Next Article in Journal
Senses along Which the Entropy Sq Is Unique
Next Article in Special Issue
Nontraditional Deterministic Remote State Preparation Using a Non-Maximally Entangled Channel without Additional Quantum Resources
Previous Article in Journal
Amplitude Constrained Vector Gaussian Wiretap Channel: Properties of the Secrecy-Capacity-Achieving Input Distribution
Previous Article in Special Issue
Entanglement Purification for Logic-Qubit of Photon System Based on Parity Check Measurement Gate
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity

1
College of Information and Control Engineering, Xi’an University of Architecture and Technology, Xi’an 710055, China
2
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(5), 742; https://doi.org/10.3390/e25050742
Submission received: 9 March 2023 / Revised: 16 April 2023 / Accepted: 25 April 2023 / Published: 30 April 2023
(This article belongs to the Special Issue New Advances in Quantum Communication and Networks)

Abstract

:
Semi-quantum cryptography communication stipulates that the quantum user has complete quantum capabilities, and the classical user has limited quantum capabilities, only being able to perform the following operations: (1) measuring and preparing qubits with a Z basis and (2) returning qubits without any processing. Secret sharing requires participants to work together to obtain complete secret information, which ensures the security of the secret information. In the semi-quantum secret sharing (SQSS) protocol, the quantum user Alice divides the secret information into two parts and gives them to two classical participants. Only when they cooperate can they obtain Alice’s original secret information. The quantum states with multiple degrees of freedom (DoFs) are defined as hyper-entangled states. Based on the hyper-entangled single-photon states, an efficient SQSS protocol is proposed. The security analysis proves that the protocol can effectively resist well-known attacks. Compared with the existing protocols, this protocol uses hyper-entangled states to expand the channel capacity. The transmission efficiency is 100% higher than that of single-degree-of-freedom (DoF) single-photon states, providing an innovative scheme for the design of the SQSS protocol in quantum communication networks. This research also provides a theoretical basis for the practical application of semi-quantum cryptography communication.

