances in Cryptology-CRYPTO’84. Lecture Notes in Computer Science, vol. 196, pp. 242–269. Springer (1985). doi:10.1007/3-540-39568-7_20

  2. Capocelli, R.M., De Santis, A., Gargano, L., Vaccaro, U.: On the size of shares for secret sharing schemes. J. Cryptol. 6(3), 157–167 (1993). doi:10.1007/BF00198463

    Article  MATH  Google Scholar 

  3. Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648–651 (1999). doi:10.1103/PhysRevLett.83.648

    Article  ADS  Google Scholar 

  4. Gottesman, D.: Theory of quantum secret sharing. Phys. Rev. A 61(4), 042311 (2000). doi:10.1103/PhysRevA.61.042311

  5. Iwamoto, M., Yamamoto, H.: Strongly secure ramp secret sharing schemes for general access structures. Inf. Process. Lett. 97(2), 52–57 (2006). doi:10.1016/j.ipl.2005.09.012

    Article  MATH  MathSciNet  Google Scholar 

  6. McEliece, R.J., Sarwate, D.V.: On sharing secrets and Reed–Solomon codes. Commun. ACM 24(9), 583–584 (1981). doi:10.1145/358746.358762

    Article  MathSciNet  Google Scholar 

  7. Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge, UK (2000)

    MATH  Google Scholar 

  8. Nishiara, M., Takizawa, K.: Strongly secure secret sharing scheme with ramp threshold based on Shamir’s polynomial interpolation scheme. Trans. IEICE J92-A(12), 1009–1013 (2009). http://ci.nii.ac.jp/naid/110007483234/en

  9. Ogata, W., Kurosawa, K., Tsujii, S.: Nonperfect secret sharing schemes. In: Advances in Cryptology—AUSCRYPT ’92. Lecture Notes in Computer Science, vol. 718, pp. 56–66. Springer (1993). doi:10.1007/3-540-57220-1_52

  10. Ogawa, T., Sasaki, A., Iwamoto, M., Yamamoto, H.: Quantum secret sharing schemes and reversibility of quantum operations. Phys. Rev. A 72(3), 032318 (2005). doi:10.1103/PhysRevA.72.032318

  11. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  12. Smith, A.D.: Quantum secret sharing for general access structures (2000). URL arXiv:quant-ph/0001087

  13. Stinson, D.R.: Cryptography Theory and Practice, 3rd edn. Chapman & Hall, London (2006)

    MATH  Google Scholar 

  14. Yamamoto, H.: Secret sharing system using \((k, l, n)\) threshold scheme. Electron. Commun. Jpn. I Commun. 69(9), 46–54 (1986). doi: 10.1002/ecja.4410690906. (the original Japanese version published in 1985)

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the reviewers for their careful reading that improved the presentation. This research was conducted as part of Tokyo Institute of Technology International Research Opportunities Program under Re-Inventing Japan Project funded by Ministry of Education, Culture, Sports, Science and Technology. This research is partly supported by the National Institute of Information and Communications Technology, Japan, and by the Japan Society for the Promotion of Science Grant Nos. 23246071 and 26289116, and the Villum Foundation through their VELUX Visiting Professor Programme 2013–2014.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ryutaroh Matsumoto.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, P., Matsumoto, R. Quantum strongly secure ramp secret sharing. Quantum Inf Process 14, 715–729 (2015). https://doi.org/10.1007/s11128-014-0863-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-014-0863-2

Keywords

Mathematics Subject Classification

Navigation