An improved semi-quantum secret sharing protocol with enhanced verification to counter man-in-the-middle attacks

  • Abstract
  • References
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

An improved semi-quantum secret sharing protocol with enhanced verification to counter man-in-the-middle attacks

ReferencesShowing 10 of 34 papers
  • Cite Count Icon 19
  • 10.1007/s11128-020-02690-w
Cryptanalysis of limited resource semi-quantum secret sharing
  • Jun 24, 2020
  • Quantum Information Processing
  • Chia-Wei Tsai + 3 more

  • Open Access Icon
  • Cite Count Icon 158
  • 10.1103/physreva.82.022303
Semiquantum secret sharing using entangled states
  • Aug 4, 2010
  • Physical Review A
  • Qin Li + 2 more

  • Cite Count Icon 59
  • 10.1007/s10773-012-1286-4
Improved QSDC Protocol over a Collective-Dephasing Noise Channel
  • Aug 12, 2012
  • International Journal of Theoretical Physics
  • Chun-Wei Yang + 1 more

  • Cite Count Icon 86
  • 10.1007/s11128-012-0514-4
Quantum dialogue protocols immune to collective noise
  • Dec 1, 2012
  • Quantum Information Processing
  • Chun-Wei Yang + 1 more

  • Open Access Icon
  • PDF Download Icon
  • Cite Count Icon 13
  • 10.3390/e25050742
A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity.
  • Apr 30, 2023
  • Entropy
  • Yuan Tian + 5 more

  • Open Access Icon
  • Cite Count Icon 29
  • 10.1103/physreva.85.052309
Generalized semiquantum secret-sharing schemes
  • May 15, 2012
  • Physical Review A
  • Vlad Gheorghiu

  • Cite Count Icon 19
  • 10.1007/s11128-021-03327-2
Cluster-state-based quantum secret sharing for users with different abilities
  • Nov 17, 2021
  • Quantum Information Processing
  • Chaoyang Li + 4 more

  • Open Access Icon
  • PDF Download Icon
  • Cite Count Icon 3
  • 10.3389/fphy.2023.1225059
A (t, n) threshold protocol of semi-quantum secret sharing based on single particles
  • Jul 21, 2023
  • Frontiers in Physics
  • Ziyi Zhou + 5 more

  • Cite Count Icon 4
  • 10.1142/s0217984918502949
Cryptanalysis and improvement of the novel semi-quantum secret sharing scheme based on Bell states
  • Sep 5, 2018
  • Modern Physics Letters B
  • Bingren Chen + 2 more

  • Open Access Icon
  • Cite Count Icon 33
  • 10.1088/0253-6102/70/6/661
Circular Semi-Quantum Secret Sharing Using Single Particles**Supported by the National Nature Science Foundation of China under Grant No. 61871347 and the Natural Science Foundation of Zhejiang Province under Grant No. LY18F020007
  • Dec 1, 2018
  • Communications in Theoretical Physics
  • Chong-Qiang Ye + 1 more

Similar Papers
  • Research Article
  • Cite Count Icon 19
  • 10.1007/s11128-020-02690-w
Cryptanalysis of limited resource semi-quantum secret sharing
  • Jun 24, 2020
  • Quantum Information Processing
  • Chia-Wei Tsai + 3 more

Li et al. (Quantum Inf Process 17(10):285, 2018) proposed a limited resource semi-quantum secret sharing protocol, in which the classical participants do not equip any quantum measurement devices. However, this protocol has a security loophole. This study investigates this loophole and indicates that a malicious agent can perform the double-CNOT attack to steal partial information about the secret shadow of the other agent without being detected.

  • Book Chapter
  • 10.1007/978-981-96-0151-6_31
Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem
  • Jan 1, 2024
  • Fan He + 2 more

Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem

  • Research Article
  • Cite Count Icon 2
  • 10.1142/s0217984916504157
Cryptanalysis and improvement of multiparty semiquantum secret sharing based on rearranging orders of qubits
  • Dec 20, 2016
  • Modern Physics Letters B
  • Aijun Yin + 1 more

Recently, a multiparty semiquantum secret sharing scheme based on rearranging orders of qubits was proposed by Gao et al. [Mod. Phys. Lett. B 30 (2016) 1650130]. In this paper, we show that in their scheme the last agent and other agents can illegally get the sender’s secret keys without being detected. Furthermore, an improved scheme is proposed to resist such attack.