1. Introduction

The core idea of secret sharing is that the secret holder appropriately divides a piece of complete secret information into several parts, leaving these parts of the secret information to different participants for safekeeping [1]. A single participant or part cannot obtain adequate secret information. Only when all participants cooperate can complete secret information be recovered. Secret sharing achieves decentralized management of secret information and plays a role in reducing the risk of eavesdropping and tolerating some attacks and errors [2]. Moreover, the secret sharing protocol is vital in practical applications such as key agreement, secure multi-party computing, and voting systems [3,4]. Based on the excellent characteristics of quantum mechanics, such as non-cloning, quantum cryptography theoretically provides a scheme for designing protocols with unconditional security [5,6]. It can also detect whether there is eavesdropping in the communication process. The concept of quantum cryptography was proposed in 1984 [7], when Bennett and Brassard designed the first quantum key distribution (QKD) protocol using non-orthogonal quantum states and the uncertainty principle. The protocol only needs to use a single particle state, which is easy to implement, and its security has been strictly proven. As a popular cryptography technology, quantum cryptography has received extensive attention and in-depth research [8,9,10]. The quantum secret sharing (QSS) protocol is an essential branch of the quantum cryptography protocol, which can be used to share confidential information between multiple participants. In 1999, Hilllery et al. studied the QSS protocol based on the Greenberger–Horne–Zeiligner (GHZ) states for the first time [11] and proposed a protocol for sharing classical secret and quantum secret information. Later, many scholars joined the research of QSS [12,13,14].
However, people’s research on quantum information technology is still in its infancy. Quantum communication, quantum computing, and other technologies are more complex and challenging to apply in current science and technology, work, and life [15,16]. Moreover, quantum devices have high prices and complex operations, and quantum state preparation, storage, and transmission are also extremely complex. The proposal of semi-quantum cryptography effectively alleviates the bottleneck in the development of quantum cryptography. This is relatively easier to realize while ensuring security. The semi-quantum key distribution (SQKD) protocol allows one party to have the full quantum capability, while the other party’s quantum capability is limited to achieve secure communication between a quantum user and a “classical user” [17]. Semi-quantum cryptography has attracted the attention of many scholars and is one of the emerging research hotspots in quantum cryptography [18,19,20,21,22,23,24,25,26]. In semi-quantum cryptography, some users can only hold simple quantum devices, saving the high cost of purchasing quantum devices. Some users can prepare quantum states without the need to prepare quantum states or by only using the computational basis (Z basis), which reduces the complexity of preparing quantum states. Especially in case of equipment failure in the quantum cryptography communication process, users can choose to switch the quantum cryptography communication mode to a semi-quantum cryptography communication mode to ensure the completion of the whole communication process.
In 2010, using the concept of “semi-quantum”, Li et al. proposed two SQSS protocols for the first time [27]. Subsequently, this attracted a large number of scholars to study SQSS. In 2013, Li et al. considered it difficult to prepare entangled states in practice and designed a more realistic SQSS protocol based on the product states [28]. Xie et al. used two entangled states to encode messages for SQSS [29] and realized the direct sharing of secret information in 2015. Based on the Bell states, efficient SQSS was proposed by Yin et al. in 2017 [30]. The next year, Li et al. proposed an SQSS protocol which enables the sharing of secret information without the participants making any measurement operations [31]. In 2019, Xiang et al. presented a new SQSS scheme based on multi-level quantum systems which can share a large amount of information of the third and fourth levels with the same security [32]. Tsai et al., based on the W state, proposed a three-party SQSS protocol [33]. In 2021, Tian et al. constructed a new SQSS protocol which can share specific secret information and is more efficient than similar protocols [34]. An SQSS protocol for high-dimensional quantum systems based on product states was proposed in the context of the qualifications of Hu et al. in 2022 [35]. It is easy to find that the existing SQSS protocols focus on using the characteristics of different qubits to design different protocols, and all SQSS protocol quantum carriers are only in one DoF. Therefore, this paper, based on hyper-entangled states, implements a new SQSS protocol for the first time: the transmission particles in polarization and spatial mode DoFs.
As a carrier of quantum information, photons can not only become entangled in a single DoF, such as polarization, path, or spatial mode, but also realize entanglement in multiple DoFs at the same time, which is called hyper-entanglement [36,37]. Compared with a single DoF, photons in multiple DoFs have many advantages: they can achieve more effective state measurements, build an asymmetric optical quantum network, improve the channel capacity of the quantum network, and also contribute to the physical realization of quantum purification and quantum computation. In recent years, research on hyper-entangled states has become a hot topic in the field of quantum information, and many significant advances have been made, such as the preparation of hyper-entangled states and multi-DoF teleportation based on hyper-entangled states.
In this paper, we employ the unique advantages of hyper-entangled states to construct a novel SQSS protocol based on hyper-entangled single-photon states. The hyper-entangled state improves the communication capacity, and the amount of information that the proposed protocol can share in one communication process is twice that of the single-DoF protocols. In addition, we analyze three attack strategies—intercept-resend attack, measure-resend attack, and entangle-measure attack—and prove that the proposed protocol can effectively resist well-known attacks. Table 1 lists all explanations of acronyms and symbols used in the paper.
The structure of this paper is as follows: Section 2 describes the proposed SQSS protocol, Section 3 analyzes the security of three attacks, and Section 4 discusses and concludes this paper.

