Skip to main content
Log in

Verifiable Quantum (k,n)-threshold Secret Key Sharing

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Based on Lagrange interpolation formula and the post-verification mechanism, we show how to construct a verifiable quantum (k,n) threshold secret key sharing scheme. Compared with the previous secret sharing protocols, ours has the merits: (i) it can resist the fraud of the dealer who generates and distributes fake shares among the participants during the secret distribution phase; Most importantly, (ii) It can check the cheating of the dishonest participant who provides a false share during the secret reconstruction phase such that the authorized group cannot recover the correct secret.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  2. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of National Computer Conference, pp. 313–317. AFIPS, New York (1979)

    Google Scholar 

  3. Asmuth, C., Blakley, G.: Pooling, Splitting and reconstituting information to overcome total failure of some channels of communication. In: Proceedings of the 1982 Symposium on Security and Privacy, pp. 156–169. IEEE Press, New York (1982)

    Google Scholar 

  4. Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29, 208–210 (1983)

    Article  MathSciNet  Google Scholar 

  5. Knarnin, E., Greene, J., Hellman, M.: On secret sharing systems. IEEE Trans. Inf. Theory 29, 35–41 (1983)

    Article  Google Scholar 

  6. Benaloh, J., Leichter, J.: Advances generalized sharing and monotone functions. Lect. Notes Comput. Sci. 403, 27–35 (1989)

    Article  MathSciNet  Google Scholar 

  7. Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: Proceedings of 26th IEEE Symposium on Foundations of computer science, pp. 383–395 (1985)

    Google Scholar 

  8. Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of 28th IEEE Symposium on Foundations of Computer Science, pp. 427–437 (1987)

    Google Scholar 

  9. Pedersen, T.: Non-interactive and information-theoretic secure verifiable secret sharing. In: CRYPTO’91, pp. 129–139 (1991)

    Google Scholar 

  10. Lin, Y., Wu, T.: (t)(n) Threshold verifiable multi secret sharing scheme based on factorization intractability and discrete logarithm modulo a composite problems. IEE Proc., Comput. Digit. Tech. 146(5), 264–268 (1999)

    Article  Google Scholar 

  11. Stadler, M.: Publicly verifiable secret sharing. In: EUROCRYPT96, pp. 190–199. Springer, Berlin (1996)

    Google Scholar 

  12. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the 35th Annual Symposium of Foundation of Computer Science (1994)

    Google Scholar 

  13. Nielsen, M., Chuang, I.: Quantum Computation and Quantum Information, pp. 28–43. Cambridge University Press, Cambridge (2000) ()

    MATH  Google Scholar 

  14. Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829–1834 (1999)

    Article  MathSciNet  ADS  Google Scholar 

  15. Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162–168 (1999)

    Article  ADS  Google Scholar 

  16. Li, Y.M., Zhang, K.S., Peng, K.C.: Multiparty secret sharing of quantum information based on entanglement swapping. Phys. Lett. A 324, 420 (2004)

    Article  MATH  MathSciNet  ADS  Google Scholar 

  17. Gottesman, D.: Theory of quantum secret sharing. Phys. Rev. A 61, 042311 (2000)

    Article  MathSciNet  ADS  Google Scholar 

  18. Yang, Y.G., Cao, W.F., Wen, Q.Y.: Three-party quantum secret sharing of secure direct communication based on x-type entangled states. Chin. Phys. B 19, 050306 (2010)

    Article  ADS  Google Scholar 

  19. Chau, H.F.: Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate. Phys. Rev. A 66, 060302 (2002)

    Article  ADS  Google Scholar 

  20. Yang, Y.G., Wen, Q.Y.: Threshold quantum secret sharing between multi-party and multi-party. Sci. Chin. Ser. G, Phys. Mech. Astron. 51, 1308–1315 (2008)

    Article  MATH  ADS  Google Scholar 

  21. Guo, G.P., Guo, G.C.: Quantum secret sharing without entanglement. Phys. Lett. A 310, 247–251 (2003)

    Article  MATH  MathSciNet  ADS  Google Scholar 

  22. Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004)