  • Research Article
  • Cite Count Icon 114
  • 10.1088/1751-8113/46/4/045304
Quantum secret sharing with classical Bobs
  • Jan 10, 2013
  • Journal of Physics A: Mathematical and Theoretical
  • Lvzhou Li + 2 more

Boyer et al (2007 Phys. Rev. Lett. 99 140501) proposed a novel idea of semi-quantum key distribution, where a key can be securely distributed between Alice, who can perform any quantum operation, and Bob, who is classical. Extending the ‘semi-quantum’ idea to other tasks of quantum information processing is of interest and worth considering. In this paper, we consider the issue of semi-quantum secret sharing, where a quantum participant Alice can share a secret key with two classical participants, Bobs. After analyzing the existing protocol, we propose a new protocol of semi-quantum secret sharing. Our protocol is more realistic, since it utilizes product states instead of entangled states. We prove that any attempt of an adversary to obtain information necessarily induces some errors that the legitimate users could notice.

  • Research Article
  • Cite Count Icon 35
  • 10.1142/s021798491650130x
Multiparty semiquantum secret sharing based on rearranging orders of qubits
  • Apr 20, 2016
  • Modern Physics Letters B
  • Gan Gao + 2 more

Based on the assumption of a perfect qubit, Boyer et al. proposed a novel semiquantum key distribution protocol [Phys. Rev. Lett. 99 (2007) 140501], in which quantum Alice shares a secret key with classical Bob. In this paper, we use Bell states to propose a multiparty semiquantum secret sharing (MSQSS) protocol, in which only the boss is quantum and all agents are classical. Classical agents are restricted to performing measurements in a computational basis and rearranging orders of qubits. Unless all classical agents collaborate, no subset of them can obtain the secret of the quantum boss. Also, we show that this proposed protocol is secure against eavesdropping.

  • Research Article
  • Cite Count Icon 2
  • 10.1088/1612-202x/ad4eb6
Multi-party semi-quantum secret sharing protocol based on measure-flip and reflect operations
  • May 30, 2024
  • Laser Physics Letters
  • Jian Li + 1 more

Semi-quantum secret sharing (SQSS) protocols serve as fundamental frameworks in quantum secure multi-party computations, offering the advantage of not requiring all users to possess intricate quantum devices. However, current SQSS protocols mainly cater to bipartite scenarios, with few protocols suitable for multi-party scenarios. Moreover, the multi-party SQSS protocols face limitations such as low qubit efficiency and inability to share deterministic secret information. To address this gap, this paper proposes a multi-party SQSS protocol based on multi-particle GHZ states. In this protocol, the quantum user can distribute the predetermined secret information to multiple classical users with limited quantum capabilities, and only through mutual cooperation among all classical users can the correct secret information be reconstructed. By utilizing measure-flip and reflect operations, the transmitted multi-particle GHZ states can all contribute keys, thereby improving the utilization of transmitted particles. Then, security analysis shows that the protocol’s resilience against prevalent external and internal threats. Additionally, employing IBM Qiskit, we conduct quantum circuit simulations to validate the protocol’s accuracy and feasibility. Finally, compared to similar studies, the proposed protocol has advantages in terms of protocol scalability, qubit efficiency, and shared message types.

  • Research Article
  • 10.1142/s0217732324501906
Security analysis and improvement on the (T,N) threshold semiquantum secret sharing
  • Dec 21, 2024
  • Modern Physics Letters A
  • Huijuan Liu

Seldom quantum secret sharing protocols with both the flexible (t, n) threshold and semi-quantum properties have been proposed. Recently, a novel idea of (t, n) threshold semiquantum secret sharing was proposed, which has both the (t, [Formula: see text] threshold and semi-quantum properties. Its idea can simplify the quantum secret sharing process such that many classical users with simple ability of quantum operations can realize the communication goal by cooperating with one quantum party. Furthermore, the protocol is very flexible since any t collaborators of the n classical users can reconstruct the full secret by Shamir’s threshold technology. Unfortunately, their protocol is vulnerable to the NOT-gate attack. This paper shows that an attacker can break the (t, n) threshold protocol by performing two rounds of NOT-gate attack. Then, an improved (t, n) threshold semiquantum secret sharing protocol is proposed. In the improvement scheme, each receiver can perform the eavesdropping check by measuring the Z-basis sample states. The improved protocol not only has semi-quantum properties but also can repair the security hole of the old version and has enhanced security against various quantum attacks.