2. Protocol

Generally, the N hyper-entangled single-photon states in polarization and spatial mode DoFs can be represented by
| Π P S = | δ P A B Z | δ S A B Z ,
where the subscript A B Z denotes the N photons, P denotes the polarization DoF, and S denotes the spatial-mode DoF. There are two non-orthogonal measure bases in the polarization DoF: the basis Z P = { | H , | V } and X P = { | R , | A } . Here, we have
| R P = | H + | V 2 ,
| A P = | H | V 2 ,
where | H and | V indicate the horizontal and vertical polarizations. There are two non-orthogonal measure bases in the spatial mode DoF: the basis Z S = { | x 1 , | x 2 } and X S = { | a , | b } . Here, we have
| a S = | x 1 + | x 2 2 ,
| b S = | x 1 | x 2 2 ,
where | x 1 and | x 2 indicate the upper and the lower spatial modes, respectively.
There are N single photons in the polarization DoF, which can be described as
| δ P A B Z = ( | H ± | V 2 ) A ( | H ± | V 2 ) B ( | H ± | V 2 ) Z .
There are N single photons in the spatial mode DoF, which can be described as
| δ S A B Z = ( | x 1 ± | x 2 2 ) A ( | x 1 ± | x 2 2 ) B ( | x 1 ± | x 2 2 ) Z .
We set N = 2 , and the hyper-entangled single-photon states are
| Γ P S = | γ P | γ S = | R P | R P | a S | a S = | H + | V 2 | H + | V 2 | x 1 + | x 2 2 | x 1 + | x 2 2 .
The three-party SQSS protocol based on hyper-entangled single-photon states is presented in detail. Alice, as the holder of the secret information, plans to share the secret with two classical participants: Bob and Charlie. Here, Alice is a quantum user who has full quantum capabilities. She can generate and measure qubits with any basis. Bob (Charlie) is a classical user whose quantum capabilities are restricted. He can only use the Z basis to generate and measure qubits. The processing of the proposed protocol is as follows:
Step 1: Carrier preparation and transmission. Alice generates n two-qubit product hyper-entangled states | Γ P S :
| Γ P S = | γ P B C | γ S B C = | R P B | R P C | a S B | a S C = | H B + | V B 2 | H C + | V C 2 | x 1 B + | x 2 B 2 | x 1 C + | x 2 C 2 ,
where B and C denote the system of the two participants: Bob and Charlie, respectively. Alice forms a quantum sequence S using | Γ P S :
S = { [ | R P | a S ( B ) , | R P | a S ( C ) ] 1 , [ | R P | a S ( B ) , | R P | a S ( C ) ] 2 , , [ | R P | a S ( B ) , | R P | a S ( C ) ] n } .
Then, Alice divides the sequence S into sequences S B and S C :
S B = { [ | R P | a S ( B ) ] 1 , [ | R P | a S ( B ) ] 2 , , [ | R P | a S ( B ) ] n } ,
S C = { [ | R P | a S ( C ) ] 1 , [ | R P | a S ( C ) ] 2 , , [ | R P | a S ( C ) ] n } ,
Alice then sends S B to Bob and S C to Charlie.
Step 2: Bob and Charlie’s operations. When Bob (Charlie) receives the sequence S B ( S C ), Bob (Charlie) randomly chooses the SIFT or CTRL operation. The SIFT operation means the participant measures the qubits with the Z basis, prepares fresh qubits with the same measurements with the Z basis, and sends them to Alice. The CTRL operation means the participant reflects the qubits to Alice without disturbance.
Step 3: Alice, Bob, and Charlie’s publication. For the last qubits arriving from Bob and Charlie, Alice broadcasts that the sequences S B and S C have been received. After acknowledgment, Bob and Charlie announce the certain operation, SIFT or CTRL, which has been chosen for each qubit.
Step 4: Alice’s operations. According to Bob’s (Charlie’s) choice, Alice divides the corresponding qubits into the following four cases. The four cases as illustrated in Table 2 and depend on the different operations which Bob and Charlie performed. In case 1, Bob and Charlie chose SIFT, and Alice measured the qubits B and C with Z P Z S . In case 2, Bob chose SIFT and Charlie chose CTRL, while Alice measured the qubits B with Z P Z S and the qubits C with X P X S . In case 3, Bob chose CTRL and Charlie chose SIFT, while Alice measured the qubits B with X P X S and the qubits C with Z P Z S . In case 4, Bob and Charlie chose CTRL, and Alice measured the qubits B and C with X P X S . Case 1 was used for generating the raw keys and checking for eavesdropping, while cases 2, 3, and 4 were used for checking for eavesdropping.
Step 5: First eavesdropping detection. Alice conducted eavesdropping detection in cases 2, 3, abd 4. Alice measured the measured qubits with Z P Z S and measured the reflected qubits with X P X S . For example, in case 2, Alice would measure the qubits C with X P X S , which were reflected by Charlie. If there was no eavesdropper, then the measurement results should be same as in the initial state which she prepared. Alice would measure the qubits B with Z P Z S , which were measured by Bob, and she would inform Bob to publish his measurement results. If there was no eavesdropper, then the measurement results should be the same between Alice and Bob. Similarly, Alice would have the same operations for eavesdropping as in case 3. In case 4, Alice would measure the qubits B and C with X P X S , and the measurement results should be same as the initial state which was prepared by her; otherwise, there was an eavesdropper present. If the error rate is higher than the predefined threshold values, then Alice terminates the protocol. The details of the security analysis will be provided in the next section.
Step 6: Second eavesdropping detection. Alice randomly selects a few qubits which belong to case 1 to be TEST bits and announces the states and corresponding positions. Bob and Charlie compare the states with their qubits. Alice and Bob (Charlie) should have the same measurement results. If the error rates exceed the threshold values, then the protocol aborts.
Step 7: Secret sharing. The remaining qubits in case 1 are INFO bits. Because of the hyper-entangled states in polarization and spatial mode DoFs, one participant’s operations on one qubit position can share two keys. Secret information 1 and 2 are encoded by Alice as given in Table 3. K A , K B , and K C are the results measured by Alice, Bob, and Charlie in case 1, respectively. Presume that K A is the secret bits, and Alice encodes K A as
K A K B K C .
Only Bob and Charlie’s colleagues can obtain the secret information.

