- 1School of Mathematical Science, Heilongjiang University, Harbin, China
- 2Institute for Cryptology and Network Security, Heilongjiang University, Harbin, China
As an important branch of quantum secure multi-party computation, quantum secret sharing (QSS) can distribute secret information among dishonest network nodes without revealing the secrets. In this study, a new four-party QSS protocol based on locally indistinguishable orthogonal product (LIOP) states is first proposed for quantum network communication. Then, the general multiparty QSS model based on LIOP states will be expanded. Combined with the property of LIOP states and obfuscating operation, the source node can send the secrets to different destination nodes in the quantum network. Accordingly, it is proven that the destination nodes have to work together to recover the shared secrets against some existing attacks. Furthermore, no entangled resources and complicated operations are required in the presented protocol. We hope the results could make positive effects to the development of quantum secure communication in the future.
1 Introduction
With the rapid development of the Internet, the security of information is becoming more and more important. Cryptography, as one of the fastest developing fields in modern science, is the basic theory to guarantee information security. Due to the development of quantum algorithms [1, 2], classical cryptographic protocols based on computational complexity are facing great security threats. Applying quantum theory to the research of cryptography, quantum cryptography has made a scientific breakthrough in cryptography. In 2002, Long et al. first discussed the quantum secure direct communication idea and analyzed its application in further quantum networks [3]. In 2008, Ma et al. proposed a group quantum communication network based on quantum secret sharing (QSS) among multiple nodes [4]. Afterward, QSS is becoming an important application in the quantum network [5–12].
QSS is the use of quantum technology to distribute secrets to a group of sharers. In QSS, a secret can only be recovered by all authorized sharers working together. As an important branch of quantum secure multi-party computation, QSS has attracted much attention. In 1999, Hillery et al. proposed the first QSS protocol [13]. On this basis, Karlsson et al. designed a Bell state secret sharing protocol [14]. In 2004, Xiao et al. generalized Hillery’s protocol to arbitrary multi-parties, effectively solving the limitation to secret sharing among multiple parties [15]. In 2017, Qin et al. proposed a QSS protocol using the n-qudit GHZ states [16]. In 2019, Zhang et al. gave an n-party QSS model based on multiparty entangled states [17]. In 2020, Mansour et al. presented a QSS protocol using maximally entangled multi-qudit states [18]. In 2021, Hu et al. proposed a novel dynamic QSS protocol in the high-dimensional quantum system based on transmitted particles and local unitary operations [19].
During the study, it can be seen that most of the existing QSS protocols are achieved by entangled states. As we know, the preparation of entangled states is difficult. It is necessary to propose more practical QSS protocols. The local indistinguishability of orthogonal product states is one of the hot topics in quantum information field recently. In 2015, Yu et al. constructed a set of orthogonal product states which cannot be perfectly distinguished by local operations and classical communication (LOCC) [20]. The indistinguishable orthogonal product (LIOP) states are easier to prepare than the entangled ones. It exhibits the overall non-locality of a wide range of applications in quantum cryptographic protocols. For example, Guo et al. proposed a quantum key distribution (QKD) protocol based on LIOP states in 2001 [21]. In 2007, Yang et al. presented a QSS protocol based on LIOP states [22]. In 2019, Jiang et al. proposed a quantum voting protocol based on LIOP states [23]. In 2020, Jiang et al. implemented a trusted third-party e-payment protocol on LIOP states [24].
In this study, we proposed a practical new four-party QSS protocol for LIOP states in quantum networks. First, the source node encodes the secret information into LIOP states. Second, the source node safely obfuscates the particles in the sequence and sends the corresponding particles to different destination nodes. Finally, all destination nodes work together to recover the secrets. Then, we generalize the protocol to any number of parties. According to the property of LIOP states, even if an attacker obtains n − 1 (n ≥ 3) particles of orthogonal product states, it is impossible to determine the shared messages.
The rest of the study is organized as follows. In Section 2, we introduce two LIOP states: X-LIOP states and F-LIOP states. With the introduced LIOP states, a new specific four-party QSS protocol and an extended multi-party QSS protocol are presented in Section 3 and Section 4. The security of the protocol is discussed in Section 5. A brief conclusion is given in Section 6.
2 Preliminaries
Here, we introduce the following specific form and properties of LIOP states, which will be used in the following protocols. It is well known that a set of orthogonal states is locally indistinguishable if it cannot be completely distinguished by LOCC [25].
