Skip to main content

ORIGINAL RESEARCH article

Front. Phys., 21 July 2023
Sec. Quantum Engineering and Technology

A (t, n) threshold protocol of semi-quantum secret sharing based on single particles

Ziyi ZhouZiyi Zhou1Yifei WangYifei Wang1Zhao Dou
Zhao Dou1*Jian LiJian Li2Xiubo ChenXiubo Chen1Lixiang LiLixiang Li1
  • 1Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
  • 2Information Security Center, School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China

Semi-quantum secret sharing is an important research issue in quantum cryptography. In this paper, we propose a (t, n) threshold semi-quantum secret sharing protocol, which combines the practicality of semi-quantum secret sharing protocols and the flexibility of (t, n) threshold quantum secret sharing protocols. Participants prepare and transmit single particles in a circular way, and then any t out of n participants can recover the secret according to Shamir’s secret sharing scheme. As quantum resources, single particles are easy to prepare. Furthermore, classical participants only need to possess the capability to prepare and insert particles. The security analysis shows our protocol has security against most attacks. Except decoy particles, all particles are useful to carry the secret message, so the efficiency of the proposed protocol can achieve 100%.

1 Introduction

Secret sharing is an important branch of modern cryptography. The concept of secret sharing is that the secret holder divides his secret into several pieces and each participant can obtain a piece from the holder. The threshold number of participants can recover the secret in collaboration with others.

The first classical secret sharing (CSS) protocol [1] was proposed by Shamir in 1979. However, if an eavesdropper, Eve, controls the communication channel, she can easily obtain the secret holder’s, Alice’s, secret [2]. Unfortunately, the physical properties of quantum mechanics mean that eavesdropping can be detected easily because eavesdropping may disturb quantum information, which induces errors. Therefore, quantum secret sharing (QSS) emerged based on security additional requirements. In 1999, Hillery et al. proposed the first QSS protocol [3]. Authors employed the three-particle and four-particle entangled Greenberger-Horne-Zeilinger (GHZ) state to share a secret message in their protocol. In 2003, Guo et al. proposed a more efficient QSS protocol [4] that only used product states. In 2008, Wang et al. put forward a QSS protocol [5] with higher efficiency and security based on single photons. After that, a huge number of QSS protocols [615] were proposed.

The above QSS protocols require all participants to possess full quantum capabilities, but not all participants are equipped with complete quantum devices. Fortunately, the concept of semi-quantum secret sharing (SQSS) was proposed. In a semi-quantum environment, some participants have limited quantum capabilities. They can cooperate with the participants with full quantum capabilities to complete tasks of secret distribution and reconstruction in SQSS protocols. In 2010, Li et al. proposed the first semi-quantum secret sharing protocol [16]. In the protocol, they used entangled GHZ-type states to share a secret message. In 2015, Xie et al. presented an efficient SQSS protocol [17] that can share a specific secret. In 2018, an SQSS protocol with limited resources was designed by Li et al. [18], which was more efficient compared with previous protocols. In 2021, Yin et al. proposed an SQSS protocol [19] based on GHZ-type states. The protocol adopted identity authentication to verify the identification of participants in communication. In recent years, more SQSS protocols [20, 2127] were proposed.

However, all the above SQSS protocols are (n, n) threshold protocols. That is to say, the secret sharing tasks cannot be completed when there is someone unable to participate. So, we propose a (t, n) threshold SQSS protocol based on Shamir’s secret sharing scheme, in which any t out of n participants with limited quantum capabilities can recover the secret. All participants only use single particles, which are easier to prepare than other quantum resources. In our protocol, the initial particles prepared by Alice are sent to the first participant. Every participant inserts his particles and sends the new sequence to the next one until Alice receives the final sequence from the last participant. The sequence composed of particles is transmitted in a circular way. Due to the circular transmission mode, participants play the different roles. Furthermore, classical participants in our protocol are released from many quantum operations and they are only required to possess the capability to prepare and insert particles. Moreover, the qubit efficiency of our protocol can achieve 100% because all particles are used to carry the secret message except for decoy particles. As mentioned above, a flexible and efficient SQSS protocol is proposed in this paper. In addition, the security of our protocol can be proved under intercept-resend attack, measure-resend attack, entangle-measure attack, and collusion attack.