3. Security Analysis

Suppose that an eavesdropper wants to obtain Alice’s secret information through illegal means. He will take specific means to eavesdrop on the participants’ keys. Generally, when analyzing the security of the SQSS protocol, a dishonest participant (Bob or Charlie) causes more serious harm than external eavesdroppers because they have already obtained one part of the secret information and only need to steal the secret information of another participant. They can obtain Alice’s secret information alone. Therefore, the security analysis of the proposed protocol mainly focuses on malicious participants. Assuming that Bob is a malicious participant, he uses the following attack strategies to steal Charlie’s keys and finally obtains Alice’s secret information.
Measure-resend attack. To obtain Charlie’s secret keys, Bob uses the measure-resend attack strategy. When Alice sends S C to Charlie, Bob first intercepts the sequence, measures the qubits using the Z P Z S basis, and stores the measurement results. Then, Bob prepares a new sequence S E with Z P Z S , which is the same state as the previous sequence measured by him. If Alice and Charlie do not detect Bob’s attack, then Bob will obtain the corresponding Charlie secret keys according to his measurement results. Unfortunately, Bob’s eavesdropping can be detected through eavesdropping detection in cases 2 and 4 under step 5 because Bob cannot distinguish which operation Charlie will choose for the specific qubits. When Bob measured [ | R P | a S ( C ) ] i , where Charlie chose the SIFT operation on [ | R P | a S ( C ) ] i , he could successfully obtain Charlie’s secret keys and combine his secret keys to calculate Alice’s secret information. Although such behavior will not introduce any errors, once Charlie selects the CTRL operation, Alice will have a chance of half to detect the errors introduced by Bob when performing eavesdropping detection. Specifically, with Alice using the X P X S basis to measure the qubits prepared by Bob, the measurement results may occur as one of four results: { [ | R P | a S ( C ) ] i , [ | R P | b S ( C ) ] i , [ | A P | a S ( C ) ] i , and [ | A P | b S ( C ) ] i } . Thus, the error rate introduced by Bob can be calculated as r 1 = 1 2 × 3 4 = 3 8 , and he can eavesdrop the probability of 5 8 . The detection probability for the presented SQSS protocol is p 1 = 1 ( 5 8 ) t . If t is large enough, then the detection probability will be toward one.
Intercept-resend attack. Bob employs the intercept-resend attack strategy to steal Charlie’s secret keys. First, Bob intercepts the sequence S C and sends a fake sequence S E with Z P Z S or X P X S to Charlie. Then, Charlie sends back S E to Alice. Bob intercepts S E and sends S C to Alice. Unfortunately, Bob will inevitably be detected. When Charlie chose the CTRL operation, there was no error introduced by Bob. However, there was a possibility of a half that Charlie chose the SIFT operation. In the case