    Article  ADS  Google Scholar 

  23. Yang, Y.G., Wen, Q.Y.: Circular threshold quantum secret sharing. Chin. Phys. B 17, 419–423 (2008)

    Article  ADS  Google Scholar 

  24. Deng, F.G., Li, X.H., et al.: Multiparty quantum secret splitting and quantum state sharing. Phys. Lett. A 354, 190 (2006)

    Article  MATH  MathSciNet  ADS  Google Scholar 

  25. Cleve, R., Gottesman, D., Lo, H.-K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648–651 (1999)

    Article  ADS  Google Scholar 

  26. Bandyopadhyay, S.: Teleportation and secret sharing with pure entangled states. Phys. Rev. A 62, 012308 (2000)

    Article  MathSciNet  ADS  Google Scholar 

  27. Hsu, L.Y.: Quantum secret-sharing protocol based on Grover’s algorithm. Phys. Rev. A 68, 022306 (2003)

    Article  ADS  Google Scholar 

  28. Lance, A.M., Symul, T., Bowen, W.P., Sanders, B.C., Lam, P.K.: Tripartite quantum state sharing. Phys. Rev. Lett. 92, 177903 (2004)

    Article  ADS  Google Scholar 

  29. Zhang, Y.Q., Jin, X.R., Zhang, S.: Secret sharing of quantum information via entanglement swapping in cavity QED. Phys. Lett. A 341, 380 (2005)

    Article  MATH  ADS  Google Scholar 

  30. Zhang, Z.J., Yang, J., Man, Z.X., Li, Y.: Multiparty secret sharing of quantum information using and identifying Bell states. Eur. Phys. J. D 33, 133 (2005)

    Article  ADS  Google Scholar 

  31. Yang, Y.G., Wen, Q.Y.: Threshold multiparty quantum-information splitting via quantum channel encryption. Int. J. Quantum Inf. 7, 1249 (2009)

    Article  MATH  Google Scholar 

  32. Zhang, Z.J., Li, Y., Man, Z.X.: Multiparty quantum secret sharing. Phys. Rev. A 71, 044301 (2005)

    Article  MathSciNet  ADS  Google Scholar 

  33. Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)

    Article  ADS  Google Scholar 

  34. Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302(2005)] Phys. Rev. A 73, 049901 (2005)

    Google Scholar 

  35. Zhang, Z.J., Man, Z.X.: Multiparty quantum secret sharing of classical messages based on entanglement swapping. Phys. Rev. A 72, 022303 (2005)

    Article  MathSciNet  ADS  Google Scholar 

  36. Zhang, Z.J., Liu, Y.M., Fang, M., Wang, D.: Multiparty quantum secret sharing scheme of classical messages by swapping qudit-state entanglement. Int. J. Mod. Phys. C 18, 2007 (1885) ()

    Google Scholar 

  37. Deng, F.G., Zhou, H.Y., Long, G.L.: Bidirectional quantum secret sharing and secret splitting with polarized single photons. Phys. Lett. A 337, 329–334 (2005)

    Article  MATH  ADS  Google Scholar 

  38. Li, Q., Long, D.Y., Chan, W.H., Qiu, D.W.: Sharing a quantum secret without a trusted party. Quantum Inf Process (Online)

  39. Aigner, M., Ziegler, G.M.: Proofs from the Book, pp. 7–10. Springer, Berlin (2006)

    MATH  Google Scholar 

  40. Cai, Q.Y., Li, B.W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601–603 (2004)

    Article  ADS  Google Scholar 

  41. Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)

    Article  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Guang Yang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yang, YG., Teng, YW., Chai, HP. et al. Verifiable Quantum (k,n)-threshold Secret Key Sharing. Int J Theor Phys 50, 792–798 (2011). https://doi.org/10.1007/s10773-010-0616-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-010-0616-7

Keywords

Navigation