The rest of this paper is organized as follows. In Section 2, we present some preliminaries about the setting of SQSS and Shamir’s secret sharing. Then, in Section 3, we describe a (t, n) threshold SQSS protocol. An example of the proposed (t, n) threshold SQSS protocol is given in Section 4. In Section 5, we analyze the security of our protocol and give a comparison with some SQSS protocols. Finally, a conclusion is provided in Section 6.

2 Preliminaries

Here, to make our protocol easier to understand, we will briefly introduce some preliminaries about the setting of SQSS and Shamir’s secret sharing.

2.1 The setting of SQSS

In SQSS protocols, there are participants restricted to using only the quantum states in the fixed computational basis 0,1, and they only have classical computing power. All participants of an SQSS protocol are required to perform the following operations only: (a) reflect the qubits undisturbed; (b) measure the qubits with the classical 0,1 basis; (c) generate a (fresh) qubit with the classical 0,1 basis and send it; and (d) reorder the qubits, so they can never prepare or measure qubits arbitrarily. The qubits with the classical basis are regarded as “classical bits”, and the participants restricted to performing the above operations are known as “classical participants”.

2.2 Shamir’s secret sharing

Shamir [1] proposed a (t, n) threshold scheme based on polynomial interpolation in 1979. According to the property of polynomial interpolation, this technique enables the construction of secret sharing schemes that can function even when fewer than n participants want to reconstruct the secret. Therefore, Shamir’s scheme has been widely used in the field of quantum cryptography, such as quantum secret sharing [2830] and quantum key distribution [31].

Given that there is a secret holder Alice and n participants Bob1,Bob2,...,Bobn, Shamir’s secret sharing consists of two phases:

In the secret sharing phase, the secret holder Alice selects a polynomial of t–1 degree:

fx=S+a1x+a2x2+...+at1xt1.(1)

Here, S is Alice’s secret, t is the lower limit of the number of participants who can reconstruct Alice’s secret S, and aii=1,2,...,t1 is the coefficient Alice picks. Alice selects n integers as xi and computes fxi as shadows. Then she distributes them among n participants. Bobi only knows xi and fxi, where i=1,2,...,n.

In secret reconstruction phase, t participants use the Lagrange interpolation formula and their shares to reconstruct the secret. The Lagrange interpolation formula is as follows:

fx=r=1tfxr1jt,jrxxjxrxj.(2)

Participants can calculate the polynomial under the condition that x=0 to obtain f0, which is just the secret S.

3 A (t, n) threshold SQSS protocol

In this section, we propose a (t, n) threshold SQSS protocol. Assume that the secret holder Alice wants to share her secret among n participants Bob1,Bob2,...,Bobn. Any t out of these n participants can recover Alice’s secret, and participants fewer than t cannot get information about the secret. The steps of the proposed (t, n) threshold SQSS protocol are described as follows:

Step 1. Alice picks a random polynomial:

fx=S+a1x+a2x2+...+at1xt1,(3)

where S is Alice’s secret and aii=1,2,...,t1 is a random coefficient.

Step 2. Alice randomly chooses an integer xi and computes fxi for Bobii=1,2,...,n with fxi0,1,...,2N2,2N1, meaning that the length of the binary sequence fxi is less than bits.

Step 3. Alice randomly prepares N particles in one of the states 0,1,+,, which compose a sequence S0. All particles in S0 are used as decoy particles. Alice sends S0 to Bob1.

Step 4. After receiving S0 from Alice, Bob1 randomly chooses an N-bit binary sequence as his private key b1. Bob1 prepares N new particles in 0,1 according to his private key b1. The binary bit “0” denotes 0, and the binary bit “1” denotes 1. According to the rule mentioned above, Bob1 inserts the corresponding particles into S0 randomly to form a new sequence S1. S1 is composed of 2N particles. Subsequently, Bob1 sends S1 to Bob2.

Step 5. Bobii=2,3,...,n repeats Step 4. Finally, Bobn sends the sequence Sn to Alice.

Step 6. Alice and Bobii=1,2,...,n perform the eavesdropping checking. Alice publicly announces that she has received Sn, which is composed of Alice’s decoy particles in 0,1,+, and classical participants’ particles in 0,1. Each participant announces the places where he inserts his particles. Then Alice knows the positions of her decoy particles in Sn. She uses the proper measurement basis to measure her particles. By comparing measurement results of decoy particles with the initial states, Alice can evaluate the error rate. If the error rate exceeds the predefined threshold value, Alice will restart the protocol.

