Abstract
In the (t, n) threshold quantum secret sharing scheme, it is difficult to ensure that internal participants are honest. In this paper, a verifiable (t, n) threshold quantum secret sharing scheme is designed to combine with classical secret sharing scheme. First of all, the distributor uses the asymmetric binary polynomial to generate the shares and sends them to each participant. Secondly, the distributor sends the initial quantum state with the secret to the first participant, and each participant performs unitary operation that uses the mutually unbiased bases on the obtained d dimension single bit quantum state (d is a large odd prime number). In this process, distributor can randomly check the participants, and find out the internal fraudsters. Then the secret is reconstructed after all other participants publicly transmit it at the same time. The analysis of this scheme includes correctness analysis, completeness analysis and security analysis. And the security analysis shows that the scheme can resist both external and internal attacks.
Graphical abstract
Similar content being viewed by others
References
A. Shamir, Commun. ACM 22, 612 (1979).
G.R. Blakley, in Proceedings of the National Computer Conference (1979), pp. 313–317.
W.A. Jackson, K.M. Martin, C.M. Okeefe, J. Crypt. 9, 233 (1996).
C.F. Hsu, Q. Cheng, X. Tang, B. Zeng, Inf. Sci. 181, 1403 (2011).
R. Bitar, E.R. Salim, I.E.E.E. Trans, Inf. Theor. 64, 933 (2018).
Y. Ouyang, S.-H. Tan, L. Zhao, J.F. Fitzsimons, Phys. Rev. A. 96, 052333 (2017).
R. Bassirian, S. Boreiri, V. Karimipour, Quantum Inf. Process. 18, 109 (2019).
B. Chor, S. Goldwasser, S. Micali, B. Awerbuch, in Proceedings of 26th IEEE Symposium on Foundations of Computer Science (1985), pp. 383–395.
P Feldman, in Proceedings of 28th IEEE Symposium on Foundations of Computer Science (1987), pp. 427–437.
M. Stadler, EUROCRYPT96 1070, 190 (1996) .
P.W. Shor, in Proceedings of the 35th Annual Symposium of Foundation of Computer Science (1994).
M. Hillery, V. Buzek, A. Berthiaume, Phys. Rev. A. 59, 1829 (1999).
F.G. Deng, X.H. Li, H.Y. Zhou, Z.J. Zhang, Phys. Rev. A. 72, 044302 (2005).
Y. Sun, Q.Y. Wen, F.C. Zhu, Commun. Theor. Phys. 54, 89 (2010).
M.H. Dehkordi, E. Fattahi, Quantum Inf. Process. 12, 1299 (2013).
R. Cleve, D. Gottesman, H.K. Lo, Phys. Rev. Lett. 83, 648 (1999).
C.M. Bai, Z.H. Li, C.J. Liu, Y.M. Li, Eur. Phys. J. D. 71, 1 (2017).
C.M. Bai, Z.H. Li, C.J. Liu, Y.M. Li, Eur. Phys. J. D. 72, 1 (2018).
P. Khakbiz, M. Asoudeh, Quantum Inf. Process. 18, 1 (2019).
A. Tavakoli, I. Herbauts, M. Zukowski, M. Bourennane, Phys. Rev. A. 92, 1 (2015).
V. Karimipour, M. Asoudeh, Phys. Rev. A. 92, 030301 (2015).
C.M. Bai, Z.H. Li, Y.M. Li, Commun. Theor. Phys. 69, 513 (2018).
P.K. Sarvepalli, A. Klappenecker, Phys. Rev. A. 80, 022321 (2009).
C.M. Bai, Z.H. Li, C.J. Liu, Y.M. Li, Quantum Inf. Process. 16, 304 (2017).
K. Senthoor, P.K. Sarvepalli, Phys. Rev. A. 100, 052313 (2019).
Y.G. Yang, Y.W. Teng, H.P. Chai, Q.Y. Wen, Quantum Inf. Process. 50, 792 (2011).
X. Song, Y. Liu, Quantum Inf. Process. 15, 851 (2016).
H. Qin, Y. Dai, Inf. Process. Lett. 116, 351 (2016).
N. Hadisukmana, R. Roestam, 2019 ICSECC (2019).
C. Schmid, P. Trojek, M. Bourennane, C. Kurtsiefer, M. Zukowski, H. Weinfurter, Phys. Rev. Lett. 95, 230505 (2005).
C. Lu, F. Miao, J. Hou, K. Meng, Quantum Inf. Process. 17, 310 (2018).
I.D. Ivonovic, J. Phys. A: Math. Gen. 14, 3241 (1981).
W.K. Wotters, B.D. Fields, Ann. Phys. 191, 363 (1989).
Author information
Authors and Affiliations
Contributions
Li-Juan Liu and Zhi-Hui Li proposed the initial idea for this paper. Li-Juan Liu wrote the initial draft of the manuscript, and all authors participated in the discussion and revision of the manuscript.
Corresponding author
Additional information
Publisher's Note
The EPJ Publishers remain neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Liu, LJ., Li, ZH., Han, ZW. et al. A quantum secret sharing scheme with verifiable function. Eur. Phys. J. D 74, 154 (2020). https://doi.org/10.1140/epjd/e2020-10010-3
Received:
Revised:
Published:
DOI: https://doi.org/10.1140/epjd/e2020-10010-3