Abstract
Based on Lagrange interpolation formula and the post-verification mechanism, we show how to construct a verifiable quantum (k,n) threshold secret key sharing scheme. Compared with the previous secret sharing protocols, ours has the merits: (i) it can resist the fraud of the dealer who generates and distributes fake shares among the participants during the secret distribution phase; Most importantly, (ii) It can check the cheating of the dishonest participant who provides a false share during the secret reconstruction phase such that the authorized group cannot recover the correct secret.
Similar content being viewed by others
References
Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of National Computer Conference, pp. 313–317. AFIPS, New York (1979)
Asmuth, C., Blakley, G.: Pooling, Splitting and reconstituting information to overcome total failure of some channels of communication. In: Proceedings of the 1982 Symposium on Security and Privacy, pp. 156–169. IEEE Press, New York (1982)
Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29, 208–210 (1983)
Knarnin, E., Greene, J., Hellman, M.: On secret sharing systems. IEEE Trans. Inf. Theory 29, 35–41 (1983)
Benaloh, J., Leichter, J.: Advances generalized sharing and monotone functions. Lect. Notes Comput. Sci. 403, 27–35 (1989)
Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: Proceedings of 26th IEEE Symposium on Foundations of computer science, pp. 383–395 (1985)
Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of 28th IEEE Symposium on Foundations of Computer Science, pp. 427–437 (1987)
Pedersen, T.: Non-interactive and information-theoretic secure verifiable secret sharing. In: CRYPTO’91, pp. 129–139 (1991)
Lin, Y., Wu, T.: (t)(n) Threshold verifiable multi secret sharing scheme based on factorization intractability and discrete logarithm modulo a composite problems. IEE Proc., Comput. Digit. Tech. 146(5), 264–268 (1999)
Stadler, M.: Publicly verifiable secret sharing. In: EUROCRYPT96, pp. 190–199. Springer, Berlin (1996)
Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the 35th Annual Symposium of Foundation of Computer Science (1994)
Nielsen, M., Chuang, I.: Quantum Computation and Quantum Information, pp. 28–43. Cambridge University Press, Cambridge (2000) ()
Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829–1834 (1999)
Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162–168 (1999)
Li, Y.M., Zhang, K.S., Peng, K.C.: Multiparty secret sharing of quantum information based on entanglement swapping. Phys. Lett. A 324, 420 (2004)
Gottesman, D.: Theory of quantum secret sharing. Phys. Rev. A 61, 042311 (2000)
Yang, Y.G., Cao, W.F., Wen, Q.Y.: Three-party quantum secret sharing of secure direct communication based on x-type entangled states. Chin. Phys. B 19, 050306 (2010)
Chau, H.F.: Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate. Phys. Rev. A 66, 060302 (2002)
Yang, Y.G., Wen, Q.Y.: Threshold quantum secret sharing between multi-party and multi-party. Sci. Chin. Ser. G, Phys. Mech. Astron. 51, 1308–1315 (2008)
Guo, G.P., Guo, G.C.: Quantum secret sharing without entanglement. Phys. Lett. A 310, 247–251 (2003)
Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004)
Yang, Y.G., Wen, Q.Y.: Circular threshold quantum secret sharing. Chin. Phys. B 17, 419–423 (2008)
Deng, F.G., Li, X.H., et al.: Multiparty quantum secret splitting and quantum state sharing. Phys. Lett. A 354, 190 (2006)
Cleve, R., Gottesman, D., Lo, H.-K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648–651 (1999)
Bandyopadhyay, S.: Teleportation and secret sharing with pure entangled states. Phys. Rev. A 62, 012308 (2000)
Hsu, L.Y.: Quantum secret-sharing protocol based on Grover’s algorithm. Phys. Rev. A 68, 022306 (2003)
Lance, A.M., Symul, T., Bowen, W.P., Sanders, B.C., Lam, P.K.: Tripartite quantum state sharing. Phys. Rev. Lett. 92, 177903 (2004)
Zhang, Y.Q., Jin, X.R., Zhang, S.: Secret sharing of quantum information via entanglement swapping in cavity QED. Phys. Lett. A 341, 380 (2005)
Zhang, Z.J., Yang, J., Man, Z.X., Li, Y.: Multiparty secret sharing of quantum information using and identifying Bell states. Eur. Phys. J. D 33, 133 (2005)
Yang, Y.G., Wen, Q.Y.: Threshold multiparty quantum-information splitting via quantum channel encryption. Int. J. Quantum Inf. 7, 1249 (2009)
Zhang, Z.J., Li, Y., Man, Z.X.: Multiparty quantum secret sharing. Phys. Rev. A 71, 044301 (2005)
Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)
Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302(2005)] Phys. Rev. A 73, 049901 (2005)
Zhang, Z.J., Man, Z.X.: Multiparty quantum secret sharing of classical messages based on entanglement swapping. Phys. Rev. A 72, 022303 (2005)
Zhang, Z.J., Liu, Y.M., Fang, M., Wang, D.: Multiparty quantum secret sharing scheme of classical messages by swapping qudit-state entanglement. Int. J. Mod. Phys. C 18, 2007 (1885) ()
Deng, F.G., Zhou, H.Y., Long, G.L.: Bidirectional quantum secret sharing and secret splitting with polarized single photons. Phys. Lett. A 337, 329–334 (2005)
Li, Q., Long, D.Y., Chan, W.H., Qiu, D.W.: Sharing a quantum secret without a trusted party. Quantum Inf Process (Online)
Aigner, M., Ziegler, G.M.: Proofs from the Book, pp. 7–10. Springer, Berlin (2006)
Cai, Q.Y., Li, B.W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601–603 (2004)
Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, YG., Teng, YW., Chai, HP. et al. Verifiable Quantum (k,n)-threshold Secret Key Sharing. Int J Theor Phys 50, 792–798 (2011). https://doi.org/10.1007/s10773-010-0616-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-010-0616-7