where Charlie chose SIFT, Bob would be detected in cases 1 and 3 under step 5. Specifically, Alice used the Z P Z S basis to measure the qubits returned by Bob. The measurement results may occur as one of four results: { [ | x 1 P | x 1 S ( C ) ] i , [ | x 1 P | x 2 S ( C ) ] i , [ | x 2 P | x 1 S ( C ) ] i , and [ | x 2 P | x 2 S ( C ) ] i } . Thus, the error rate introduced by Bob can be calculated as r 2 = 1 2 × 3 4 = 3 8 . He can eavesdrop with a probability of 5 8 . When t is large enough, the detection probability of p 2 = 1 ( 5 8 ) t will approximately be one for the presented SQSS protocol.
Entangle-measure attack. Bob’s most general attack is the measure-entangle attack, which is composed of two unitary operations: U ¯ E attacking qubits when Alice sends information to Charlie and U ¯ F attacking qubits when Charlie sends information to Alice.
Theorem 1.
Suppose that Bob uses an attack ( U ¯ E , U ¯ F ) on the qubits from Alice to Charlie and from Charlie back to Alice. Furthermore, the final probes should be independent of Charlie’s measurement results to not induce any error. Hence, Bob cannot obtain any information on the secret keys.
Proof. 
Before Bob’s attack, the qubits are | R P | a S , and the ancillary qubit is | e . After U ¯ E , the state evolves into
U ¯ E ( | R P | a S ) | e = | H x 1 | e H x 1 + | H x 2 | e H x 2 + | V x 1 | e V x 1 + | V x 2 | e V x 2 ,
where | e H x 1 , | e H x 2 , | e V x 1 , and | e V x 2 are the unnormalized states of Eve’s probes. □
When Charlie receives the qubits, he selects the SIFT operation or CTRL operation. Subsequently, Bob performs U ¯ F on the state.
Charlie selects the SIFT operation. The global state is collapsed into one of four states: | H x 1 | e H x 1 , | H x 2 | e H x 2 , | V x 1 | e V x 1 , and | V x 2 | e V x 2 . If Bob wants no error to be introduced, then after U ¯ F , there are
U ¯ F ( | H x 1 | e H x 1 ) = | H x 1 | f H x 1 ,
U ¯ F ( | H x 2 | e H x 2 ) = | H x 2 | f H x 2 ,
U ¯ F ( | V x 1 | e V x 1 ) = | V x 1 | f V x 1 ,
U ¯ F ( | V x 2 | e V x 2 ) = | V x 2 | f V x 2 .
Charlie selects the CTRL operation. The global state should be unchanged:
U ¯ F ( H x 1 | e H x 1 + | H x 2 | e H x 2 + | V x 1 | e V x 1 + | V x 2 | e V x 2 ) = | H x 1 | f H x 1 + | H x 2 | f H x 2 + | V x 1 | f V x 1 + | V x 2 | f V x 2 ,
According to the protocol, if there is no error introduced, then from Equation (19), it must hold that
| f H x 1 = | f H x 2 = | f V x 1 = | f V x 2 = | f .
According to Equation (20), Equations (15)–(18) can be deduced:
U ¯ F ( | H x 1 | e H x 1 ) = | H x 1 | f H x 1 = | H x 1 | f ,
U ¯ F ( | H x 2 | e H x 2 ) = | H x 2 | f H x 2 = | H x 2 | f ,
U ¯ F ( | V x 1 | e V x 1 ) = | V x 1 | f V x 1 = | V x 1 | f ,
U ¯ F ( | V x 2 | e V x 2 ) = | V x 2 | f V x 2 = | V x 2 | f .
To avoid introducing errors during Alice’s eavesdropping detection, the final state of Bob’s probes should be independent of Charlie’s measurement results. Theorem 1 has been proven by the above methods.

