Skip to main content
Log in

Cryptanalysis of limited resource semi-quantum secret sharing

  • Comment
  • Published:
Quantum Information Processing Aims and scope Submit manuscript

The Original Article was published on 14 September 2018

Abstract

Li et al. (Quantum Inf Process 17(10):285, 2018) proposed a limited resource semi-quantum secret sharing protocol, in which the classical participants do not equip any quantum measurement devices. However, this protocol has a security loophole. This study investigates this loophole and indicates that a malicious agent can perform the double-CNOT attack to steal partial information about the secret shadow of the other agent without being detected.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612 (1979)

    Article  MathSciNet  Google Scholar 

  2. Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829 (1999)

    Article  ADS  MathSciNet  Google Scholar 

  3. Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. A 99(14), 140501 (2007)

    MathSciNet  MATH  Google Scholar 

  4. Li, Z.L., Li, Q., Liu, C.D., Peng, Y., Chan, W.H., Li, L.H.: Limited resource semiquantum secret sharing. Quantum Inf. Process. 17(10), 285 (2018)

    Article  ADS  Google Scholar 

  5. Iqbal, H., Krawec, W.O.: Semi-quantum cryptography. Quantum Inf. Process. 19(3), 97 (2020)

    Article  ADS  MathSciNet  Google Scholar 

  6. Wojcik, A.: Eavesdropping on the ‘ping–pong’ quantum communication protocol. Phys. Rev. Lett. 90(15), 157901 (2003)

    Article  ADS  Google Scholar 

  7. Zhang, Z.J., Man, Z.X., Li, Y.: Improving Wójcik’s eavesdropping attack on the ping–pong protocol. Phys. Lett. A 333(1–2), 46 (2004)

    Article  ADS  MathSciNet  Google Scholar 

  8. Liu, H., Zhang, X.L., Lu, H.: Eavesdropping on the quantum dialogue protocol in lossy channel. Chin. Phys. B 20(7), 070305 (2011)

    Article  ADS  Google Scholar 

  9. Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: ‘Quantum exam’. Phys. Lett. A 360(6), 748 (2007)

    Article  ADS  Google Scholar 

  10. Shaari, J.S., Lucamarini, M., Wahiddin, M.R.B.: Deterministic six states protocol for quantum communication. Phys. Lett. A 358(2), 85 (2006)

    Article  ADS  MathSciNet  Google Scholar 

  11. Faisal, A.A.: El-Orany: Comment on ‘Deterministic six states protocol for quantum communication’. Phys. Lett. A 374(8), 1097 (2010)

    Article  MathSciNet  Google Scholar 

  12. Gu, J., Lin, P.H., Hwang, T.: Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol’. Quantum Inf. Process. 17(7), 182 (2018)

    Article  ADS  MathSciNet  Google Scholar 

  13. Lin, P.H., Hwang, T., Tsai, C.W.: Double CNOT attack on ‘Quantum key distribution with limited classical Bob’. Int. J. Quantum Inf. 17(02), 1975001 (2019)

    Article  MathSciNet  Google Scholar 

  14. Yang, C.W.: Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack. Quantum Inf. Process. 19(50), 108 (2020)

    ADS  MathSciNet  Google Scholar 

  15. Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72(1), 012332 (2005)

    Article  ADS  Google Scholar 

  16. Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210 (1988)

    Article  MathSciNet  Google Scholar 

  17. Bennett, C.H., Brassard, G., Crepeau, C., Maurer, U.M.: Generalized privacy amplification. IEEE Trans. Inf. Theory 41(6), 1915 (1995)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

We would like to thank the anonymous reviewers and the editor for their very valuable comments, which greatly enhanced the clarity of this paper. This research was partially supported by the Ministry of Science and Technology, Taiwan, R.O.C. (Grant Nos. MOST 106-2218-E-039-002-MY3, MOST 107-2218-E-143-002-MY2, MOST 107-2627-E-006-001 and MOST 107-2221-E-143-001-MY3), China Medical University, Taiwan (Grant No. CMU108-N-01), and Bureau of Energy, Ministry of Economic Affairs, Taiwan (Grant No. 109-D0101-2).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chun-Wei Yang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tsai, CW., Chang, YC., Lai, YH. et al. Cryptanalysis of limited resource semi-quantum secret sharing. Quantum Inf Process 19, 224 (2020). https://doi.org/10.1007/s11128-020-02690-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-020-02690-w

Keywords

Navigation