Definition 1. In a 2 ⊗ 2 ⊗⋯⊗ 2 quantum system, the product basis that contains the following 2n orthogonal product states
cannot be perfectly distinguished by LOCC, where n ≥ 3, and the subscript i of the state
Definition 2. In a 2 ⊗ 2 ⊗ 2 quantum system, the product basis that contains the following six orthogonal product states
cannot be perfectly distinguished by LOCC. In order to simplify the subsequent protocol, the states aforementioned are named F-LIOP states.In Refs. [26, 27], these states are proven not to be perfectly distinguished by LOCC. We can find some properties of them.
Property 1. Even if n − 1 (n ≥ 3) particles of orthogonal product states are obtained, the exact form cannot be determined.
Property 2. Each particle can be transmitted independently.
Property 3. An operation on one of the particles does not affect the other particles.
3 Four-party quantum secret sharing protocol based on F-LIOP states
3.1 Proposed protocol
In this section, a four-party QSS protocol applied in the quantum network based on F-LIOP states is proposed. The network graph has two types of nodes (Figure 1): the source node (Na) wants to distribute secrets, and destination nodes
Step 1) Na divides the secret message X into n groups, i.e., x1, …, xn, where xi ∈ {00, 01, 10, 11}, i = 1, 2, …, n.
Step 2) Na encodes the secret message X to a quantum sequence |S⟩, and according to the following rules, it should be accepted by all the nodes:
Step 3) Na generates three identical sequences |S⟩, where the i-th sequence is denoted by |Si⟩, i = 1, 2, 3. Na splits |Si⟩ into three subsystems, i.e.,
Step 4) Na takes the left states composed of |ϕ5⟩, |ϕ6⟩ as decoy states to randomly insert the quantum sequence |Mt⟩ to form |Mt⟩′, where t = 1, 2, 3. Finally, |Mt⟩′ is sent to
Step 5) After receiving the sequence |Mt⟩′ from Na,
Step 6) After the eavesdropping check,
Step 7) After receiving the sequences from
Step 8) After the eavesdropping check,
Step 9)
3.2 Example
To illustrate our protocol more clearly, the following example is proposed. For convenience, eavesdropping detection is ignored. Suppose
Therefore,
Then, we get
Here, we assume that Na sends |M1⟩, |M2⟩, |M3⟩ to
Then,
4 Multi-party quantum secret sharing protocol based on X-LIOP states
In this section, we generalize the QSS protocol to any multi-party based on X-LIOP states applied in the quantum network. There are source node (Na) and n destination nodes
Step1)Na divides the secret message X into n groups, i.e., x1, …, xn, where
Step2)Na encodes the secret message X to a quantum sequence |S⟩ according to the following rules accepted by all the nodes:
Step3)Na creates n identical sequences |S⟩, where the i-th sequence is denoted by |Si⟩ and i = 1, 2, …, n. Na splits |Si⟩ into n systems, i.e.,
Step4)Na randomly inserts n unencoded orthogonal products into the quantum sequence as the decoy states and generates |Mt⟩′, where t = 1, 2, 3, …, n. Finally, |Mt⟩′ is given to
Step5)After getting the sequence |Mt⟩′ from Na,
Step6)After detecting eavesdropping,
Step7)After receiving the sequences from
Step8)After the eavesdropping check,
Step9)
5 Security analysis
In this section, we analyze the attack performed by the internal and external malicious nodes.
5.1 Internal attack
Since the internal nodes directly take part in the process of the protocol, the malicious internal nodes can perform more strong attacks than the external ones. Here, we analyzed two types of participant attacks: information leak attacks and forgery attacks.
5.1.1 Information leak attack
Here, we consider information leak attacks and assume that malicious nodes can guess the secret messages together. In order to show that the following three cases are analyzed, without loss of generality, we assume that r nodes are malicious.
Case 1: Since r malicious nodes conspire, they will send the corresponding particles according to the normal process. Hence, the r particles of r malicious nodes are correctly arranged, and the left (n − r) correct particles are required. As the states of each part come from {| + ⟩, | − ⟩, |0⟩, |1⟩}, the probability of the malicious nodes intuitively guessing one particle is
For the malicious nodes, the successful probability to obtain the secrets is shown in Figure 5.
Case 2: In the same case, the r malicious nodes can also use other methods to guess the remaining particles. It is observed that the malicious nodes have a total of r × (n − r) particles left in their hands. If malicious nodes want to guess the secrets, they will arrange the remaining r × (n − r) particles correctly, and only one arrangement of particles is correct. Therefore, the successful probability to obtain the secrets is
For malicious nodes, the successful probability to obtain the secrets is shown in Figure 6.
