周睿雅, 郑润芃, 孙莹, 刘昂. 一种新型量子秘密共享方案[J]. 北京电子科技学院学报, 2025, 33(2): 21-30.
    引用本文: 周睿雅, 郑润芃, 孙莹, 刘昂. 一种新型量子秘密共享方案[J]. 北京电子科技学院学报, 2025, 33(2): 21-30.
    ZHOU Ruiya, ZHENG Runpeng, SUN Ying, LIU Ang. A Novel Quantum Secret Sharing Scheme[J]. Journal of Beijing Electronic Science and Technology Institute, 2025, 33(2): 21-30.
    Citation: ZHOU Ruiya, ZHENG Runpeng, SUN Ying, LIU Ang. A Novel Quantum Secret Sharing Scheme[J]. Journal of Beijing Electronic Science and Technology Institute, 2025, 33(2): 21-30.

    一种新型量子秘密共享方案

    A Novel Quantum Secret Sharing Scheme

    • 摘要: 本文基于星型簇态的高度纠缠性和灵活拓扑结构设计了一种新型量子秘密共享方案,通过量子信道和经典信道的结合,确保秘密信息在多方之间的安全传输,实现了经典秘密和量子秘密的安全共享。在经典秘密共享方面,方案通过Pauli-Z和Pauli-X测量生成子密钥,并通过异或操作生成加密密钥,确保只有所有代理合作才能恢复明文。在量子秘密共享方面,方案通过Bell基测量和局域量子操作,确保只有指定的代理能够恢复出原始的量子态。该方案的创新之处在于支持多比特的扩展共享,进一步提高了系统的可扩展性;同时,该方案可在量子信道中根据实际应用需求对网络中的用户端实施增加或删除操作,增强了方案的灵活性。分析表明,该方案能够有效抵御非法窃听者的拦截-重发攻击和纠缠-测量攻击,同时也能避免合法参与者的共谋攻击。

       

      Abstract: Based on strong entanglement and flexible topological structure of the star cluster state, a novel quantum secret sharing scheme is designed in this paper, which ensures secure transmission of secret information among multiple parties by combining the quantum channel with the classical channel, achieving secure sharing of both classical and quantum secrets. In classical secret sharing, sub-keys are generated through Pauli-Z and Pauli-X measurements and an encryption key is produced through XOR operations, ensuring that the plaintext can be recovered only when all agents cooperate. In quantum secret sharing, Bell basis measurements and local quantum operations are utilized to ensure that only designated agents can reconstruct the original quantum state. The innovation of this scheme is the ability to support multi-bit extended sharing to further enhance the system scalability. Meanwhile, this scheme allows for addition or removal of network users according to practical application requirements in the quantum channels, improving the flexibility. Analysis shows that the proposed scheme can effectively resist the interception-resend attack and the entanglement-measurement attack from unauthorized eavesdroppers, as well as prevent the collusion attack from legitimate participants.

       

    /

    返回文章
    返回