检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:陈克勤 邹峥 蔡彬彬 林崧[1] CHEN Keqin;ZOU Zheng;CAI Binbin;LIN Song(College of Computer and Cyber Security,Fujian Normal University,Fuzhou 350007,China)
机构地区:[1]福建师范大学计算机与网络空间安全学院,福建福州350007
出 处:《网络与信息安全学报》2024年第5期134-144,共11页Chinese Journal of Network and Information Security
基 金:国家自然科学基金(61976053,62171131);福建省自然科学基金(2022J01186,2023J01533)。
摘 要:量子秘密共享是量子密码的一个重要研究分支。提出了一种基于高维GHZ(greenberger-hornezeilinger)态的动态分层量子秘密共享协议。协议将所有参与者划分为多个层级,每个层级之间参与者的数量以及共享的秘密信息可以互不相同。协议充分利用高维GHZ态各粒子之间的纠缠特性,使处于同一层级的所有参与者只需要进行局域测量,之后通过合作即可恢复得到当前层级的秘密信息。并且,每一个参与者还能够恢复得到所有低于其所在层级的秘密信息,但无法得到高于当前层级的秘密信息,体现了所提协议的层次性。协议在实现分层结构的同时,还允许秘密信息的分发者在不改变某一层级所有原参与者已持有份额的情况下,实现该层级内多个参与者的动态加入和退出,使所提协议具有更好的灵活性和通用性。此外,给出数学证明对所提协议的正确性进行了验证。协议的安全性分析结果表明,所提协议能够抵御常见的截获-重发攻击、测量-重发攻击、纠缠-测量攻击和特洛伊木马攻击,以及内部不诚实参与者的合谋攻击。Quantum secret sharing is an important research branch of quantum cryptography.A novel dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ(Greenberger-Horne-Zeilinger)state was proposed.In the presented protocol,participants were divided into multiple layers,with the number of participants and the shared secret in each layer being allowed to differ.Based on the entanglement characteristics between particles in high-dimensional GHZ states,all participants at the same layer could cooperate to recover the secret of the current layer by performing local measurements.Moreover,each participant was able to obtain the shared secrets at lower layers,but not those at higher layers.In addition to the realization of the hierarchical structure,the proposed protocol also allowed each layer to dynamically add or delete multiple participants without changing the shares held by original participants,which provided better flexibility and generality.The correctness of the proposed protocol was verified through mathematical proof.In addition,security analysis results showed that the proposed protocol could resist intercept-and-resend attack,measure-and-resend attack,entangle-and-measure attack,Trojan horse attack,as well as collusion attacks from internal participants.
分 类 号:TN918.2[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.200