arxiv:quant-ph/ v1 27 Dec 2004

Similar documents
Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State

Quantum secret sharing based on quantum error-correcting codes

arxiv:quant-ph/ v1 10 Apr 2006

arxiv: v3 [quant-ph] 6 Sep 2009

arxiv:quant-ph/ v2 2 Jan 2007

Grover s algorithm based multi-qubit secret sharing scheme

Multiparty Quantum Remote Control

arxiv: v2 [quant-ph] 9 Nov 2011

Selection of unitary operations in quantum secret sharing without entanglement

arxiv:quant-ph/ v1 6 Dec 2005

Multiparty Quantum Secret Sharing Using Quantum Fourier Transform

Circular Semi-Quantum Secret Sharing Using Single Particles

arxiv:quant-ph/ v2 3 Oct 2000

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

arxiv:quant-ph/ May 2002

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State

Efficient controlled quantum secure direct communication based on GHZ-like states

arxiv:quant-ph/ v1 13 Jan 2003

arxiv:quant-ph/ v2 25 May 2005

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state

Scheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

Bidirectional quantum teleportation and secure direct communication via entanglement swapping

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

arxiv:quant-ph/ v2 11 Jan 2006

Quantum secure direct communication network with Einstein-Podolsky-Rosen pairs

arxiv: v2 [quant-ph] 19 Sep 2015

Quantum secret sharing without entanglement

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Entanglement and information

arxiv: v7 [quant-ph] 20 Mar 2017

A Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State

Single-Qubit Operation Sharing with Bell and W Product States

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

arxiv:quant-ph/ v1 13 Mar 2007

Deterministic secure communications using two-mode squeezed states

Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties

Security Implications of Quantum Technologies

Technical Report Communicating Secret Information Without Secret Messages

Quantum key distribution with 2-bit quantum codes

Quantum Teleportation Pt. 3

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

arxiv: v1 [quant-ph] 18 May 2018

Quantum Secure Direct Communication by Using Three-Dimensional Hyperentanglement

Multi-Particle Entanglement & It s Application in Quantum Networks

Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States

arxiv: v5 [quant-ph] 28 Oct 2015

Analysing the role of entanglement in the three-qubit Vaidman s game

Entanglement and Quantum Teleportation

Quantum information and quantum computing

CS120, Quantum Cryptography, Fall 2016

Quantum Teleportation Pt. 1

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Quantum communication protocols based on entanglement swapping

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

arxiv:quant-ph/ v1 1 Jun 2000

Quantum Optical Implementation of Quantum Communication

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

Symmetric remote two-qubit preparation via positive operator-valued measure

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Device-Independent Quantum Information Processing

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Teleporting an Unknown Quantum State Via Dual Classical and Einstein Podolsky Rosen Channels 1

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Multiparty Secure Communication by Using Quantum Key Distribution Protocols

Quantum Teleportation. Gur Yaari for HEisenberg's Seminar on Quantum Optics

arxiv:quant-ph/ v2 17 Sep 2002

Generation and classification of robust remote symmetric Dicke states

Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State

Supplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol

o. 5 Proposal of many-party controlled teleportation for by (C 1 ;C ; ;C ) can be expressed as [16] j' w i (c 0 j000 :::0i + c 1 j100 :::0i + c

Bell inequality for qunits with binary measurements

arxiv:quant-ph/ v2 7 Nov 2001

Counterfactual Quantum Deterministic Key Distribution

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing

arxiv: v1 [quant-ph] 3 Jul 2018

Trustworthiness of detectors in quantum key distribution with untrusted detectors

Transmitting and Hiding Quantum Information

Instantaneous Nonlocal Measurements

Cryptography in a quantum world

A probabilistic quantum key transfer protocol

A NOVEL APPROACH FOR SECURE MULTI-PARTY SECRET SHARING SCHEME VIA QUANTUM CRYPTOGRAPHY

Quantum Cryptographic Network based on Quantum Memories. Abstract

Quantum secure direct communication with quantum. memory

Quantum Cryptography

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Quantum Dense Coding and Quantum Teleportation

Quantum Gates, Circuits & Teleportation

Lecture 20: Bell inequalities and nonlocality

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

arxiv:quant-ph/ Jan 2000

Perfectly secure cipher system.