Step 7. After the eavesdropping checks, Alice measures the remaining particles with Z basis. According to the measurement results, Alice can obtain the private key bi of Bobi. Then, Alice computes ai=bici. Here, ci is the binary bit string of fxi. In this way, Alice can get a corresponding new binary sequence KA, which is composed of ai. Finally, Alice announces her new sequence KA.

Step 8. Because all participants announce where they insert their particles in Step 6, Bobi knows the positions of his particles in Sn and obtains his corresponding binary bit string ai from KA. According to Step 7, ai=bici. So, Bobi computes ci=biai. After that, Bobi calculates an integer fxi by the binary bit string ci and successfully obtains his secret shadow. At least t participants use their secret shadows to recover Alice’s secret S through the Lagrange interpolation:

f0=r=1tfxr1jt,jrxjxrxj.(4)

4 An example

To give a clear explanation of our protocol, we will take a (3, 4) threshold protocol as an example in the following. Suppose the secret holder Alice wants to share her secret 00001 with the participants. Obviously, S=1.

4.1 Alice’s preparation

Alice picks a polynomial fx=1+x+x2. She respectively announces x1=1,x2=2,x3=3,x4=4 to Bob1,Bob2,Bob3,andBob4. Alice also computes fx1=3,fx2=7,fx3=13,fx4=21, which are the values Alice wants to distribute to classical participants.

Alice randomly prepares 5 decoy particles in one of the states 0,1,+,, which compose S0=0A,1A,+A,A,0A.

4.2 Secret sharing

Alice sends S0 to Bob1. After that, Bob1 creates a 5-bit private key b1=00000 for himself. Therefore, Bob1 prepares 5 particles in 0 and inserts these particles into S0 to form a new sequence S1=0A,0B1,1A,0B1,+A,0B1,A,0B1,0A,0B1. Then Bob1 sends S1 to Bob2.

Bob2 creates his private key b2= 01010. He prepares corresponding particles and inserts them into S1. Therefore, the new sequence is S2=0B2,0A,0B1,1A,1B2,0B1,+A,0B2,0B1,A,0B1,0A,1B2,0B1,0B2.Bob3’s private key is b3= 11100 and Bob4’s private key is b4= 11111. They do the operations similar to Bob1 and Bob2. The final sequence received by Alice is S4. Here, S4=1B4,0B2,1B4,1B3,1B3,1B3,0A,0B3,0B3,0B1,1A,1B2,0B1,+A,0B2,0B1,A,0B1,0A,1B2,0B1,0B2,1B4,1B4,1B4.

For eavesdropping detection, participants announce where they insert their particles. Alice can obtain the positions of her particles. She measures these particles with proper measurement basis and checks the error rate. For example, if Alice prepares + in S0, she should measure the corresponding particle in S4 with X basis after receiving the final sequence from Bob4. If there is no eavesdropper, the measurement result will be +. Once the result is different from +, there exists an eavesdropper. Then, Alice can evaluate the error rate. If the error rate exceeds the predefined threshold value, they will restart the protocol.

After eavesdropping detection, Alice measures the remaining particles with Z basis. Subsequently, she obtains bi of Bobi. According to the relationship established in Step 7, Alice computes ai=bici, where ci is the binary bit string of fxi. She obtains a new binary sequence KA=00110001010101011010, which is composed of ai. Then Alice announces KA.

All participants declare where they insert their particles in Step 6, so Bobi knows the positions of his particles. Bobi can obtain his ai from KA and calculate ci, because ci=biai=bibici. For Bob1, c1=a1b1=0001100000=00011.For Bob2, c2=a2b2=0110101010=00111.For Bob3, c3=a3 b3=1000111100=01101.For Bob4, c4=a4b4=0101011111=10101

Finally, Bobi transforms the binary bit ci into the integer fxi.