  • Research Article
  • 10.1088/1402-4896/ad6e32
Collective noise-resistant multi-party semi-quantum secret sharing protocols
  • Aug 23, 2024
  • Physica Scripta
  • Jian Li + 2 more

Semi-quantum secret sharing facilitates the sharing of private data between quantum users and ‘classical’ users with limited quantum capabilities, thereby lowering the barrier to utilizing quantum technology. However, most current semi-quantum secret sharing protocols are confined to ideal environments and two-party scenarios. In this paper, we design two collective noise-resistant multi-party semi-quantum secret sharing protocols based on decoherence-free states to address potential noise interference during transmission. These protocols use decoherence-free states as information carriers for data interaction and exhibit strong resilience to both internal and external threats. We also conduct simulation experiments using IBM Qiskit to verify the stability and feasibility of the protocols in the noisy environments. The results of these experiments underscore the robustness of the protocols, particularly in the presence of collective noise. Compared with previous related protocols, our protocols have advantages in noise resistance and applicability to multi-party scenarios. Therefore, the proposed protocols may be more in line with the secret sharing needs of actual environments.

  • Research Article
  • Cite Count Icon 36
  • 10.1007/s11128-019-2308-4
Semi-quantum identification
  • May 14, 2019
  • Quantum Information Processing
  • Nan-Run Zhou + 3 more

To ensure communication security, it is necessary to verify the identities of the communicators. Two semi-quantum identification protocols with single photons involving two parties, i.e., quantum Alice and classical Bob, are presented. In the first semi-quantum identification protocol, classical Bob can authenticate quantum Alice’s identity without the help of an authenticated classical channel. As for the second one, quantum Alice can verify the identity of classical Bob without the classical measurement ability. Semi-quantum identification is significant to ensure the security of semi-quantum key distribution, semi-quantum secret sharing and so on. The proposed two identification protocols against common attacks can be employed in several existing semi-quantum key distribution protocols based on single photons to resist the man-in-the-middle attack.

  • Research Article
  • Cite Count Icon 65
  • 10.1142/s0219749912500505
SEMIQUANTUM SECRET SHARING USING TWO-PARTICLE ENTANGLED STATE
  • Aug 1, 2012
  • International Journal of Quantum Information
  • Jian Wang + 3 more

We present a semiquantum secret sharing protocol by using two-particle entangled states in which quantum Alice shares a secret key with two classical parties, Bob and Charlie. Classical Bob and Charlie are restricted to measuring, preparing a particle in the computational basis, or reflecting the particles. None of them can acquire the secret unless they collaborate. We also show the protocol is secure against eavesdropping.

  • Research Article
  • Cite Count Icon 15
  • 10.1016/j.cjph.2022.03.031
Semi-quantum secret sharing in high-dimensional quantum system using product states
  • Mar 18, 2022
  • Chinese Journal of Physics
  • Wenwen Hu + 2 more

Semi-quantum secret sharing in high-dimensional quantum system using product states

  • Research Article
  • Cite Count Icon 25
  • 10.1007/s11128-021-03402-8
Multiparty mediated quantum secret sharing protocol
  • Jan 20, 2022
  • Quantum Information Processing
  • Chia-Wei Tsai + 2 more

This study proposes a multiparty mediated quantum secret sharing (MQSS) protocol that allows n restricted quantum users to share a secret via the assistance of a dishonest third-party with full quantum capabilities. Under the premise that a restricted quantum user can only perform the Hadamard transformation and the Z-basis measurement, the proposed MQSS protocol has addressed two common challenges in the existing semi-quantum secret sharing protocols: (1) the dealer must have full quantum capability, and (2) the classical users must equip with the wavelength quantum filter and the photon number splitters to detect the Trojan horse attacks. The security analysis has also delivered proof to show that the proposed MQSS protocol can avoid the collective attack, the collusion attack, and the Trojan horse attacks. In addition, the proposed MQSS protocol is more efficient than the existing SQSS protocols due to the restricted quantum users can only equip with two quantum operations, and the qubits are transmitted within a shorter distance.

  • Research Article
  • Cite Count Icon 158
  • 10.1103/physreva.82.022303
Semiquantum secret sharing using entangled states
  • Aug 4, 2010
  • Physical Review A
  • Qin Li + 2 more

Secret sharing is a procedure for sharing a secret among a number of participants such that only the qualified subsets of participants have the ability to reconstruct the secret. Even in the presence of eavesdropping, secret sharing can be achieved when all the members are quantum. So what happens if not all the members are quantum? In this paper we propose two semi-quantum secret sharing protocols using maximally entangled GHZ-type states in which quantum Alice shares a secret with two classical parties, Bob and Charlie, in a way that both parties are sufficient to obtain the secret, but one of them cannot. The presented protocols are also showed to be secure against eavesdropping.