Security of Quantum Key Distribution with Imperfect Devices

Quantum Wireless Sensor Networks

Quantum Cryptography

Ping Pong Protocol & Auto-compensation

Transcription:

Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071, China 3 Department of Physics, Huazhong Normal University, Wuhan 430079, China Email: zhangzj@wipm.ac.cn (Dated: July 23, 2018) arxiv:quant-ph/0412203v1 27 Dec 2004 Based on a quantum secure direct communication (QSDC) protocol[phys. Rev. A69(04)052319], we propose a (n, n)-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons. We take advantage of this multiparty QSSCM scheme to establish a scheme of multiparty secret sharing of quantum information (SSQI), in which only all quantum information receivers collaborate can the original qubit be reconstructed. A general idea is also proposed for constructing multiparty SSQI schemes from any QSSCM scheme. PACS: 03.67.Dd, 03.65.Ta, 89.70.+c Suppose Alice wants to send a secret message to two distant parties, Bob and Charlie. One of them, Bob orcharlie, is not entirely trusted by Alice. And she knows that if the two guyscoexist, the honest one will keep the dishonest one from doing any damages. Instead of giving the total secret messages to any one of them, it may be desirable for Alice to split the secret messages into two encrypted parts and send each one a part so that no one alone is sufficient to obtain the whole original information but they collaborate. To gain this end classical cryptography can use a technique called as secret sharing [1,2], where secret messages are distributed among n users in such a way that only by combining their pieces of information can the n users recover the secret messages. Usually this kind of protocols are divided into classes, where from the n receivers, m can collaborate to produce the desired result. In this paper, we will focus on a (n,n) scheme, where all the receivers need to collaborate to obtain the desired message. Recently this concept has been generalized to a quantum scenario [3]. The quantum secret sharing (QSS) is likely to play a key role in protecting secret quantum information, e.g., in secure operations of distributed quantum computation, sharing difficult-to-construct ancilla states and joint sharing of quantum money [6], and so on. Hence, after the pioneering QSS work proposed by using three-particle and four-particle GHZ states [3], this kind of works on QSS attracted a great deal of attentions in both theoretical and experimental aspects [4-16]. All these works [3-16] can be divided into two kinds, one only deals with the QSS of classical messages (i.e., bits)[5-6,8-11,13-14], or only deals with the QSS of quantum information [4,7,12,15-16] where the secret is an arbitrary unknown state in a qubit; and the other [3] studies both, that is, deals with QSS of classical messages and QSS of quantum information simultaneously. In all those schemes [3,5-6,8-11,13-14] dealing with the QSS of classical messages (bits), entangled states are used with only an exception [13] where multi-particle product

