Quantum Secret Sharing via Cavity QED
- PDF / 222,433 Bytes
- 5 Pages / 439.37 x 666.142 pts Page_size
- 61 Downloads / 221 Views
Quantum Secret Sharing via Cavity QED Lu Yin-Ju 1 Received: 16 June 2020 / Accepted: 3 September 2020/ # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
A novel quantum secret sharing (QSS) protocol is suggested by utilizing the evolution law of atom via cavity quantum electrodynamics (QED) in this paper. It employs twoatom product states rather than entangled states as the initial quantum resource, and adopts single-atom measurements rather than two-atom or multiple-atom joint measurements. It needs neither the unitary operations nor the quantum entanglement swapping. It can resist both the outside attack and the participant attack. Keywords Quantum secret sharing (QSS) . Cavity quantum electrodynamics (QED) . Participant attack
1 Introduction Suppose that the company boss has a secrecy, who dosen’t want any of his employees to entirely know his secrecy. Hence, he splits his secrecy into many pieces and makes each employee only know one piece. Only when all employees cooperate together can they totally restore his secrecy. This is the typical application of secret sharing. After quantum cryptography was first invented by Bennett and Brassard [1] in 1984, classical secret sharing was quickly combined with quantum mechanics so that quantum secret sharing (QSS) was born accordingly. QSS can be regarded as the generalization of classical secret sharing into the realm of quantum mechanics. Until now, QSS has gained considerable developments so that many QSS protocols have been designed from different viewpoints [2–6]. For example, Qin and Dai [7] constructed a proactive QSS scheme; Qin and Tso [8] put forward an efficient QSS scheme based on special multi-dimensional GHZ state; Kang et al. [9] put forward a continuous variable QSS scheme with Chinese Remainder Theorem; Liu et al. [10] proposed a QSS scheme with verifiable function; Lai et al. [11] proposed a high-capacity (2,3) threshold QSS scheme based on asymmetric quantum lossy channels; Sutradhar and Om
* Lu Yin-Ju [email protected]
1
College of Information and Engineering, Zhengzhou Institute of Technology, Zhengzhou 450044 Henan, China
International Journal of Theoretical Physics
[12] suggested an efficient QSS scheme without a trusted player. However, a lot of QSS protocols are only theoretical ones and do not consider the practical physical environment. As for the practical physical systems for accomplishing quantum information processing tasks, there are cavity quantum electrodynamics (QED), ion trap, nuclear magnetic resonance, quantum dot, etc. Among them, cavity QED can keep a high level of coherence so that it has become one of the most promising experimental physical systems. [13] Based on the above analysis, this paper concentrates on designing a novel QSS protocol working with cavity QED. The rest of this paper is arranged as follows: Section 2 describes the proposed QSS protocol via cavity QED; Section 3 analyzes its security; and finally, Section 4 gives the conclusion.
2 The Proposed QSS Protocol Via Cavity QE
Data Loading...