4. Discussion and Conclusions

Now, we discuss the differences between our proposed protocol and the existing SQSS protocol. Obviously, compared with the previous SQSS protocol, the proposed protocol features the use of hyper-entangled states in two DoFs, which improves the communication capacity of the protocol. The qubit efficiency can be defined as η = b q [38], where b denotes the total number of shared classical bits and q denotes the total number of prepared qubits in the protocol. Specific comparisons are given in Table 4.
The application research on multi-DoF quantum information has just started. The multi-DoF approach may give people more colorful content which differs from manipulating a single DoF. In this paper, by using hyper-entangled states as quantum transmission carriers, we proposed a semi-quantum secret-sharing protocol with high efficiency which solves the problem of only the cooperation of different participants being able to recover the key. The analysis results show that the protocol can detect well-known attacks, such as an intercept-resend attack, measure-resend attack, and entangle-measure attack, and thus the security is asymptotically secure in theory. More in-depth security analysis is needed in practice. Applying hyper-entangled states in quantum communication can improve the channel capacity and communication security, serve practical quantum communication networks, and promote the practical process of semi-quantum cryptography communication.

Author Contributions

This article was completed by six authors. The first author, Y.T. (Yuan Tian), was mainly responsible for the conceptualization and methodology and writing—original draft and editing. The second author, G.B., was mainly responsible for validation and writing—review. The third author, J.C., was mainly responsible for the investigation and formal analysis. The fourth author, Y.T. (Ying Tang), was mainly responsible for verification. The fifth author, J.L., was mainly responsible for supervision and funding acquisition. The sixth author, C.Y., was mainly responsible for visualization. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded the National Natural Science Foundation of China, grant numbers 61872284, 61671087, and 61962009.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We would like to thank the anonymous reviewers for their detailed review and valuable comments, which have enhanced the quality of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  2. Chandramouli, A.; Choudhury, A.; Patra, A. A Survey on Perfectly Secure Verifiable Secret-Sharing. ACM Comput. Surv. CSUR 2022, 54, 1–36. [Google Scholar] [CrossRef]
  3. Blanton, M.; Kang, A.; Yuan, C. Improved building blocks for secure multi-party computation based on secret sharing with honest majority. In Proceedings of the Applied Cryptography and Network Securit: 18th International Conference, ACNS 2020, Rome, Italy, 19–22 October 2020. [Google Scholar]
  4. Liu, Y.; Zhao, Q. E-voting scheme using secret sharing and K-anonymity. World Wide Web 2019, 22, 1657–1667. [Google Scholar] [CrossRef]
  5. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145. [Google Scholar] [CrossRef]
  6. Portmann, C.; Renner, R. Security in quantum cryptography. Rev. Mod. Phys. 2022, 94, 025008. [Google Scholar] [CrossRef]
  7. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 10–12 December 1984. [Google Scholar]
  8. Lo, H.K.; Curty, M.; Tamaki, K. Secure quantum key distribution. Nat. Photonics 2016, 8, 595–604. [Google Scholar] [CrossRef]
  9. Sun, Z.; Song, L.; Huang, Q.; Yin, L.; Long, G.; Lu, J.; Hanzo, L. Toward practical quantum secure direct communication: A quantum-memory-free protocol and code design. IEEE Trans. Commun. 2020, 68, 5778–5792. [Google Scholar] [CrossRef]
  10. Basso Basset, F.; Valeri, M.; Roccia, E.; Muredda, V.; Poderini, D.; Neuwirth, J.; Spagnolo, N.; Rota, M.B.; Carvacho, G.; Sciarrino, F.; et al. Quantum key distribution with entangled photons generated on demand by a quantum dot. Sci. Adv. 2021, 7, eabe6379. [Google Scholar] [CrossRef]
  11. Hillery, M.; Bužek, V. Berthiaume, Quantum secret sharing. Phys. Rev. A 1999, 59, 1829. [Google Scholar] [CrossRef]