Case 3: Moreover, the r malicious nodes can perform the following different attacks as they give all the particles in their hands to one malicious node. In this sense, the malicious node independently guesses the secrets with the successful probability of
For malicious nodes, the successful probability to obtain the secrets is shown in Figure 7.
Above all, the probability of malicious nodes guessing the secrets successfully can be shown as
From the analysis mentioned previously, it can be seen for all malicious nodes without all the particles, and the probability to guessing the secrets tends to be 0. According to the property of the LIOP states, our protocol can resist information leak attacks.
5.1.2 Forgery attack
A forgery attack is an easily overlooked but important attack in the QSS protocol. Forgery attack means that malicious nodes can obtain secret messages and successfully forge secret messages so that other nodes get the wrong secret messages. This attack was proposed by Zhang et al. in 2013 [28] and was also mentioned by Sutradhar et al. in 2020 [29]. In the protocol, a forgery attack is also considered. The secrets are encoded as LIOP states, and particles are transmitted between all destination nodes. Therefore, it is possible for malicious nodes to complete the forgery attack.
When malicious nodes change | + ⟩ (| − ⟩) to | − ⟩ (| + ⟩), they have a certain probability to complete the forgery attack. So, the secrets encoded as |ϕ1⟩ (|ϕ4⟩) are forged and are encoded as |ϕ4⟩ (|ϕ1⟩) in Eq. 3. In the multi-party QSS protocol, the secrets are encoded most in the first n states in Eq. 1. The secrets are not encoded in LIOP states with | − ⟩ states. Therefore, this attack is only possible in the four-party QSS protocol.
5.1.2.1 Individual attack
Here, we assume that the malicious node can only perform a forgery attack on its own. When a malicious node gets all
Next, we analyze the probability that the malicious node gets all
So, the probability that the individual wants to successfully forge the secrets is
For the n length of the quantum sequences, it is not difficult to see that the probability of the malicious node successfully forging secrets P′ tends to be zero with the increase in n in Eq. 12.
5.1.2.2 Collusion attack
A more serious threat than an individual attack is that some attackers cooperate to forge secrets. Since this attack in this study only exists in the four-party QSS protocol, there are at most two malicious nodes here. When the malicious nodes obtain the secret messages of all sequences
We analyze the probability of malicious nodes obtaining all sequences
Case 1:
Case 2:
Case 3:
First, we analyze Case 1, and when they get sequence |M3⟩, they can obtain sequences
Next, we see Case 2; when they obtain sequence |M3⟩, the success probability is
Finally, during Case 3, when they receive sequence |M2⟩, the successful probability is
Therefore, the successful probability of malicious nodes forging messages is
For the length of n of the quantum sequences, it is not difficult to see that in Eq. 18, as n increases, the probability
They want to successfully forge the secret without being discovered is almost impossible. Therefore, the protocol is safe against internal attacks.
5.2 External attack
Unlike internal attackers, external attackers are illegal eavesdroppers from outside. We analyze intercept-replay attacks, intercept-measure-replay attacks, and entangle-measure attacks in the following sections.
5.2.1 Intercept-resend (IR) attack
Eve is an eavesdropper who wants to obtain the secrets of the source node. In order to obtain secrets, he can intercept secrets in Step 4 and Step 6 and complete the attack. Eve prepares large quantities of {| + ⟩, | − ⟩, |0⟩, |1⟩}. Eve intercepts the sequences |Mt⟩ and sends the sequences prepared on his own to
5.2.2 Intercept-measure-resend (IMR) attack
Eve receives the sequences |Mt⟩ and measures them in the computational basis. After the measurement, the sequences are resent to
Similar to the IR attack and IMR attack, Eve is an external attacker, while in the entanglement and measurement attack, Eve has less information than an internal attacker and, therefore, has a higher probability of failure.
6 Discussion and conclusion
We compare and summarize the QSS protocols based on LIOP states in Table 2. R denotes a rearrangement operation, and H denotes a random three-level Hadamard transform.
Compared with the existing QSS protocols based on LIOP states, our protocol can be extended to the arbitrary multi-party. In addition, we only use the characteristics of the states themselves to perform arrangement operations and do not require local measurement. In this case, two new QSS protocols based on LIOP states are proposed and may be applied in further quantum networks. The four-party QSS protocol is a special case of the multi-party QSS protocol. However, the secrets are encoded into different forms and attack strategies are different. To improve the efficiency, two more states are introduced in the four-party QSS protocol for encoding. Hence, the necessary forgery attack is discussed. For the multi-party QSS protocol, it is not difficult to see that the forgery attack can be naturally resisted.
