Advertisement

Quantum Information Processing

, Volume 13, Issue 1, pp 33–42 | Cite as

One-insider attack of quantum secret sharing protocol with collective eavesdropping-check

  • Jian-Hong Shi
  • Sheng-Li Zhang
  • Hai-Long Zhang
  • Zheng-Gang Chang
Article

Abstract

Recently, a kind of quantum secret sharing protocol with collective eavesdropping check was proposed by Lin et al. In this paper, we present a one-insider attack against Lin’s three-party protocol. With the method of intercept-resending and entanglement-swapping, we show that the insider participant who performs the last local operation on the qubit sent by the secret sender could illegally extract the secret messages without being detected. This greatly improves the two-insider-collaborating attacks proposed by Gao and Liu, respectively. Furthermore, such an attacking method also applies in the \(n\)-party version of such a secret sharing protocol. Our attack method once more shows the power of intercept-resend attack and poses the importance of information authentication in quantum and classic communications.

Keywords

Quantum cryptography Quantum secret sharing  Collective eavesdropping-check Insider attack 

Notes

Acknowledgments

This work was supported by the Natural Science Foundation of China (NSFC) under Grant Nos. U1304613 and 11204379.

References

  1. 1.
    Hillery, M., Buzk, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829–1834 (1999)MathSciNetCrossRefADSGoogle Scholar
  2. 2.
    Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648–651 (1999)CrossRefADSGoogle Scholar
  3. 3.
    Gottesman, D.: Theory of quantum secret sharing. Phys. Rev. A 61(4), 042311 (2000)MathSciNetCrossRefADSGoogle Scholar
  4. 4.
    Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59(1), 162–168 (1999)CrossRefADSGoogle Scholar
  5. 5.
    Deng, F.G., Li, X.H., Li, C.Y., Zhou, P., Zhou, H.Y.: Multiparty quantum secret splitting and quantum state sharing. Phys. Lett. A 354(3), 190–195 (2006)MathSciNetCrossRefADSzbMATHGoogle Scholar
  6. 6.
    Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307 (2004)CrossRefADSGoogle Scholar
  7. 7.
    Shi, R.H., Huang, L.S., Yang, W., Zhong, H.: Multiparty quantum secret sharing with Bell states and Bell measurements. Opt. Commun. 283(11), 2476–2480 (2010)CrossRefADSGoogle Scholar
  8. 8.
    Chen, X.B., Niu, X.X., Zhou, X.J., Yang, Y.X.: Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Process. 12, 365–380 (2013)MathSciNetCrossRefADSzbMATHGoogle Scholar
  9. 9.
    Dehkordi, M.H., Fattahi, E.: Threshold quantum secret sharing between multiparty and multiparty using Greenberger–Horne–Zeilinger state. Quantum Inf. Process. 12, 1299–1306 (2013)CrossRefADSzbMATHGoogle Scholar
  10. 10.
    Guo, Y., Zhao, Y.Q.: High-efficient quantum secret sharing based on the Chinese remainder theorem via the orbital angular momentum entanglement analysis. Quantum Inf. Process. 12, 1125–1139 (2013)MathSciNetCrossRefADSzbMATHGoogle Scholar
  11. 11.
    Hsu, J.L., Chong, S.K., Hwang, T.: Dynamic quantum secret sharing. Quantum Inf. Process. 12, 331–344 (2013)MathSciNetCrossRefADSzbMATHGoogle Scholar
  12. 12.
    Lin, J., Hwang, T.: New circular quantum secret sharing for remote agents. Quantum Inf. Process. 12, 685–697 (2013)MathSciNetCrossRefADSzbMATHGoogle Scholar
  13. 13.
    Shi, R.H., Zhong, H.: Multiparty quantum secret sharing with the pure entangled two-photon states. Quantum Inf. Process. doi: 10.1007/s11128-011-0239-9 (2012)
  14. 14.
    Guo, G.P., Guo, G.C.: Quantum secret sharing without entanglement. Phys. Lett. A 310(4), 247–251 (2003)MathSciNetCrossRefADSzbMATHGoogle Scholar
  15. 15.
    Zhang, Z.J., Li, Y., Man, X.Z.: Multiparty quantum secret sharing. Phys. Rev. A 71(4), 044301 (2005)MathSciNetCrossRefADSzbMATHGoogle Scholar
  16. 16.
    Markham, D., Sanders, B.C.: Graph states for quantum secret sharing. Phys. Rev. A 78(4), 042309 (2008)MathSciNetCrossRefADSzbMATHGoogle Scholar
  17. 17.
    Keet, A., Forescue, B., Markham, D., Sanders, B.C.: Quantum secret sharing with qudit graph states. Phys. Rev. A 82(6), 062315 (2010)CrossRefADSGoogle Scholar
  18. 18.