  12. Williams, B.P.; Lukens, J.M.; Peters, N.A.; Qi, B.; Grice, W.P. Quantum secret sharing with polarization-entangled photon pairs. Phys. Rev. A 2019, 99, 062311. [Google Scholar] [CrossRef]
  13. Sutradhar, K.; Om, H. Efficient quantum secret sharing without a trusted player. Quantum Inf. Process. 2020, 19, 73. [Google Scholar] [CrossRef]
  14. Liao, Q.; Liu, H.; Zhu, L.; Guo, Y. Quantum secret sharing using discretely modulated coherent states. Phys. Rev. A 2021, 103, 032410. [Google Scholar] [CrossRef]
  15. Bennett, C.H.; Wiesner, S.J. Communication via one-and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 1992, 69, 2881. [Google Scholar] [CrossRef]
  16. Cirac, J.I. Quantum computing and simulation: Where we stand and what awaits US. Nanophotonics 2020, 10, 453–456. [Google Scholar] [CrossRef]
  17. Boyer, M.; Kenigsberg, D.; Mor, T. Quantum key distribution with classical Bob. In Proceedings of the 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM’07), Guadeloupe, France, 2–6 January 2007. [Google Scholar]
  18. Iqbal, H.; Krawec, W.O. Semi-quantum cryptography. Quantum Inf. Process. 2020, 19, 97. [Google Scholar] [CrossRef]
  19. Tian, Y.; Li, J.; Yuan, K.; Li, C.; Li, H.; Chen, X. An efficient semi-quantum key distribution protocol based on EPR and single-particle hybridization. Quantum Inf. Comput. 2021, 21, 563–576. [Google Scholar] [CrossRef]
  20. Tian, Y.; Li, J.; Ye, C.; Li, C. Multi-party semi-quantum key distribution protocol based on hyperentangled Bell states. Front. Phys. 2022, 10, 966. [Google Scholar] [CrossRef]
  21. Guskind, J.; Krawec, W.O. Mediated semi-quantum key distribution with improved efficiency. Quantum Sci. Technol. 2022, 7, 035019. [Google Scholar] [CrossRef]
  22. Jiang, L.Z. Semi-quantum private comparison based on Bell states. Quantum Inf. Process. 2020, 19, 180. [Google Scholar] [CrossRef]
  23. Lin, P.H.; Hwang, T.; Tsai, C.W. Efficient semi-quantum private comparison using single photons. Quantum Inf. Process. 2019, 18, 207. [Google Scholar] [CrossRef]
  24. Tian, Y.; Li, J.; Chen, X.B.; Ye, C.Q.; Li, C.Y.; Hou, Y.Y. An efficient semi-quantum private comparison without pre-shared keys. Quantum Inf. Process. 2021, 20, 360. [Google Scholar] [CrossRef]
  25. Zhou, N.R.; Zhu, K.N.; Bi, W.; Gong, L.H. Semi-quantum identification. Quantum Inf. Process. 2019, 18, 197. [Google Scholar] [CrossRef]
  26. Rong, Z.; Qiu, D.; Mateus, P.; Zou, X. Mediated semi-quantum secure direct communication. Quantum Inf. Process. 2021, 20, 58. [Google Scholar] [CrossRef]
  27. Li, Q.; Chan, W.H.; Long, D.Y. Semi-quantum secret sharing using entangled states. Phys. Rev. A 2010, 82, 022303. [Google Scholar] [CrossRef]
  28. Li, L.; Qiu, D.; Mateus, P. Quantum secret sharing with classical Bobs. J. Phys. Math. Theor. 2013, 46, 045304. [Google Scholar] [CrossRef]
  29. Xie, C.; Li, L.; Qiu, D. A novel semi-quantum secret sharing scheme of specific bits. Int. J. Theor. Phys. 2015, 54, 3819–3824. [Google Scholar] [CrossRef]
  30. Yin, A.; Wang, Z.; Fu, F. A novel semi-quantum secret sharing scheme based on Bell states. Mod. Phys. Lett. B 2017, 31, 1750150. [Google Scholar] [CrossRef]
  31. Li, Z.; Li, Q.; Liu, C.; Peng, Y.; Chan, W.H.; Li, L. Limited resource semiquantum secret sharing. Quantum Inf. Process. 2018, 17, 285. [Google Scholar] [CrossRef]
  32. Xiang, Y.; Liu, J.; Bai, M.Q.; Yang, X.; Mo, Z.W. Limited resource semi-quantum secret sharing based on multi-level systems. Int. J. Theor. Phys. 2019, 58, 2883–2892. [Google Scholar] [CrossRef]
  33. Tsai, C.W.; Yang, C.W.; Lee, N.Y. Semi-quantum secret sharing protocol using W-state. Mod. Phys. Lett. A 2019, 34, 1950213. [Google Scholar] [CrossRef]
  34. Tian, Y.; Li, J.; Chen, X.B.; Ye, C.Q.; Li, H.J. An efficient semi-quantum secret sharing protocol of specific bits. Quantum Inf. Process. 2021, 20, 217. [Google Scholar] [CrossRef]
  35. Hu, W.; Zhou, R.G.; Luo, J. Semi-quantum secret sharing in high-dimensional quantum system using product states. Chin. J. Phys. 2022, 77, 1701–1712. [Google Scholar] [CrossRef]
