Analysis of a kind of quantum cryptographic schemes based on secret sharing  被引量:8

Analysis of a kind of quantum cryptographic schemes based on secret sharing

在线阅读下载全文

作  者:ZHANG XingLan1 & JI DongYao2 1 College of Computer Science and Technology, Beijing University of Technology, Beijing 100124, China 2 State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing 100049, China 

出  处:《Science China(Physics,Mechanics & Astronomy)》2009年第9期1313-1316,共4页中国科学:物理学、力学、天文学(英文版)

基  金:Supported by the National Basic Research Program of China (Grant No. 2007CB311100);the National High Technology Research and Development Program of China (Grant No. 2006AA01Z440)

摘  要:Recently, Yang et al. proposed a kind of quantum cryptographic schemes based on secret sharing. The main idea is drawn from the case, where any n participants who share a secret K can co-operate as K does. This process can be applied to encryption, authentication, signature and so on. Unfortunately, since there is no identity authentication of the share's holder, these schemes inherit the limitation of secret sharing in practice. If some participants do not follow the protocol, the protocol would be a failure at last. Moreover, these schemes encounter another serious attack. Any two participants can co-operate to defeat the schemes by sending different shares to the parties unknown to the distributor of the secret K, such that these parties can execute the protocol as well. The attack proves that it is not enough for quantum cryptographic schemes that only the secret key is secure.Recently, Yang et al. proposed a kind of quantum cryptographic schemes based on secret sharing. The main idea is drawn from the case, where any n participants who share a secret K can co-operate as K does. This process can be applied to encryption, authentication, signature and so on. Unfortunately, since there is no identity authentication of the share’s holder, these schemes inherit the limitation of secret sharing in practice. If some participants do not follow the protocol, the protocol would be a failure at last. Moreover, these schemes encounter another serious attack. Any two participants can co-operate to defeat the schemes by sending different shares to the parties unknown to the distributor of the secret K, such that these parties can execute the protocol as well. The attack proves that it is not enough for quantum cryptographic schemes that only the secret key is secure.

关 键 词:QUANTUM IDENTITY authentication QUANTUM secure direct communication QUANTUM SIGNATURE SECRET sharing 

分 类 号:O413.1[理学—理论物理]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象