In conclusion, combining with the property of LIOP states and obfuscating operation, the source nodes and destination nodes can complete the secret sharing in the quantum network. The destination nodes work together to recover the secrets. Since the LIOP states are more convenient to prepare than the entangled ones, the protocol is easily realized. Moreover, with regard to the property of LIOP states, it is proven that our protocol can be secure against the existing attacks. We hope this can be helpful to the further development of quantum networks.
Data availability statement
The original contributions presented in the study are included in the article/Supplementary Material; further inquiries can be directed to the corresponding authors.
Author contributions
Conceptualization, S-JF and K-JZ; methodology, S-JF; software, S-JF; validation, S-JF, K-JZ, LZ, and K-CH; writing—original draft preparation, S-JF; writing—review and editing, S-JF and K-JZ. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported by the National Natural Science Foundation of China under Grant 61802118 and Natural Science Foundation of Heilongjiang Province under Grant YQ2020F013, LH2019F031. The work of K-JZ was supported by the Advanced Programs of Heilongjiang Province for the overseas scholars and the Outstanding Youth Fund of Heilongjiang University. This research is supported by the Heilongjiang Provincial Key Laboratory of the Theory and Computation of Complex Systems.
Conflict of interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher’s note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
References
1. Shor PW. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev Soc Ind Appl Math (1999) 41(2):303–32. doi:10.1137/S0036144598347011
2. Grover LK. A fast quantum mechanical algorithm for database search. In: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing (1996). p. 212–9. doi:10.1145/237814.237866
3. Long GL, Liu XS. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys Rev A (Coll Park) (2002) 65(3):032302. doi:10.1103/PhysRevA.65.032302
4. Ma H, Guo Z. A group quantum communication network using quantum secret sharing. In: 2008 IFIP International Conference on Network and Parallel Computing; 2008 October 18–21; Shanghai, China (2008). p. 549–52. IEEE. doi:10.1109/NPC.2008.42
5. Zidan M, Abdel-Aty A-H, El-Sadek A, Zanaty EA, Abdel-Aty M. Low-cost autonomous perceptron neural network inspired by quantum computation. AIP Conf Proc (2017) 1905:020005. doi:10.1063/1.5012145
6. Noor KI, Noor MA, Mohamed HM. Quantum approach to starlike functions. Appl Math Inf Sci (2021) 15(4):437–41. doi:10.18576/amis/150405
7. Bogolyubov NN, Soldatov AV. Time-convolutionless master equation for multi-level open quantum systems with initial system-environment correlations. Appl Math Inf Sci (2020) 14(5):771–80. doi:10.18576/amis/140504
8. Said T, Chouikh A, Bennai M. N two-transmon-qubit quantum logic gates realized in a circuit QED system. Appl Math Inf Sci (2019) 13(5):839–46. doi:10.18576/amis/130518
9. Zidan M, Abdel-Aty A-H, Younes A, El-khayat I, Abdel-Aty M. A novel algorithm based on entanglement measurement for improving speed of quantum algorithms. Appl Math Inf Sci (2018) 12(1):265–9. doi:10.18576/amis/120127
10. Abdel-Aty A-H, Kadry H, Zidan M, Zanaty EA, Abdel-Aty M. A quantum classification algorithm for classification incomplete patterns based on entanglement measure. J Intell Fuzzy Syst (2020) 38(3):2809–16. doi:10.3233/JIFS-179566
11. Ye TY, Li HK, Hu JL. Semi-quantum key distribution with single photons in both polarization and spatial-mode degrees of freedom. Int J Theor Phys (Dordr) (2020) 59(9):2807–15. doi:10.1007/s10773-020-04540-y
12. Ye TY, Geng MJ, Xu TJ, Chen Y. Efficient semiquantum key distribution based on single photons in both polarization and spatial-mode degrees of freedom. Quan Inf Process (2022) 21(4):123. doi:10.1007/s11128-022-03457-1