  36. Wang, X.L.; Cai, X.D.; Su, Z.E.; Chen, M.C.; Wu, D.; Li, L.; Liu, N.L.; Lu, C.Y.; Pan, J.W. Quantum teleportation of multiple degrees of freedom of a single photon. Nature 2015, 518, 516–519. [Google Scholar] [CrossRef]
  37. Ye, T.Y.; Li, H.K.; Hu, J.L. Semi-quantum key distribution with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 2020, 59, 2807–2815. [Google Scholar] [CrossRef]
  38. Cabello, A. Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 2000, 85, 5635. [Google Scholar] [CrossRef]
Table 1. Explanations of acronyms and symbols.
Table 1. Explanations of acronyms and symbols.
CaseBob’s Operation
QSSQuantum secret sharing
SQSSSemi-quantum secret sharing
DoFDegree of freedom
DoFsDegrees of freedom
QKDQuantum key distribution
SQKDSemi-quantum key distribution
SIFTMeasure and prepare the qubits with Z basis
CTRLReflect the qubits without disturbance
X_P(X_S)X basis under polarization DoF (spatial mode DoF)
Z_P(Z_S)Z basis under polarization DoF (spatial mode DoF)
K_AAlice’s secret bit
K_BBob’s secret bit
K_CCharlie’s secret bit
η Qubit efficency
Table 2. Participants’ operations on the qubits in each position.
Table 2. Participants’ operations on the qubits in each position.
CaseBob’s OperationCharlie’s OperationAlice’s OperationUsage
1SIFTSIFTMeasure the qubits B and C with
Z P Z S
Generate raw key, check for eavesdropping
2SIFTCTRLMeasure the qubits B with Z P Z S
and measure the qubits C with X P X S
Check for eavesdropping
3CTRLSIFTMeasure the qubits B with X P X S
and Measure the qubits C with
Z P Z S
Check for eavesdropping
4CTRLCTRLMeasure the qubits B and C with
X P X S
Check for eavesdropping
Table 3. The shared secret information between two participants from Alice.
Table 3. The shared secret information between two participants from Alice.
Secret Information 1 and 2Bob’s ResultsCharlie’s ResultsAlice’s Results
0 and 0 | 0 P | 0 S | 0 P | 0 S | 00 P | 00 S
0 and 1 | 0 P | 0 S | 0 P | 1 S | 00 P | 01 S
1 and 0 | 0 P | 0 S | 1 P | 0 S | 01 P | 00 S
1 and 1 | 0 P | 0 S | 1 P | 1 S | 01 P | 01 S
0 and 1 | 0 P | 1 S | 0 P | 0 S | 00 P | 10 S
0 and 0 | 0 P | 1 S | 0 P | 1 S | 00 P | 11 S
1 and 1 | 0 P | 1 S | 1 P | 0 S | 01 P | 10 S
1 and 0 | 0 P | 1 S | 1 P | 1 S | 01 P | 11 S
1 and 0 | 1 P | 0 S | 0 P | 0 S | 10 P | 00 S
1 and 1 | 1 P | 0 S | 0 P | 1 S | 10 P | 01 S
0 and 0 | 1 P | 0 S | 1 P | 0 S | 11 P | 00 S
0 and 1 | 1 P | 0 S | 1 P | 1 S | 11 P | 01 S
1 and 1 | 1 P | 1 S | 0 P | 0 S | 10 P | 10 S
1 and 0 | 1 P | 1 S | 0 P | 1 S | 10 P | 11 S
0 and 1 | 1 P | 1 S | 1 P | 0 S | 11 P | 10 S
0 and 0 | 1 P | 1 S | 1 P | 1 S | 11 P | 11 S
Table 4. SQSS protocol comparison.
Table 4. SQSS protocol comparison.
ReferenceQuantum SourceMeasurementDecoy PhotonsDoFSharing MessageQubit Effigency
[27]GHZ-type statesSingle qubit measurement, Bell measurement, three-qubit joint measurementNo1Unspecific 1 8
[28]Two-qubit product statesSingle qubit measurementNo1Unspecific 1 4
[29]Two entangled statesSingle qubit measurement, two-particle measurement, three-particle measurementNo1Specific 1 4
[30]Bell statesSingle qubit measurement, Bell measurementNo1Unspecific-
[31]Two-qubit product statesSingle qubit measurementNo1Unspecific 1 4
[32]Two-qubit product states-No1Unspecific 1 8
[33]W statesSingle qubit measurement, Bell measurementNo1Unspecific 1 8
[34]Bell statesSingle qubit measurement, Bell measurementYes1Specific< 1 2
[35]Product statesSingle qubit measurementNo1Unspecific 1 4
Proposed protocolTwo-qubit product hyper-entangled statesSingle hyper-entangled qubit measurementNo2Unspecific 1 2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Tian, Y.; Bian, G.; Chang, J.; Tang, Y.; Li, J.; Ye, C. A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity. Entropy 2023, 25, 742. https://doi.org/10.3390/e25050742

AMA Style

Tian Y, Bian G, Chang J, Tang Y, Li J, Ye C. A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity. Entropy. 2023; 25(5):742. https://doi.org/10.3390/e25050742

Chicago/Turabian Style

Tian, Yuan, Genqing Bian, Jinyong Chang, Ying Tang, Jian Li, and Chongqiang Ye. 2023. "A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity" Entropy 25, no. 5: 742. https://doi.org/10.3390/e25050742

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop