Font Size: a A A

The Research Of Semi-quantum Secret Sharing Protocol

Posted on:2020-03-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y TongFull Text:PDF
GTID:2370330590952530Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Quantum cryptography is an emerging discipline formed by the combination of extension of classical cryptography and quantum mechanics.His research fields include Quantum Key Distribution(QKD),Quantum Teleportation(QT),and Quantum Secret Sharing(QSS).As an important branch of quantum cryptography,QSS is developing rapidly.It can effectively manage the keys.The basic principle is to divide the secret into several parts,so that each participant can only obtain the secret if they work together.Otherwise,no one participant can successfully infer the secret information separately.In 2010,Li et al.proposed the first semi-quantum secret sharing(SQSS)protocol,which takes up less quantum resources and is more efficient.Therefore,how to design a safe and effective SQSS solution is a hot issue at present.The main research results of this paper are as follows:(1)An SQSS protocol based on two-particle entangled state with non-fixed coefficients is proposed,which solves the security problem caused by statistical characteristics.This agreement can be extended to multiple participants.In the case that the current multi-quantum entangled state is very complicated to prepare and the preparation cost is high,this protocol can prepare entangled states with different coefficients by using two particles,and has high practicability.Compared with the existing solutions,the security is higher.(2)Based on the study of the application of Quantum Identity Authentication(QIA)by Hussein and Lin et al.,the SQSS protocol based on identity authentication is proposed.By adding identity authentication to the SQSS protocol,through analysis,this protocol can effectively resist all kinds of eavesdropping.
Keywords/Search Tags:cryptography, semi-quantum secret sharing, two-particle entanglement, identity authentication, security
PDF Full Text Request
Related items