Abstract
A novel quantum secret sharing (QSS) protocol is suggested by utilizing the evolution law of atom via cavity quantum electrodynamics (QED) in this paper. It employs two-atom product states rather than entangled states as the initial quantum resource, and adopts single-atom measurements rather than two-atom or multiple-atom joint measurements. It needs neither the unitary operations nor the quantum entanglement swapping. It can resist both the outside attack and the participant attack.
Similar content being viewed by others
References
Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing, pp. 175–179. Proc. IEEE Int. Conf. Computers, Systems and Signal Processing (1984)
Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A. 59, 1829–1834 (1999)
Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A. 59, 162–168 (1999)
Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A. 69, 052307 (2004)
Lin, J., Hwang, T.: An enhancement on Shi et al.’s multiparty quantum secret sharing protocol. Opt. Commun. 284(5), 1468–1471 (2011)
Chen, J.H., Lee, K.C., Hwang, T.: The enhancement of Zhou et al.’s quantum secret sharing protocol. Int. J. Mod. Phy. C. 20(10), 1531–1535 (1999)
Qin, H.W., Dai, Y.W.: Proactive quantum secret sharing. Quantum Inf. Process. 14, 4237–4244 (2015)
Qin, H.W., Tso, R.L.: Efficient quantum secret sharing based on special multi-dimensional GHZ state. Opt. Quant. Electron. 50, 167 (2018)
Kang, Y., Liao, Q., Geng, J., Guo, Y.: Continuous variable quantum secret sharing with Chinese remainder theorem. Int. J. Theor. Phys. 58, 3986–3997 (2019)
Liu, L.J., Li, Z.H., Han, Z.W., Zhi, D.L.: A quantum secret sharing scheme with verifiable function. Eur. Phys. J. D. 74, 154 (2020)
Lai, H., Pieprzyk, J., Luo, M.X., Zhan, C., Pan, L., Orgun, M.A.: High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels. Quantum Inf. Process. 19, 157 (2020)
Sutradhar, K., Om, H.: Efficient quantum secret sharing without a trusted player. Quantum Inf. Process. 19, 73 (2020)
Shu, J.: Quantum state preparation and quantum information processing in cavity QED, pp. 19–20. University of science and technology of China, Heifei (2007)
Zheng, S.B., Guo, G.C.: Efficient scheme for two-atom entanglement and quantum information processing in cavity QED. Phys. Rev. Lett. 85, 2392–2395 (2000)
Zheng, S.B.: Generation of entangled states for many multilevel atoms in a thermal cavity and ions in thermal motion. Phys. Rev. A. 68, 035801 (2003)
Shan, C.J., Liu, J.B., Chen, T., Liu, T.K., Huang, Y.X., Li, H.: Controlled quantum secure direct communication with local separate measurements in cavity QED. Int. J. Theor. Phys. 49, 334–342 (2010)
Shan, C.J., Liu, J.B., Cheng, W.W., Liu, T.K., Huang, Y.X., Li, H.: Bidirectional quantum secure direct communication in driven cavity QED. Mod. Phys. Lett. B. 23, 3225–3234 (2009)
Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)
Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the Bradler-Dusek protocol. Quantum Inf. Comput. 7, 329 (2007)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The author declares that he has no conflict of interest.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yin-Ju, L. Quantum Secret Sharing via Cavity QED. Int J Theor Phys 59, 3324–3328 (2020). https://doi.org/10.1007/s10773-020-04591-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-020-04591-1