搜索

x
中国物理学会期刊

基于正交乘积态的多方量子秘密共享协议

CSTR: 32037.14.aps.74.20250394

Multi-party quantum secret sharing protocol based on orthogonal product states

CSTR: 32037.14.aps.74.20250394
PDF
HTML
导出引用
  • 量子秘密共享是一种通过使用量子力学的基本原理, 实现在多个参与者之间安全分配和重建秘密信息的密码学协议. 本文提出了一种可验证的多方量子秘密共享协议, 该协议中存在一个具有验证能力的秘密分发者和多个接收方. 在协议执行过程中, 秘密分发者会通过设定的编码规则将欲共享的信息用对应的正交乘积态表示, 并将量子态进行分割发送给各个接收方, 只有各接收方共同合作才能最终恢复初始秘密信息. 同时, 考虑到在协议过程中可能存在参与者人数变化的情况, 加入了人员动态变化操作. 通过对协议的安全性分析, 证明了该协议可以抵抗常见的内部和外部攻击. 我们希望该思想能够对量子秘密共享的进一步研究产生积极的影响.

     

    Quantum secret sharing (QSS) is a cryptographic protocol that utilizes fundamental principles of quantum mechanics to securely distribute and reconstruct secret information among multiple participants. Most existing protocols rely on entangled states (such as Bell and GHZ states), but in practical applications. The preparation of entangled state is constrained by a short quantum coherence time, low state fidelity, etc., which makes it difficult to implement entangled resource-dependent QSS protocols. In this work, a novel practical and verifiable multi-party QSS protocol is proposed based on orthogonal product states, which are easier to prepare than entangled states. During the protocol preparation stage, the secret distributor first converts pre-shared classical secret information into the corresponding orthogonal product states according to the encoding rules, and pre-shares a communication key with participants via quantum key distribution (QKD), which is used to hide the initial quantum sequence information through subsequent particle transformation operations. After preparing the orthogonal product states, the distributor reorganizes the particles by position, extracting particles at the same position from each state to form new sequences, shuffling their order, then applying Hadamard operations using a pre-shared key, inserting decoy particles, and sending the sequences to the participants. After receiving it, participants conduct eavesdropping detection, use the same key for the inverse transformations, retain one particle from each sequence, and sequentially pass the remaining particles until the last participant receives a complete set, triggering state verification with the arbiter distributor. If the verification is successful, the particles will be returned to the first participant and the return stage will follow the same procedure. Only after both the transmission and return stage verifications have passed, will the distributor reveal the initial particle positions, allowing participants to collaboratively reconstruct the secret. In the protocol, the secret distributor acts as an arbitrator to verify the particle state information together with participants at designated points (the end of the transmission stage and the end of the return stage) in order to determine whether the particle-state information is error-free during transmission. If the verification fails at either stage, the protocol will be terminated immediately. Meanwhile, considering that the number of participants may change during the execution of the protocol, a dynamic scheme for personnel changes is designed to ensure the flexibility of the protocol. Through the analysis of possible internal and external attacks, It can be proven that our protocol can effectively resist the existing common attack. Using Qiskit simulation experiments, the core quantum procedures of the protocol can be successfully modeled. The experimental results provide strong computational validation of the theoretical feasibility of the protocol.

     

    目录

    /

    返回文章
    返回