Abstract
An efficient quantum secret sharing scheme is proposed, in which the quantum state and the classical information can be shared simultaneously through only one distribution. The dealer uses the operations of quantum-controlled-not and Hadamard gate to encode the secret quantum state and classical information, and the participants use the single-particle measurements to recover the original quantum state and classical information. Compared to the existing schemes, our scheme is more efficient when the quantum state and the classical information need to be shared simultaneously.
Similar content being viewed by others
References
Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Blakley, G.R.: Safeguarding cryptographic keys. Proceedings of AFIPS National Computer Conference, New York, 313–317 (1979)
Ito, M., Saito, A., Nishizeki, T.: Secret sharing schemes realizing general access structure. Proceedings of IEEE Global Telecommunication Conference, New Jersey, 99–102 (1987)
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. CRYPTO’91. LNCS 576, 11–15 (1992)
Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or how to cope with perpetual leakage. CRYPTO’95. LNCS 963, 339–352 (1995)
Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 175–179 (1984)
Ekert, A.K.: Quantum cryptography based on Bells theorem. Phys. Rev. Lett 67, 661–663 (1991)
Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829–1834 (1999)
Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett 83, 648–651 (1999)
Tyc, T., Sanders, B.C.: How to share a continuous-variable quantum secret by optical interferometry. Phys. Rev. A 65, 042310 (2002)
Li, Q., Long, D.Y., Chan, W.H., Qiu, D.W.: Sharing a quantum secret without a trusted party. Quantum Inf. Process 10, 97–106 (2011)
Yang, Y.G., Teng, Y.W., Chai, H.P., Wen, Q.Y.: Verifiable quantum (k,n)-threshold secret key sharing. Int. J. Theor. Phys 50, 792–798 (2011)
Yang, Y.G., Jia, X., Wang, H.Y., Zhang, H.: Verifiable quantum (k, n)-threshold secret sharing. Quantum Inf. Process 11, 1619–1625 (2012)
Gao, G.: Secure multiparty quantum secret sharing with the collective eavesdropping-check character. Quantum Inf. Process 12, 55–68 (2013)
Chen, R.K., Zhang, Y.Y., Shi, J.H., Li, F.G.: A multiparty error-correcting method for quantum secret sharing. Quantum Inf. Process 13, 21–31 (2014)
Shi, R.H., Lv, G.L., Wang, Y., Huang, D.Z., Guo, Y.: On quantum secret sharing via Chinese remainder theorem with the non-maximally entanglement state analysis. Int. J. Theor. Phys 52, 539–548 (2013)
Hsu, J.L., Chong, S.K., Hwang, T., Tsai, C.W.: Dynamic quantum secret sharing. Quantum Inf. Process 12, 331–344 (2013)
Sarvepalli, P.: Nonthreshold quantum secret-sharing schemes in the graph-state forMalism. Phys. Rev. A 86, 042303 (2012)
Lau, H.K., Weedbrook, C.: Quantum secret sharing with continuous-variable cluster states. Phys. Rev. A 88, 042313 (2013)
Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. Proceedings of the 19th Annual ACM Symposium on Theory of Computing, New York, 427–437 (1987)
Liu, F., Qin, S.J., Wen, Q.Y.: A quantum secret-sharing protocol with fairness. Phys. Scripta 89, 075104 (2014)
Steane, A.: The ion trap quantum information processor. Appl. Phys. B 64, 623–643 (1997)
Sleator, T., Weinfurter, H.: Realizable universal quantum logic gates. Phys. Rev. Lett 74, 4087–4090 (1995)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Qin, H., Dai, Y. Sharing the Quantum State and the Classical Information Simultaneously. Int J Theor Phys 55, 3777–3787 (2016). https://doi.org/10.1007/s10773-016-3006-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-016-3006-y