4.3 Secret recovery

Suppose three participants, Bob1,Bob2,andBob3, try to recover Alice’s secret. According to the Lagrange interpolation,

S=i=1tfxij=1,jitxjxjxi=fx1x2x2x1x3x3x1x4x4x1+fx2x1x1x2x3x3x2x4x4x2+fx3x1x1x3x2x2x3x4x4x3=3221331441+7112332442+13113223443=921+13=1.(5)

In this way, they complete a (3,4) threshold SQSS protocol and recover the secret shared by Alice.

5 Security analysis and comparison

In this section, we will analyze the security of our protocol and further compare our protocol with some SQSS protocols. An inside participant has a more powerful ability to eavesdrop on an SQSS protocol than an outside attacker. If a protocol can resist the attack from an inside participant, it is also secure for an outside attacker. Thus, in the following security analysis, we focus on the attack from an inside participant. The dishonest participant will try to steal Alice’s secret by using the following attack strategies.

5.1 Measure-resend attack

Suppose that Bobi is the malicious participant. To obtain Alice’s shared integers Bobi needs to intercept the sequence Sn when Bobn sends it to Alice. Then Bobi measures all particles in Sn with Z basis. After that, Bobi can get any participant’s private key bj after every participant announces where he inserts his particles. However, without knowing the positions of the particles prepared by Alice, Bobi would be detected by the security checks in Step 4. Concretely speaking, if Alice prepares 0 or 1, the state will not be changed. But if Alice prepares + or , Bobi’s attack will make the particle collapse into 0 or 1. For each decoy particle prepared in X basis, Bobi’s measure-resend attack on it will be detected by the security check with a probability of 50%. To sum up, the probability that Alice can detect Bobi’s eavesdropping is 112k, where k represents the num of + or in S0. If k is large enough, the detection probability will approach to 100%. Therefore, KA will not be declared. According to cj=ajbj, Bobi is unable to calculate any Bobj’s cj or fxj without aj. Finally, Bobi cannot get Alice’s secret S.

5.2 Intercept-resend attack

To obtain Alice’s shared integers, the malicious participant Bobi needs to intercept the sequence Sn when Bobn sends it to Alice. Afterward, Bobi keeps the (n+1)N particles in his hand and prepares (n+1)N fake particles with Z basis. Subsequently, he sends the fake sequence to Alice. However, Bobi does not know the positions of Alice’s particles. He replaces Alice’s particles with his fake particles. When Alice measures Bobis fake particles in X basis in Step 6, she will obtain an incorrect result with a probability of 50%. Assume that there are k decoy particles prepared with X basis in S0, the probability that Bobis eavesdropping will be detected is 112k, which approaches 100%. So Bobi cannot pass the security check. That is, Alice will not declare KA, which makes it impossible for Bobi to obtain Alice’s secret.

5.3 Entangle-measure attack

Suppose that Bobi is the dishonest participant. He cannot discover the difference between the particles prepared by Alice and those prepared by other participants. Therefore, he has to entangle his auxiliary particles with all of them. Bobi uses a unitary operation UE to entangle an ancillary particle on each of the transmitted particles and then measures the ancillary particles to obtain Alice’s shared secret information.

UE0E=α00e00+β01e01.(6)
UE1E=α10e10+β11e11.(7)
UE+E=12α0e00+α1e100+12β0e01+β1e111=12α0e00+α1e10+β0e01+β1e11++12α0e00+α1e10β0e01β1e11.(8)
UEE=12α0e00α1e100+12β0e01β1e111=12α0e00α1e10+β0e01β1e11++12α0e00α1e10β0e01+β1e11.(9)

Here, α02+β02=α12+β12=1. If Bobi wants to avoid introducing an error, he must make his operation meet the following relations:

UE0E=0e0,UE1E=1e1,UE+E=+e+,UEE=e.(10)

We can infer

β0e01=0,α1e10=0,α0e00+α1e10β0e01β1e11=0,α0e00α1e10+β0e01β1e11=0.(11)

Here, 0 denotes a column zero vector.

Then, the deduced results are as follows:

α1=β0=0,α0=β1=1.(12)

From Eq. 12, we can create Eq. 13:

e00=e11.(13)

In this way, the final results can be deduced as the following, Eq. 14:

UE0E=0e00=0e11,UE1E=1e11=1e00.(14)

So, Bobi cannot distinguish 0,1 without introducing an error. Once errors are found in the eavesdropping checks, Alice will abort the protocol, and Bobi will obtain no information about Alice’s secret.

5.4 Collusion attack

Two or more dishonest participants may try to steal other participants’ secret shadows by stealing their private keys. First, we assume that Bobi1 and Bobi+1 are the ones who start the collusion attack to obtain Bobi’s private key. After receiving the sequence Si1, Bobi1 prepares fake particles and then sends the fake sequence to Bobi. Then Bobi inserts his particles into the fake sequence and sends it to Bobi+1. Bobi1 and Bobi+1 try to perform measurement on the new sequence to steal Bobi’s private key. Neither Bobi1 nor Bobi+1 knows the positions of Bobi’s particles because the order is disrupted after Bobi inserts his particles. That means it is impossible for Bobi+1 to distinguish Bobi’s particles from the fake particles after measuring all the particles with Z basis. So Bobi+1 cannot obtain Bobis private key without being detected in Step 6. If dishonest participants cannot pass through Alice’s check, Alice will not declare KA. As a result, dishonest participants cannot get any information about Bobis secret shadow.

Subsequently, we will discuss the situation where Bob1,Bob2,,andBobi1 and Bobi+1,Bobi+2,,andBobt cooperate to steal Bobis private key. Because of the collusion among Bob1,Bob2,,andBobi1, dishonest participants can master the positions of Alice’s decoy particles in Si1. Bobi1 prepares a fake sequence and sends it to Bobi. However, upon receiving the new sequence from Bobi, Bobi+1,Bobi+2,,Bobt are unable to know where Bobi inserts his particles. That is, Bobi+1,Bobi+2,,Bobt can no longer distinguish Bobi’s particles from the fake particles. In this case, it is almost impossible for dishonest participants to steal Bobi’s private key and pass the security check. If the collusion attack is detected, Alice will not declare KA, and dishonest participants cannot get any information about Bobis secret shadow.

In this section, we prove that the proposed protocol is secure enough to resist measure-resend attack, intercept-resend attack, entangle-measure attack, and collusion attack.

5.5 Comparison

Here, we will give a comparison with some SQSS protocols. The comparison results are displayed in Table 1. The qubit efficiency is defined as η=n/m, where n denotes the number of the useful qubits, and m denotes the number of the qubits transmitted.

TABLE 1
www.frontiersin.org

TABLE 1. Comparison of the SQSS protocols.

In terms of the threshold structure, our protocol is (t, n) threshold protocol. That is, the proposed protocol is more flexible than the (n, n) threshold protocols in Refs. [17, 21, 16, 24]. For quantum resources, all participants in our protocol use single particles, which are easier to prepare than entangled states used in the protocols in Refs. [17, 21, 16]. Furthermore, in our protocol, except for the decoy particles, all particles prepared are used to carry the secret shadows in principle. Thus, the qubit efficiency of our protocol can achieve 100%. Therefore, our protocol has better qubit efficiency than the protocols in Refs. [17, 21, 16]. In summary, our protocol is efficient, and it is more flexible than these protocols.

6 Conclusion

In this paper, we have proposed a (t, n) threshold SQSS protocol. Different from previous SQSS protocols, any t out of n classical participants can recover the secret in our protocol. Next, as quantum resources, single particles used in our protocol are easy to prepare. Moreover, except decoy particles, all particles are useful to transmit secret shadows, so the qubit efficiency of our protocol can achieve 100%. In addition, for classical participants, only the capability to prepare and insert single particles is required in our protocol. On the whole, the protocol proposed in this paper is flexible and efficient.

Data availability statement

The original contributions presented in the study are included in the article/Supplementary Material, further inquiries can be directed to the corresponding author.

Author contributions

All authors listed have made a substantial and intellectual contribution to this work and approved it for publication.

Funding

National Science Foundation of China (Grant No. 62272051) Foundation of Guizhou Provincial Key Laboratory of Public Big Data (Grant No. 2019BDKFJJ014). Project supported by the National Key R&D Program of China (Grant No. 2020YFB1805405), the 111 Project (Grant No. B21049), the National Science Foundation of China (Grant No. 62272051), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (Grant No. 2019BDKFJJ014), and the Fundamental Research Funds for the Central Universities, China (Grant Nos. 2020RC38, 2019XD-A02).

