Abstract

Secret sharing is a multi-party cryptographic primitive that can be applied to a network of partially distrustful parties for encrypting data that is both sensitive (it must remain secure) and important (it must not be lost or destroyed). When sharing classical secrets (as opposed to quantum states), one can distinguish between protocols that leverage bi-partite quantum key distribution (QKD) and those that exploit multi-partite entanglement. The latter class are known to be vulnerable to so-called participant attacks and, while progress has been made recently, there is currently no analysis that quantifies their performance in the composable, finite-size regime which has become the gold standard for QKD security. Given this - and the fact that distributing multi-partite entanglement is typically challenging - one might well ask: Is there any virtue in pursuing multi-partite entanglement based schemes? Here, we answer this question in the affirmative for a class of secret sharing protocols based on continuous variable graph states. We establish security in a composable framework and identify a network topology, specifically a bottleneck network of lossy channels, and parameter regimes within the reach of present day experiments for which a multi-partite scheme outperforms the corresponding QKD based method in the asymptotic and finite-size setting. Finally, we establish experimental parameters where the multi-partite schemes outperform any possible QKD based protocol. This one of the first concrete compelling examples of multi-partite entangled resources achieving a genuine advantage over point-to-point protocols for quantum communication and represents a rigorous, operational benchmark to assess the usefulness of such resources.

Highlights

  • The desire to reliably store important information seems at odds with the desire to keep that information secret

  • When sharing classical secrets, one can distinguish between protocols that leverage bipartite quantum key distribution (QKD) and those that exploit multipartite entanglement

  • The latter class are known to be vulnerable to so-called participant attacks and, while progress has been made recently, there is currently no analysis that quantifies their performance in the composable, finite-size regime, which has become the gold standard for QKD security

Read more

Summary

INTRODUCTION

The desire to reliably store important information seems at odds with the desire to keep that information secret. Several works [14,15,16,17] have identified graph states [18] as a valuable resource for secret sharing (with classical and quantum secrets), which allow for more general (n, k)-threshold schemes and highlight an elegant connection between secret sharing and errorcorrection codes Substantial theoretical progress has been made on how to distribute graph states in multipartite quantum networks [19,20] Whilst these proposals have comprehensively answered the questions of how secrets can be successfully reconstructed by the authorized subsets, the security analysis against dishonest parties remained unsatisfactory because the problem of participant attacks remained unsolved. This represents—once again—a rare concrete example of a multipartite entanglement advantage for quantum cryptography over realistic networks

SECURITY OF SECRET SHARING
NETWORK CODING ADVANTAGE IN BOTTLENECK NETWORKS
CONCLUSIONS AND OUTLOOK
Preliminaries
CV graph states
Bottleneck networks
Modeling an experimental implementation
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.