  • Research Article
  • Cite Count Icon 12
  • 10.1088/1674-1056/ace159
Efficient semi-quantum secret sharing protocol using single particles
  • Jun 25, 2023
  • Chinese Physics B
  • Ding Xing + 5 more

Semi-quantum secret sharing (SQSS) is a branch of quantum cryptography which only requires the dealer to have quantum capabilities, reducing the difficulty of protocol implementation. However, the efficiency of the SQSS protocol still needs to be further studied. In this paper, we propose a semi-quantum secret sharing protocol, whose efficiency can approach 100% as the length of message increases. The protocol is based on single particles to reduce the difficulty of resource preparation. Particle reordering, a simple but effective operation, is used in the protocol to improve efficiency and ensure security. Furthermore, our protocol can share specific secrets while most SQSS protocols could not. We also prove that the protocol is secure against common attacks.

  • Research Article
  • 10.1103/physreva.84.049904
Publisher's Note: Semiquantum secret sharing using entangled states [Phys. Rev. A82, 022303 (2010)
  • Oct 24, 2011
  • Physical Review A
  • Qin Li + 2 more

Publisher's Note: Semiquantum secret sharing using entangled states [Phys. Rev. A<b>82</b>, 022303 (2010)

More from: Chinese Journal of Physics
  • Research Article
  • 10.1016/j.cjph.2025.10.032
Optical Aspect of Cosmological Black Holes in Einstein-Maxwell-Dilaton Theory
  • Nov 1, 2025
  • Chinese Journal of Physics
  • Hajar Belmahi + 1 more

  • Research Article
  • 10.1016/j.cjph.2025.11.001
Spin wave modes of antivortices hosted in square ultrathin nanodots
  • Nov 1, 2025
  • Chinese Journal of Physics
  • Felipe Tejo + 1 more

  • Research Article
  • 10.1016/j.cjph.2025.10.029
Electrothermal flow of CNT-blood on a sensor plate with ramping shear and thermal flux: Electromagnetic biosensor applications
  • Nov 1, 2025
  • Chinese Journal of Physics
  • Sanatan Das + 4 more

  • Research Article
  • 10.1016/j.cjph.2025.10.021
Energy consumption investigation for an extended car-following model incorporating the effects of global and local interaction
  • Nov 1, 2025
  • Chinese Journal of Physics
  • Bing Qiu + 1 more

  • Research Article
  • 10.1016/j.cjph.2025.11.007
Optical Performance Improvement of Cooke Triplet Based on Meta-corrector
  • Nov 1, 2025
  • Chinese Journal of Physics
  • Chao-Chein Hsu + 8 more

  • Research Article
  • 10.1016/j.cjph.2025.11.002
Arbitrary single-qubit operation teleportation without quantum teleportation
  • Nov 1, 2025
  • Chinese Journal of Physics
  • Wei-Min Shi + 3 more

  • Research Article
  • 10.1016/j.cjph.2025.11.005
Solitary, periodic, and kink waves in some fluid-conveying graphene origami-reinforced microtubes exposed to a thermal load
  • Nov 1, 2025
  • Chinese Journal of Physics
  • Mohammed Sobhy

  • Research Article
  • 10.1016/j.cjph.2025.11.004
Synergistic regimes of geometric constraints in flexible biomolecular systems: A Monte Carlo and information-theoretic analysis of linkage errors
  • Nov 1, 2025
  • Chinese Journal of Physics
  • Xinyi Fu + 3 more

  • Research Article
  • 10.1016/j.cjph.2025.11.003
Switchable Z-Scheme Charge Transfer and Tunable Electronic Properties in ZnI₂/In₂Se₃ Bilayer Ferroelectric Heterostructure
  • Nov 1, 2025
  • Chinese Journal of Physics
  • Xiaolin Cai + 6 more

  • Research Article
  • 10.1016/j.cjph.2025.10.030
Nonlinear localized waves and transition mechanisms of the (3+1)-dimensional negative-order KdV-Calogero-Bogoyavlenskii-Schiff equation
  • Nov 1, 2025
  • Chinese Journal of Physics
  • Longxing Li + 3 more

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.

Search IconWhat is the difference between bacteria and viruses?
Open In New Tab Icon
Search IconWhat is the function of the immune system?
Open In New Tab Icon
Search IconCan diabetes be passed down from one generation to the next?
Open In New Tab Icon