2 states are employed. On the other hand, in all those schemes [3,4,7,12,15,16] dealing with the QSS of quantum information, multi-particle entangled states are used. Recently, a particular quantum secure direct communication(qsdc) protocol has been proposed by Deng and Long [17], in which only single photon state is used. In this paper, based on Deng-Long s QSDC protocol, we propose a scheme of multiparty quantum secret sharing of classical messages (QSSCM) by using only single photons. And then we take advantage of this multiparty QSSCM scheme to establish a scheme of multiparty secret sharing of quantum information (SSQI), where the secret is an arbitrary unknown quantum state in a qubit. We will show that multi-particle entangled states are unnecessary in our multiparty SSQI scheme. Finally, we will propose a general idea for constructing multiparty SSQI schemes from any QSSCM scheme. Now let us turn to our multiparty QSSCM scheme. For convenience, let us first describe a threeparty QSSCM scheme. Suppose Alice wants to send a secret message to two distant parties, Bob and Charlie. One of them, Bob or Charlie, is not entirely trusted by Alice, and she knows that if the two guys coexist, the honest one will keep the dishonest one from doing any damages. The two receivers, Bob and Charlie, can infer the secret message only by their mutual assistance. Our following three-party QSSCM scheme can achieve this goal with 5 steps. (a) Bob prepares a batch of N single photons randomly in one of four polarization states H = 0, V = 1, u = 1/ 2( 0 + 1 ), d = 1/ 2( 0 1 ). For convenience, { H, V } is refereed to as the rectilinear basis and { u, d } the diagonal basis hereafter. Then he sends this batch of photons to Charlie. (b) After receiving these photons, for each photon Charlie randomly choose a unitary operation from I, U and U H and performs this unitary operation on it. Here I = 0 0 + 1 1 is an identity operator, U = 0 1 1 0 and U H = ( 0 0 + 1 0 + 0 1 1 1 )/ 2 is a Hadamard gate operator. The nice feature of the U operation is that it flips the state in both measuring bases, i.e., U 0 = 1, U 1 = 0, U u = d, U d = u. And the nice feature of H is that it can realize the transformation between the rectilinear basis and the diagonal basis, i.e., U H H = u, U H V = d, U H u = H, U H d = V. After his encryptions, he sends the photons to Alice. The purpose of choosing a set of three unitary operations is to protect the channel between Alice and Charlie from Bob s interception. For example, if Charlie chooses randomly a unitary operation from only I and U, Bob could intercept the channel between Alice and Charlie. He already has all the information about the state of the photon, and can readily check what is the transformation Alice did, so then he can retrieve the complete message without the help of Charlie. (c) Alice stores most of the single photons and selects randomly a subset of single photons. Alice publicly announces the position of the selected photons. For each selected photon Alice randomly selects one action from the following two choices. One is that Alice lets Bob first tell her the initial state of the photon and then lets Charlie tell her which unitary operation he has performed on it; the other is that Charlie first tells Alice which unitary operation he has performed on the photon and then Bob tells Alice the initial state of the photon. Alice s strategy of choosing two actions is to prevent either Bob s or Charlie s intercept-resend attacks. Then Alice first performs the same unitary operation as Charlie has performed on the photon and then measures the photon by using the

3 basis the initial state belongs to. After her measurements, Alice can determine the error rate. If the error rate exceeds the threshold, the process is aborted. Otherwise, the process continues and Alice performs unitary operations (either I or U) on the stored photons to encode her secret messages. That is, if Alice wants to encode a bit 0, she performs the identity unitary operation I; if Alice wants to encode a bit 1, she performs the unitary operation U = 0 1 1 0. Alice sends these encoded photons to Charlie. (d) After Charlie receives these encoded photons, if Bob and Charlie collaborate, both Bob and Charlie can obtain Alice s secret message by using correct measuring basis for each encoded photon. On the other hand, if Bob and Charlie do not collaborate, then both Bob and Charlie can not get access to Alice s secret message with 100% certainty. (e) Alice publicly announces a small part of her secret messages for Bob and Charlie to check whether the photons travelling from Alice site to Charlie s site have been attacked, which is called message authentification. If the photons are attacked, the eavesdropper Eve can not get access to any useful information but interrupt the transmissions. So far we have proposed the three-party QSSCM scheme based on Deng and Long s QSDC protocol [17] by using single photons. The security of the present three-party QSSCM scheme is the same as the security of Deng and Long s QSDC protocol [17], that is, it depends completely on the step when Charlie sends the photon batch to Alice. As proven in [17], the scheme is also unconditionally secure. Incidentally, one can easily find that if Alice sends the encoded photons to Bob instead of Charlie, then the resultant scheme works securely also. Nowletusgeneralizethethree-partyQSSCMschemetoan-party(n 4)QSSCMscheme. Suppose that Alice is the message sender who would like to send a massage to Bob, Charlie, Dick,..., and Zach (there is totally n receivers). The first step of the n-party (n 4) QSSCM scheme is the same as that in the three-party QSSCM scheme. For completeness, this step is also included as follows. (I) Bob prepares a batch of N single photons randomly in one of four polarization states H = 0, V = 1, u = 1/ 2( 0 + 1 ), d = 1/ 2( 0 1 ). Then he sends this batch of photons to Charlie. (II) After receiving these photons, for each photon Charlie randomly chooses a unitary operation from I, U and U H and performs this unitary operation on it. After his encryptions, he sends the encrypted photons to the next receiver, say, Dick. Dick encrypts randomly the encoded photons in the same way as Charlie, then he sends the photons to the next receiver, and so on. Similar procedure is repeated until Zach finishes his encryptions. After Zach s encryptions, he sends the encrypted photons to Alice. (III) Alice stores most of the single photons and selects randomly a subset of single photons. And then Alice publicly announces the position of the selected photons. To prevent any receiver s interceptresend attack, for each selected photon, Alice randomly selects a receiver one by one and let him or her tell her this receiver s message till she obtains all receivers s messages. Here Bob s message is the initial state of the photon, while Charlie s, (Dick s,..., Zeck s) message is which unitary operation he has performed on the photon. Alice performs in turn the same unitary operations as Zeck s, the (n 2)th receiver s,..., Dick s and Charlie s unitary operations on the photon and then measures this

