Quantum Information Processing

, Volume 14, Issue 11, pp 4237–4244 | Cite as

Proactive quantum secret sharing



A proactive quantum secret sharing scheme is proposed, in which the participants can update their key shares periodically. In an updating period, one participant randomly generates the EPR pairs, and the other participants update their key shares and perform the corresponding unitary operations on the particles of the EPR pairs. Then, the participant who generated the EPR pairs performs the Bell-state measurement and updates his key share according to the result of the Bell-state measurement. After an updating period, each participant can change his key share, but the secret is changeless, and the old key shares will be useless even if they have been stolen by the attacker. The proactive property of our scheme is very useful to resist the mobile attacker.


Quantum secret sharing Proactive Bell state Quantum cryptography 


  1. 1.
    Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)MATHMathSciNetCrossRefGoogle Scholar
  2. 2.
    Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A59, 1829–1834 (1999)MathSciNetCrossRefADSGoogle Scholar
  3. 3.
    Sarvepalli, P.K., Klappenecker, A.: Sharing classical secrets with Calderbank–Shor–Steane codes. Phys. Rev. A80, 022321 (2009)MathSciNetCrossRefADSGoogle Scholar
  4. 4.
    Sarvepalli, P.: Nonthreshold quantum secret-sharing schemes in the graph-state formalism. Phys. Rev. A86, 042303 (2012)CrossRefADSGoogle Scholar
  5. 5.
    Sun, Y., Xu, S.W., Chen, X.B., Niu, X.X., Yang, Y.X.: Expansible quantum secret sharing network. Quantum Inf. Process. 12, 2877–2888 (2013)MATHMathSciNetCrossRefADSGoogle Scholar
  6. 6.
    Tseng, H.Y., Tsai, C.W., Hwang, T., Li, C.M.: Quantum secret sharing based on quantum search algorithm. Int. J. Theor. Phys. 51, 3101–3108 (2012)MATHMathSciNetCrossRefGoogle Scholar
  7. 7.
    Shi, R.H., Lv, G.L., Wang, Y., Huang, D.Z., Guo, Y.: On quantum secret sharing via Chinese remainder theorem with the non-maximally entanglement state analysis. Int. J. Theor. Phys. 52, 539–548 (2013)MATHCrossRefGoogle Scholar
  8. 8.
    Li, Q., Long, D.Y., Chan, W.H., Qiu, D.W.: Sharing a quantum secret without a trusted party. Quantum Inf. Process. 10, 97–106 (2011)MATHMathSciNetCrossRefGoogle Scholar
  9. 9.
    Wang, H.B., Huang, Y.G., Fang, X., Gu, B., Fu, D.S.: High-capacity three-party quantum secret sharing with single photons in both the polarization and the spatial-mode degrees of freedom. Int. J. Theor. Phys. 52, 1043–1051 (2013)MATHMathSciNetCrossRefGoogle Scholar
  10. 10.
    Yang, Y.G., Teng, Y.W., Chai, H.P., Wen, Q.Y.: Verifiable quantum (k, n)-threshold secret key sharing. Int. J. Theor. Phys. 50, 792–798 (2011)MATHMathSciNetCrossRefGoogle Scholar
  11. 11.
    Yang, Y.G., Jia, X., Wang, H.Y., Zhang, H.: Verifiable quantum (k, n)-threshold secret sharing. Quantum Inf. Process. 11, 1619–1625 (2012)MathSciNetCrossRefADSGoogle Scholar
  12. 12.
    Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or how to cope with perpetual leakage. In: Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, pp. 339–352. Springer, London (1995)Google Scholar
  13. 13.
    Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, R.: Asynchronous verifiable secret sharing and proactive cryptosystems. In: Proceedings of the 9th (ACM) Conference on Computer and Communications Security, pp. 88–97. ACM Press, New York (2002)Google Scholar
  14. 14.
    Zhou, L., Schneider, F., Robbert, R.: APSS: proactive secret sharing in asynchronous systems. ACM Trans. Inf. Syst. Secur. 8, 259–286 (2005)CrossRefGoogle Scholar
  15. 15.
    Schultz, D.A.: Mobile proactive secret sharing. In: Proceedings of the 27th ACM Symposium on Principles of Distributed Computing, pp. 1–157. ACM Press, Toronto (2008)Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.School of AutomatizationNanjing University of Science and TechnologyNanjingChina

Personalised recommendations