Advertisement

Quantum Information Processing

, Volume 14, Issue 11, pp 4237–4244 | Cite as

Proactive quantum secret sharing

  • Huawang Qin
  • Yuewei Dai
Article

Abstract

A proactive quantum secret sharing scheme is proposed, in which the participants can update their key shares periodically. In an updating period, one participant randomly generates the EPR pairs, and the other participants update their key shares and perform the corresponding unitary operations on the particles of the EPR pairs. Then, the participant who generated the EPR pairs performs the Bell-state measurement and updates his key share according to the result of the Bell-state measurement. After an updating period, each participant can change his key share, but the secret is changeless, and the old key shares will be useless even if they have been stolen by the attacker. The proactive property of our scheme is very useful to resist the mobile attacker.

Keywords

Quantum secret sharing Proactive Bell state Quantum cryptography 

References

  1. 1.
    Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)zbMATHMathSciNetCrossRefGoogle Scholar
  2. 2.
    Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A59, 1829–1834 (1999)MathSciNetCrossRefADSGoogle Scholar
  3. 3.
    Sarvepalli, P.K., Klappenecker, A.: Sharing classical secrets with Calderbank–Shor–Steane codes. Phys. Rev. A80, 022321 (2009)MathSciNetCrossRefADSGoogle Scholar
  4. 4.
    Sarvepalli, P.: Nonthreshold quantum secret-sharing schemes in the graph-state formalism. Phys. Rev. A86, 042303 (2012)CrossRefADSGoogle Scholar
  5. 5.
    Sun, Y., Xu, S.W., Chen, X.B., Niu, X.X., Yang, Y.X.: Expansible quantum secret sharing network. Quantum Inf. Process. 12, 2877–2888 (2013)zbMATHMathSciNetCrossRefADSGoogle Scholar
  6. 6.
    Tseng, H.Y., Tsai, C.W., Hwang, T., Li, C.M.: Quantum secret sharing based on quantum search algorithm. Int. J. Theor. Phys. 51, 3101–3108 (2012)zbMATHMathSciNetCrossRefGoogle Scholar
  7. 7.
    Shi, R.H., Lv, G.L., Wang, Y., Huang, D.Z., Guo, Y.: On quantum secret sharing via Chinese remainder theorem with the non-maximally entanglement state analysis. Int. J. Theor. Phys. 52, 539–548 (2013)zbMATHCrossRefGoogle Scholar
  8. 8.
    Li, Q., Long, D.Y., Chan, W.H., Qiu, D.W.: Sharing a quantum secret without a trusted party. Quantum Inf. Process. 10, 97–106 (2011)zbMATHMathSciNetCrossRefGoogle Scholar
  9. 9.
    Wang, H.B., Huang, Y.G., Fang, X., Gu, B., Fu, D.S.: High-capacity three-party quantum secret sharing with single photons in both the polarization and the spatial-mode degrees of freedom. Int. J. Theor. Phys. 52, 1043–1051 (2013)zbMATHMathSciNetCrossRefGoogle Scholar
  10. 10.
    Yang, Y.G., Teng, Y.W., Chai, H.P., Wen, Q.Y.: Verifiable quantum (k, n)-threshold secret key sharing. Int. J. Theor. Phys. 50, 792–798 (2011)zbMATHMathSciNetCrossRefGoogle Scholar
  11. 11.
    Yang, Y.G., Jia, X., Wang, H.Y., Zhang, H.: Verifiable quantum (k, n)-threshold secret sharing. Quantum Inf. Process. 11, 1619–1625 (2012)MathSciNetCrossRefADSGoogle Scholar
  12. 12.
    Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or how to cope with perpetual leakage. In: Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, pp. 339–352. Springer, London (1995)Google Scholar
  13. 13.
    Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, R.: Asynchronous verifiable secret sharing and proactive cryptosystems. In: Proceedings of the 9th (ACM) Conference on Computer and Communications Security, pp. 88–97. ACM Press, New York (2002)Google Scholar
  14. 14.
    Zhou, L., Schneider, F., Robbert, R.: APSS: proactive secret sharing in asynchronous systems. ACM Trans. Inf. Syst. Secur. 8, 259–286 (2005)CrossRefGoogle Scholar
  15. 15.
    Schultz, D.A.: Mobile proactive secret sharing. In: Proceedings of the 27th ACM Symposium on Principles of Distributed Computing, pp. 1–157. ACM Press, Toronto (2008)Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.School of AutomatizationNanjing University of Science and TechnologyNanjingChina

Personalised recommendations