Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Revtex, 7 pages, 3 figures; Introduction modified

Scientific paper

10.1103/PhysRevA.76.062324

The participant attack is the most serious threat for quantum secret-sharing protocols. We present a method to analyze the security of quantum secret-sharing protocols against this kind of attack taking the scheme of Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59 1829 (1999)] as an example. By distinguishing between two mixed states, we derive the necessary and sufficient conditions under which a dishonest participant can attain all the information without introducing any error, which shows that the HBB protocol is insecure against dishonest participants. It is easy to verify that the attack scheme of Karlsson, Koashi, and Imoto [Phys. Rev. A 59, 162 (1999)] is a special example of our results. To demonstrate our results further, we construct an explicit attack scheme according to the necessary and sufficient conditions. Our work completes the security analysis of the HBB protocol, and the method presented may be useful for the analysis of other similar protocols.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-159490

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.