4 photon by using the basis the initial state belongs to. After her measurements, Alice can determine the error rate. If the error rate exceeds the threshold, the process is aborted. Otherwise, the process continues and Alice performs unitary operations (either I or U) on the stored photons to encode her secret messages. Alice sends these encoded photons to Zach. (IV) After Zach receives these encoded photons, if Zach and the other n 1 receivers (Bob, Charlie, Dick,..., the (n 1)th receiver) collaborate, they can obtain Alice s secret message by using correct measuring basis for each encoded photon. On the other hand, if all the receivers do not collaborate, then none of them can get access to Alice s secret message with 100% certainty. (V) Alice publicly announces a small part of her secret messages for all the receivers to check whether the photons travelling from Alice site to Zach s site have been attacked, which is called message authentification. If the photons are attacked, the eavesdropper Eve can not get access to any useful information but interrupt the transmissions. So far we have established a n-party QSSCM scheme by using single photons. The security of the present n-party QSSCM scheme is the same as the security of three-party QSSCM scheme, which is also unconditionally secure. Incidentally, as mentioned previously, one can easily find that if Alice sends the encoded photons to any other receiver instead of Zach, then the resultant scheme works securely also. Now let us move to propose a multiparty SSQI scheme. Before this, let us briefly review the secure teleportation of an unknown quantum state [19]. Suppose that Alice wants to send to Bob an unknown state α H u + β V u in her qubit. Bob prepares a photon pair in any Bell state, say, Φ + ht = 1 2 ( H h H t + V h V t = 1 2 ( u h u t + d h d t ). Bob sends the t photon to Alice. By randomly selecting one of the two sets of measuring basis, both Alice and Bob can check whether the quantum channel for photon transmission is attacked or not according to their joint actions [24]. Suppose the quantum channel is safe and Bob successfully transits a t photon to Alice. The state of the whole system can be rewritten as (α H u +β V u ) Φ + ht = (α H u +β V u ) 1 2 ( H h H t + V h V t = 1 2 Φ+ ut ((α H h +β V h )+ 1 2 Ψ+ ut ((α V h +β H h ) + 1 2 Φ ut ((α H h β V h )+ 1 2 Ψ ut ((α V h β H h ), (1) where Ψ + = ( H h V t + V h H t )/ 2, Ψ = ( H h V t V h H t )/ 2 and Φ = ( H h H t V h V t )/ 2. Hence, if Alice performs a Bell-state measurement on the two photons in her lab and tells Bob her measurement outcome, say, Φ + ( Ψ +, Ψ, Φ ), then Bob can perform a unitary operation I = H H + V V (u 1 = H V + V H, u 2 = H H V V, u 3 = H V V H ) to reconstruct the unknown state in the qubit h. Since the teleportation is based on EPR pairs, so the proof of the security is the same in essence as those in Ref.[20-24]. This is the secure teleportation of an unknown state in a qubit. In such teleportation, Alice s public announcement of the Bell-state measurement outcome is a necessary step, otherwise, Bob can not reconstruct the unknown state in his retained qubit. Our multiparty SSQI scheme (n 3) is almost the same as the secure teleportation of an unknown

5 quantum state as mentioned above, except one point. Alice would like to send an unknown quantum state to Bob, Charlie, Dick,..., and Zach (there is totally n receivers). To do this, she sends the unknown quantum state to Bob by teleportation. But instead of public announcement of the Bellstate measurement outcome, Alice distributes her Bell-state measurement outcome to n-1 receivers without Bob by use of the QSSCM (quantum secret sharing of classical messages) protocol we just proposed. To reconstruct an unknown state in a qubit, all n receivers must collaborate. In our multiparty SSQI (secret sharing of quantum information) scheme, the multi-particle GHZ states in all other existing multiparty SSQI schemes [3,4,7] are not necessary. Although in [15] it is claimed that only Bell states are needed, the identification of multi-particle GHZ state is necessary. In our multiparty SSQI protocol, only during the teleportation step are the use and identification of Bell states needed. In all other steps, single photon states are enough. Hence, the present multiparty SSQI scheme is more feasible with present-day technique[25]. As a matter of fact, till now there have been many existing multiparty QSSCM (quantum secret sharing of classical messages) schemes [3,5-6,8-11,13-14]. Each of them can be combined with the secure quantum teleportation of an unknown state to establish a multiparty SSQI scheme. Hence the idea of combining a secure teleportation of an unknown state with a QSSCM scheme to set up a SSQI scheme in the present paper is a general one. To summarize, in this paper by using single photon state instead of entangled states (Bell states or multi-particle GHZ states) or of multi-photon product states we have presented a multiparty QSSCM scheme based on Deng and Long s QSDC protocol. We have also proposed a multiparty SSQI scheme by taking advantage of our multiparty QSSCM scheme. The idea of combining a multiparty QSSCM scheme with the secure quantum teleportation to establish a multiparty SSQI scheme is general. Acknowledgements Zhang thanks to Professor Baiwen Li for his encouragement. We also thank to the referee for his/her many constructive opinions. This work is supported by the National Natural Science Foundation of China under Grant No. 10304022. References [1] B. Schneier, Applied Cryptography (Wiley, New York, 1996) p. 70. [2] J. Gruska, Foundations of Computing (Thomson Computer Press, London, 1997) p. 504. [3] M. Hillery, V. Buzk and A. Berthiaume, Phys. Rev. A 59, 1829 (1999). [4] R. Cleve, D. Gottesman and H. K. Lo, Phys. Rev. Lett. 83, 648 (1999). [5] A. Karlsson, M. Koashi and N. Imoto, Phys. Rev. A 59, 162 (1999). [6] D. Gottesman, Phys. Rev. A 61, 042311 (2000). [7] S. Bandyopadhyay, Phys. Rev. A 62, 012308 (2000). [8] W. Tittel, H. Zbinden and N. Gisin, Phys. Rev. A 63, 042301 (2001). [9] V. Karimipour and A. Bahraminasab, Phys. Rev. A 65, 042320 (2002). [10] H. F. Chau, Phys. Rev. A 66, 060302 (2002). [11] S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003).

6 [12] L. Y. Hsu, Phys. Rev. A 68, 022306 (2003). [13] G. P. Guo and G. C. Guo, Phys. Lett. A 310, 247 (2003). [14] L. Xiao, G. L. Long, F. G. Deng and J. W. Pan, Phys. Rev. A 69, 052307 (2004). [15] Y. M. Li, K. S. Zhang and K. C. Peng, Phys. Lett. A 324, 420 (2004). [16] A. M. Lance, T. Symul, W. P. Bowen, B. C. Sanders and P. K. Lam, Phys. Rev. Lett. 92, 177903 (2004). [17] F. G. Deng and G. L. Long, Phys. Rev. A 69, 052319 (2004). [18]Z. X. Man, Z. J. Zhang and Y. Li, Chin. Phys. Lett. 22, 18 (2005). [19] C. H. Bennett, G. Brassard C. Crepeau, R. Jozsa, A. Peres and W. K. Wotters, Phys. Rev. Lett. 70, 1895 (1993). [20] C. H. Bennett, G. Brassard and N. D. Mermin, Phys. Rev. Lett. 68, 557 (1992). [21] H. Inamori, L. Rallan and V. Verdral, J. Phy. A 34, 6913 (2001). [22] G. L. Long and X. S. Liu, Phys. Rev. A 65, 032302 (2002). [23] E. Waks, A. Zeevi and Y. Yamamoto, Phys. Rev. A 65, 052310 (2002). [24] F. G. Deng, G. L. Long and X. S. Liu, Phys. Rev. A 68, 042317 (2003). [25] Y. H. Kim, S. P. Kulik and Y. Shih, Phys. Rev. Lett. 86, 1370 (2001).