    Sarvepalli, P.: Nonthreshold quantum secret-sharing schemes in the graph-state formalism. Phys. Rev. A 86(4), 042303 (2012)CrossRefADSGoogle Scholar
  19. 19.
    Schmid, C., Trojek, P., Bourennane, M., Kurtsiefer, C., Zukowski, M., Weinfurter, H.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95(23), 230505 (2005)CrossRefADSGoogle Scholar
  20. 20.
    Chen, Y., Zhang, A.N., Zhao, Z., Zhou, X.Q., Lu, C.Y., Peng, C.Z., Yang, T., Pan, J.W.: Experimental quantum secret sharing and third-man quantum cryptography. Phys. Rev. Lett. 95(20), 200502 (2005)CrossRefADSGoogle Scholar
  21. 21.
    Gaertner, S., Kurtsiefer, C., Bourennane, M., Weinfurter, H.: Experimental demonstration of four-party quantum secret sharing. Phys. Rev. Lett. 98(2), 020503 (2007)CrossRefADSGoogle Scholar
  22. 22.
    Bogdanski, J., Rafiei, N., Bourennane, M.: Experimental quantum secret sharing using telecommunication fiber. Phys. Rev. A 78(6), 062307 (2008)CrossRefADSGoogle Scholar
  23. 23.
    Bogdanski, J., Ahrens, J., Bourennane, M.: Sagnac secret sharing over telecom fiber networks. Opt. Express 17(2), 1055–1063 (2009)CrossRefADSGoogle Scholar
  24. 24.
    Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)CrossRefADSzbMATHGoogle Scholar
  25. 25.
    Deng, F.G., Li, X.H., Zhou, H.Y.: Efficient high-capacity quantum secret sharing with two-photon entanglement. Phys. Lett. A 372(12), 1957–1962 (2008)MathSciNetCrossRefADSzbMATHGoogle Scholar
  26. 26.
    Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357(2), 101–103 (2006)CrossRefADSzbMATHGoogle Scholar
  27. 27.
    Gao, G.: Reexamining the security of the improved quantum secret sharing scheme. Opt. Commun. 282(11), 4464–4466 (2009)CrossRefADSGoogle Scholar
  28. 28.
    Wang, T.Y., Wen, Q.Y., Chen, X.B., Guo, F.Z., Zhu, F.C.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281(24), 6130–6134 (2008)CrossRefADSGoogle Scholar
  29. 29.
    Yang, C.W., Tsai, C.W., Hwang, T.: Thwarting intercept-and-resend attack on Zhangs quantum secret sharing using collective rotation noises. Quantum Inf. Process. doi: 10.1007/s11128-011-0236-z (2012)
  30. 30.
    Lin, S., Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on multiparty quantum secret sharing of classical messages based on entanglement swapping. Phys. Rev. A 76(3), 036301 (2007)MathSciNetCrossRefADSGoogle Scholar
  31. 31.
    He, G.P.: Comment on experimental single qubit quantum secret sharing. Phys. Rev. Lett. 98(2), 028901 (2007)CrossRefADSGoogle Scholar
  32. 32.
    Zhu, Z.C., Hu, A.Q., Fu, A.M.: Cryptanalysis of a new circular quantum secret sharing protocol for remote agents. Quantum Inf. Process. 12, 1173–1183 (2013)MathSciNetCrossRefADSzbMATHGoogle Scholar
  33. 33.
    Wang, M.M., Chen, X.B., Yang, Y.X.: Comment on High-dimensional deterministic multiparty quantum secret sharing without unitary operations. Quantum Inf. Process. 12, 785–792 (2013)MathSciNetCrossRefADSzbMATHGoogle Scholar
  34. 34.
    Wang, T.Y., Li, Y.P.: Cryptanalysis of dynamic quantum secret sharing. Quantum Inf. Process. doi: 10.1007/s11128-012-0508-2 (2013)
  35. 35.
    Lin, S., Wen, Q.Y., Qin, S.J., Zhu, F.C.: Multiparty quantum secret sharing with collective eavesdropping-check. Opt. Commun. 282(22), 4455–4459 (2009)CrossRefADSGoogle Scholar
  36. 36.
    Gao, G.: Cryptanalysis of multiparty quantum secret sharing with collective eavesdropping-check. Opt. Commun. 283(14), 2997–3000 (2010)CrossRefADSGoogle Scholar
  37. 37.
    Gao, G.: Secure multiparty quantum secret sharing with the collective eavesdropping-check character. Quantum Inf. Process. 12, 55–68 (2013)MathSciNetCrossRefADSzbMATHGoogle Scholar
  38. 38.
    Liu, B., Gao, F., Wen, Q.Y.: Eavesdropping and improvement to multiparty quantum secret sharing with collective eavesdropping-check. Int. J. Theor. Phys. 51, 1211–1223 (2012)CrossRefzbMATHGoogle Scholar
  39. 39.
    Menezes, J., van Oorschot, C., Vanstone, A.: Handbook of Applied Cryptography. CRC Press, Boca Raton, FL (2001)Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Jian-Hong Shi
    • 1
  • Sheng-Li Zhang
    • 1
  • Hai-Long Zhang
    • 1
  • Zheng-Gang Chang
    • 1
  1. 1.Zhengzhou Information Science and Technology InstituteZhengzhouChina

Personalised recommendations