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

1. Shamir A. How to share a secret. Commun ACM (1979) 22(11):612–3. doi:10.1145/359168.359176

CrossRef Full Text | Google Scholar

2. Yin A, Wang Z, Fu F. A novel semi-quantum secret sharing scheme based on Bell states. Mod Phys Lett B (2017) 31(13):1750150. doi:10.1142/S0217984917501500

CrossRef Full Text | Google Scholar

3. Hillery M, Bužek M, Berthiaume A. Quantum secret sharing. Phys Rev A (1999) 59(3):1829–34. doi:10.1103/PhysRevA.59.1829

CrossRef Full Text | Google Scholar

4. Guo GP, Guo GC. Quantum secret sharing without entanglement. Phys Lett A (2003) 310(4):247–51. doi:10.1016/S0375-9601(03)00074-4

CrossRef Full Text | Google Scholar

5. Wang T, Wen Q, Chen X, Guo F, Zhu F. An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt Commun (2008) 281(24):6130–4. doi:10.1016/j.optcom.2008.09.026

CrossRef Full Text | Google Scholar

6. Karimipour V, Bahraminasab A, Bagherinezhad S. Entanglement swapping of generalized cat states and secret sharing. Phys Rev A (2002) 65(4):042320. doi:10.1103/PhysRevA.65.042320

CrossRef Full Text | Google Scholar

7. Chau HF. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate. Phys Rev A (2002) 66(6):060302. doi:10.1103/PhysRevA.66.060302

CrossRef Full Text | Google Scholar

8. Li Y, Zhang K, Peng K. Multiparty secret sharing of quantum information based on entanglement swapping. Phys Lett A (2004) 324(5-6):420–4. doi:10.1016/j.physleta.2004.03.034

CrossRef Full Text | Google Scholar

9. Wang HF, Ji X, Zhang S. Improving the security of multiparty quantum secret splitting and quantum state sharing. Phys Lett A (2006) 358(1):11–4. doi:10.1016/j.physleta.2006.04.110

CrossRef Full Text | Google Scholar

10. Lin S, Wen QY, Gao F, Zhu FC. Improving the security of multiparty quantum secret sharing based on the improved Boström–Felbinger protocol. Opt Commun (2008) 281(17):4553–4. doi:10.1016/j.optcom.2008.05.026

CrossRef Full Text | Google Scholar

11. Gao G. Improvement of efficient multiparty quantum secret sharing based on bell states and continuous variable operations. Int J Theor Phys (2014) 53(7):2231–5. doi:10.1007/s10773-014-2023-y

CrossRef Full Text | Google Scholar

12. Wang J, Zhang S, Zhang Q, Tang CJ. Semiquantum key distribution using entangled states. Chin Phys Lett (2011) 28(10):100301. doi:10.1088/0256-307X/28/10/100301

CrossRef Full Text | Google Scholar

13. Gao G. Secure multiparty quantum secret sharing with the collective eavesdropping-check character. Quan Inf Process (2013) 12(1):55–68. doi:10.1007/s11128-011-0351-x

CrossRef Full Text | Google Scholar

14. Rahaman R, Parker MG. Quantum scheme for secret sharing based on local distinguishability. Phys Rev A (2015) 91(2):022330. doi:10.1103/PhysRevA.91.022330

CrossRef Full Text | Google Scholar

15. Gao G, Wang Y, Wang D. Multiparty semiquantum secret sharing based on rearranging orders of qubits. Mod Phys Lett B (2016) 30(10):1650130. doi:10.1142/S021798491650130X

CrossRef Full Text | Google Scholar

16. Li Q, Chan WH, Long DY. Semiquantum secret sharing using entangled states. Phys Rev A (2010) 82(2):022303. doi:10.1103/PhysRevA.82.022303

CrossRef Full Text | Google Scholar

17. Xie C, Li L, Qiu D. A novel semi-quantum secret sharing scheme of specific bits. Int J Theor Phys (2015) 54(10):3819–24. doi:10.1007/s10773-015-2622-2

CrossRef Full Text | Google Scholar

18. Li Z, Li Q, Liu C, Peng Y, Chan WH. Limited resource semiquantum secret sharing. Quan Inf Process (2018) 17(10):285–11. doi:10.1007/s11128-018-2058-8