13. Hillery M, Buvek V, Berthiaume A. Quantum secret sharing. Phys Rev A (Coll Park) (1999) 59(3):1829–34. doi:10.1103/PhysRevA.59.1829
14. Karlsson A, Koashi M, Imoto N. Quantum entanglement for secret sharing and secret splitting. Phys Rev A (Coll Park) (1999) 59(1):162–8. doi:10.1103/PhysRevA.59.162
15. Xiao L, Long GL, Deng FG, Pan JW. Efficient multiparty quantum-secret-sharing schemes. Phys Rev A (Coll Park) (2004) 69(5):052307. doi:10.1103/PhysRevA.69.052307
16. Qin H, Dai Y. Dynamic quantum secret sharing by using d-dimensional GHZ state. Quan Inf Process (2017) 16(3):64–13. doi:10.1007/s11128-017-1525-y
17. Zhang KJ, Zhang X, Jia HY, Zhang L. A new n-party quantum secret sharing model based on multiparty entangled states. Quan Inf Process (2019) 18(3):81–15. doi:10.1007/s11128-019-2201-1
18. Mansour M, Dahbi Z. Quantum secret sharing protocol using maximally entangled multi-qudit states. Int J Theor Phys (Dordr) (2020) 59(12):3876–87. doi:10.1007/s10773-020-04639-2
19. Hu W, Zhou RG, Li X, Fan P, Tan C. A novel dynamic quantum secret sharing in high-dimensional quantum system. Quan Inf Process (2021) 20(5):159–28. doi:10.1007/s11128-021-03103-2
20. Yu S, Oh CH. Detecting the local indistinguishability of maximally entangled states (2015). arXiv preprint arXiv:1502.01274. Available at: https://arxiv.org/abs/1502.01274 (Accessed Feb 4, 2015).doi:10.48550/arXiv.1502.01274
21. Guo GP, Li CF, Shi BS, Li J, Guo GC. Quantum key distribution scheme with orthogonal product states. Phys Rev A (Coll Park) (2001) 64(4):042301. doi:10.1103/PhysRevA.64.042301
22. Yang Y, Wen Q, Zhu F. An efficient quantum secret sharing protocol with orthogonal product states. Sci China Ser G: Phys Mech Astron (2007) 50(3):331–8. doi:10.1007/s11433-007-0028-8
23. Jiang DH, Wang J, Liang XQ, Xu GB, Qi HF. Quantum voting scheme based on locally indistinguishable orthogonal product states. Int J Theor Phys (Dordr) (2020) 59(2):436–44. doi:10.1007/s10773-019-04337-8
24. Jiang DH, Hu QZ, Liang XQ, Xu GB. A trusted third-party E-payment protocol based on locally indistinguishable orthogonal product states. Int J Theor Phys (Dordr) (2020) 59(5):1442–50. doi:10.1007/s10773-020-04413-4
25. Walgate J, Hardy L. Nonlocality, asymmetry, and distinguishing bipartite states. Phys Rev Lett (2002) 89(14):147901. doi:10.1103/PhysRevLett.89.147901
26. Xu GB, Wen QY, Qin SJ, Yang YH, Gao F. Quantum nonlocality of multipartite orthogonal product states. Phys Rev A (Coll Park) (2016) 93(3):032341. doi:10.1103/PhysRevA.93.032341
27. Feng Y, Shi Y. Characterizing locally indistinguishable orthogonal product states. IEEE Trans Inf Theor (2009) 55(6):2799–806. doi:10.1109/TIT.2009.2018330
28. Zhang K, Qin S. The Cryptanalysis of Yuan et al.’s Multiparty Quantum Secret Sharing Protocol. Int J Theor Phys (Dordr) (2013) 52(11):3953–9. doi:10.1007/s10773-013-1706-0
29. Sutradhar K, Om H. Efficient quantum secret sharing without a trusted player. Quan Inf Process (2020) 19(2):73–15. doi:10.1007/s11128-019-2571-4
30. Hsu LY, Li CM. Quantum secret sharing using product states. Phys Rev A (Coll Park) (2005) 71(2):022321. doi:10.1103/PhysRevA.71.022321
Keywords: quantum secret sharing, quantum network, quantum secure communication, orthogonal product states, quantum cryptography
Citation: Fu S-J, Zhang K-J, Zhang L and Hou K-C (2022) A new non-entangled quantum secret sharing protocol among different nodes in further quantum networks. Front. Phys. 10:1021113. doi: 10.3389/fphy.2022.1021113
Received: 17 August 2022; Accepted: 30 September 2022;
Published: 24 October 2022.
Edited by:
Xiubo Chen, Beijing University of Posts and Telecommunications (BUPT), ChinaReviewed by:
Mahmoud Abdel-Aty, Sohag University, EgyptSong Lin, Fujian Normal University, China
Cai Zhang, South China Agricultural University, China
Copyright © 2022 Fu, Zhang, Zhang and Hou. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Ke-Jia Zhang, emhhbmdrZWppYUBobGp1LmVkdS5jbg==; Long Zhang, bHpoYW5nQGhsanUuZWR1LmNu
†These authors contributed equally to this work