Author:
Guan Feiting,Guo Jiansheng,Li Lele
Abstract
Abstract
Threshold quantum secret sharing is a typical method for quantum secret sharing (QSS) schemes. In this paper, we propose a verifiable
t
,
n
threshold QSS scheme based on the
d
-dimensional Bell state and asymmetric binary polynomial. In this scheme, the dealer encodes the secret using the asymmetric binary polynomial and generates the corresponding secret share for each participant. Then, the dealer prepares the
d
-dimensional Bell state, and the participants perform corresponding unitary operations on the particles in transmission to recover the secret. With the hash function and the session key pairs, not only the cheating behavior of the dishonest participants can be detected, but also the specific cheaters can be identified. Furthermore, we consider the case when no less than
t
participants cooperate to recover the secret, which makes the proposed scheme more practical. Analyses show that the scheme can resist forgery attack, collusion attack and other common attacks.
Subject
Industrial and Manufacturing Engineering,Condensed Matter Physics,Instrumentation,Atomic and Molecular Physics, and Optics
Reference37 articles.
1. How to share a secret;Shamir;Commun. ACM,1979
2. On sharing secrets and Reed-Solomon codes;McEliece;Commun. ACM,1981
3. A scheme for threshold multi-secret sharing;Chan;Appl. Math. Comput.,2005
4. Secret sharing schemes from three classes of linear codes;Yuan;IEEE Trans. Inf. Theory,2006
5. Verifiable secret sharing and achieving simultaneity in the presence of faults;Chor,1985