CrossRef Full Text | Google Scholar

19. Yin A, Chen T. Authenticated semi-quantum secret sharing based on GHZ-type states. Int J Theor Phys (2021) 60(1):265–73. doi:10.1007/s10773-020-04688-7

CrossRef Full Text | Google Scholar

20. Hu WW, Zhou RG, Luo J. Semi-quantum secret sharing in high-dimensional quantum system using product states. Chin J Phys (2022) 77:1701–12. doi:10.1016/j.cjph.2022.03.031

CrossRef Full Text | Google Scholar

21. Tsai CW, Yang CW, Lee NY. Semi-quantum secret sharing protocol using W-state. Mod Phys Lett A (2019) 34(27):1950213. doi:10.1142/S0217732319502134

CrossRef Full Text | Google Scholar

22. Cao G, Chen C, Jiang M. A scalable and flexible multi-user semi-quantum secret sharing. In: Proceedings of the 2nd International Conference on Telecommunications and Communication Engineering; November 2018; Beijing China (2018). p. 28–32. doi:10.1145/3291842.3291857

CrossRef Full Text | Google Scholar

23. Yin AH, Tong Y. A novel semi-quantum secret sharing scheme using entangled states. Mod Phys Lett B (2018) 32(22):1850256. doi:10.1142/S0217984918502561

CrossRef Full Text | Google Scholar

24. Ye CQ, Ye TY. Circular semi-quantum secret sharing using single particles. Commun Theor Phys (2018) 70(6):661. doi:10.1088/0253-6102/70/6/661

CrossRef Full Text | Google Scholar

25. Li XY, Chang Y, Zhang SB. Multi-party semi-quantum secret sharing protocol based on Bell states. In: Proceedings of the International Conference on Artificial Intelligence and Security; November 2020; Cham (2020). p. 280–8. doi:10.1007/978-3-030-57881-7_25

CrossRef Full Text | Google Scholar

26. Tian Y, Li J, Chen XB, Ye CQ, Li HJ. An efficient semi-quantum secret sharing protocol of specific bits. Quan Inf Process (2021) 20(6):217–1. doi:10.1007/s11128-021-03157-2

CrossRef Full Text | Google Scholar

27. Tian Y, Li J, Yuan KG, Li HJ, Chen XB. An efficient semi-quantum key distribution protocol based on EPR and single-particle hybridization. QUANTUM INFORMATION COMPUTATION (2021) 21(7-8):563–76. doi:10.26421/QIC21.7-8-3

CrossRef Full Text | Google Scholar

28. Yang YG, Wen QY. Threshold quantum secure direct communication without entanglement. Sci China Ser G: Phys Mech Astron (2008) 51(2):176–83. doi:10.1007/s11433-008-0028-3

CrossRef Full Text | Google Scholar

29. Qin HW, Dai YW. An efficient (t, n) threshold quantum secret sharing without entanglement. Mod Phys Lett B (2016) 30(12):1650138. doi:10.1142/S0217984916501384

CrossRef Full Text | Google Scholar

30. Lu CB, Miao FY, Meng KJ, Yu Y. Threshold quantum secret sharing based on single qubit. Quan Inf Process (2018) 17:64–13. doi:10.1007/s11128-017-1793-6

CrossRef Full Text | Google Scholar

31. Li L, Li Z. A multi-party quantum key agreement protocol based on Shamir’s secret sharing. Int J Theor Phys (2019) 58:3081–90. doi:10.1007/s10773-019-04187-4

CrossRef Full Text | Google Scholar

Keywords: semi-quantum secret sharing, (t, n) threshold, single particles, efficiency, circular transmission

Citation: Zhou Z, Wang Y, Dou Z, Li J, Chen X and Li L (2023) A (t, n) threshold protocol of semi-quantum secret sharing based on single particles. Front. Phys. 11:1225059. doi: 10.3389/fphy.2023.1225059

Received: 18 May 2023; Accepted: 03 July 2023;
Published: 21 July 2023.

Edited by:

Nanrun Zhou, Shanghai University of Engineering Sciences, China

Reviewed by:

Qin Li, Xiangtan University, China
Dan Li, Nanjing University of Aeronautics and Astronautics, China

Copyright © 2023 Zhou, Wang, Dou, Li, Chen and Li. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Zhao Dou, dou@bupt.edu.cn

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.