A secure rational quantum state sharing protocol.doc
《A secure rational quantum state sharing protocol.doc》由会员分享,可在线阅读,更多相关《A secure rational quantum state sharing protocol.doc(13页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、SCIENCE CHINA Information Sciences . RESEARCH PAPER . February 2018, Vol. 61 022501:1022501:12 doi: 10.1007/s11432-016-9151-x A secure rational quantum state sharing protocol Zhao DOU , Gang XU 1 1,2 , Xiu-Bo CHEN 1,5* , Xin LIU 3,4 & Yi-Xian YANG 4 2 Information Security Center, State Key Laborator
2、y of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China; School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China; 3School of Computer Science, Shaanxi Normal University, Xian 710062, China;
3、School of Information Engineering, Inner Mongolia University of Science and Technology, Baotou 014010, China; 5GuiZhou University, Guizhou Provincial Key Laboratory of Public Big Data, Guiyang 550025, China Received 11 December 2016/Accepted 16 January 2017/Published online 28 September 2017 Abstrac
4、t A novel rational protocol to share two arbitrary qubits among multiple parties is investigated in this paper. First, the protocol is presented, which is learned from Li et al.s protocol. Second, the utility, security, correctness, fairness, Nash equilibrium, and Pareto optimality of our scheme are
5、 discussed in detail, where the utility, correctness, and fairness of rational quantum state sharing protocols are creatively given because the agent who recovers the state plays a dierent and more important role. Another important point is that assumptions about our protocol are more practical and
6、suitable than existing protocols. Keywords rational, quantum state sharing, Nash equilibrium, secure, correct Citation Dou Z, Xu G, Chen X-B, et al. A secure rational quantum state sharing protocol. Sci China Inf Sci, 2018, 61(2): 022501, doi: 10.1007/s11432-016-9151-x 1 Introduction In the secret s
7、haring (SS) problem, there exists a dealer Alice and some agents Bobi. Alice owns a secret or some bits, which are split by her a nd shared by all the agents. Since the secret is fatal, Alice will send part of it to each a gent, instea d of the integrated secret. Only sucient agents can recover the
8、secret with the help of each other. This problem was rst investigated by Shamir 1 and Blakley 2 in 1979. The quantum secret sharing (QSS) protocol is the quantum version so lution of the SS problem. Quantum mechanics was introduced to ensure the unconditional security of the protocol 3, 4. In 1999,
9、Hillery et al. 5 proposed a QSS scheme with the Greenberger-Horne-Zeilinger (GHZ) state. At the same time, Cleve et al. 6 studied how to share quantum information (a quantum secret), instead of classical bits, among dierent agents. This kind of protocol is called quantum state sharing (QSTS). Owing
10、to the quantum no-cloning principle 7, an unknown quantum state cannot be copied as several ones. Only one agent, who is named Bobk or Cha rlie, can obtain the state with the help of the others. In 2004, Li et al. 8 proposed a QSTS protocol to share a n arbitrary unknown qubit via sharing Bell sta t
11、es and multi-particle GHZ basis measurement. Lance et al. 9 investigated a (2, 3) threshold quantum state sharing scheme in the same year. They demonstrated that average delity is equal to 0.730.04. In 2 005, Deng et al. 10 proposed a multi-party controlled scheme to teleport an arbitrary two-partic
12、le state. In this scheme, a three-particle GHZ state were utilized as the quantum resource. Actually, most * Corresponding author (email: ) c Science China Press and Springer-Verlag Berlin Heidelberg 2017 1 1,5 Dou Z, et al. Sci China Inf Sci February 2018 Vol. 61 022501:2 controlled teleportation
13、could be regarded as a QSTS protocol with or without a little mo dication 11. The same is true of Deng et al.s scheme 10. After that, Li et al. 11 simplied the process of this scheme. Pa rticipants in 11, do not need to perform multi-party entanglement measurement or two- qubit joint operation, whic
14、h makes their protocol ea sier to implement. They also expanded the scheme to a multi-particle version to extend its use. Later, Muralidharan and Panigrahi 12 designed a perfect QSTS pro to col to sha re arbitrary single- and two-qubit states via maximally entangled ve-qubit states. To complete the
15、task, multi-particle measurements are needed. Recently, Li et al. 13 investigated how to share an arbitrary two-qubit state by using a cluster sta te and a Bell state. There are two agents in this scheme. Security analysis shows that it is safe. In addition, the deterministic QSTS in cavity quantum
16、electrodynamics was investigated. Halpern and Teague 14 considered a rational classical SS protocol in 2004. Rational players are not supposed to be honest or malicious. On the contrary, they only pay attention to their own benet, and make decisions to maximize it. They will cooperate with others or
17、 not depending on which choice is more advantageous for themselves. Another all-importa nt standpoint is that no rationa l multi-party computa tion proto col ca n be accomplished in a deterministic time 14. In the view of assumption a bout players, we rechecked all the above QSTS protocols 6, 8 12,
18、and found that agents are supposed to accomplish the sharing faithfully even if they are malicious. Indeed, the same assumption also holds in the general case. We do not think this is reasonable enough. Players actually will also have incentive to obstruct the accomplishment of sharing if they can b
19、enet more. Maitra et al. 15 investigated the rational QSTS scheme for the rst time in 2015. The state is enco ded by CSS code. A (3, 7) rational QSTS scheme was investigated rst. In this scheme, the dealer is semi-oine. The generation to a (t, n) version scheme was given second. Correctness, fairnes
20、s, and the existence of Nash equilibrium were analyzed. A (t, n) QSTS proto col with the oine dealer and the corresponding ana lysis were also described. Another important assumption is whether the dealer knows the information about the state or not. In Maitra et al.s protocol 15, the dealer does kn
21、ow, so she can copy the state and distribute the same particles to dierent agents. In addition, t agents can obtain the state simultaneously. However, it makes the protocol more like a remote state preparing (RSP) protocol, instead of the QSTS. In g eneral, the dealer do es not know the state, much
22、less copy it. Only one agent can recover the state accordingly. The general case is more reasonable indeed. The third assumption of a protocol is whether the setting of agents is Byzantine or fail-stop. In the fail- stop setting, a player will o nly fulll his duty or drop out, depending on which cho
23、ice is more benecial. In contrast, a Byzantine agent may deviate from the protocol, such as sending false bits. It is evident that Byzantine agents are more practical and harder to investigate. In this paper, we follow the work of Li et al. 11 and Maitra et al. 15, and design a novel rational QSTS p
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- secure rational quantum state sharing protocol
链接地址:https://www.taowenge.com/p-19448.html
限制150内