Skip to main content

Practical Sharing of Quantum Secrets over Untrusted Channels

  • Conference paper
Information Theoretic Security (ICITS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9063))

Included in the following conference series:

Abstract

In this work we address the issue of sharing a quantum secret over untrusted channels between the dealer and players. Existing solutions require entanglement over a number of systems which scales with the security parameter, quickly becoming impractical. We present protocols (interactive and a non-interactive) where single copy encodings are sufficient. Our protocols work for all quantum secret sharing schemes and access structures, and are implementable with current experimental set ups. For a single authorised player, our protocols act as quantum authentication protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shamir, A.: Commun. ACM 22, 612 (1979)

    Google Scholar 

  2. Blakley, G.R.: Proceedings of the National Computer Conference 48, 313–317 (1979)

    Google Scholar 

  3. Hillery, M., Bužek, V., Berthiaume, A.: Phys. Rev. A 59, 1829 (1999)

    Google Scholar 

  4. Cleve, R., Gottesman, D., Lo, H.K.: Phys. Rev. Lett. 83, 648 (1999)

    Google Scholar 

  5. Ben-Or, M., Crépeau, C., Gottesman, D., Hassidim, A., Smith, A.: 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006, pp. 249–260 (2006)

    Google Scholar 

  6. Barnum, H., Crépeau, C., Gottesman, D., Smith, A., Tapp, A.: Proc. 43rd Annual IEEE Symposium on the Foundations of Computer Science (FOCS 2002), pp. 449–458. IEEE Press (2002)

    Google Scholar 

  7. Broadbent, A., Gutoski, G., Stebila, D.: Quantum One-Time Programs. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 344–360. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  8. Markham, D., Sanders, B.C.: Phys. Rev. A 78(4), 042309 (2008)

    Google Scholar 

  9. Keet, A., Fortescue, B., Markham, D., Sanders, B.C.: Phys. Rev. A 82, 062315 (2010)

    Google Scholar 

  10. Marin, A., Markham, D.: Phys. Rev. A 88, 042332 (2013)

    Google Scholar 

  11. Marin, A., Markham, D., Perdrix, S.: In: TQC 2013. LIPICS, vol. 22, pp. 308–324 (2013)

    Google Scholar 

  12. Bell, B.A., Markham, D., Herrera-Martí, D.A., Marin, A., Wadsworth, W.J., Rarity, J.G., Tame, M.S.: Nature Communications 5, 5480 (2014)

    Google Scholar 

  13. Shor, P.W., Preskill, J.: Phys. Rev. Lett. 85, 441 (2000)

    Google Scholar 

  14. Pappa, A., Chailloux, A., Wehner, S., Diamanti, E., Kerenidis, I.: Phys. Rev. Lett. 108(26), 260502 (2012)

    Google Scholar 

  15. Christandl, M., Winter, A.: IEEE Trans. Inf. Theory 51(9), 3159–3165 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  16. Browne, D.E., Rudolph, T.: Physical Review Letters 95, 010501 (2005)

    Google Scholar 

  17. Rigas, I., Gabriel, C., Berg-Johansen, S., Aiello, A., van Loock, P., Andersen, U.L., Marquardt, C., Leuchs, G.: Quant-ph/1210.5188

    Google Scholar 

  18. Ukai, R., Iwata, N., Shimokawa, Y., Armstrong, S.C., Politi, A., Yoshikawa, J.-I., van Loock, P., Furusawa, A.: Phys. Rev. Lett. 106, 240504 (2011)

    Google Scholar 

  19. Walther, P., Resch, K.J., Rudolph, T., Schenck, E., Weinfurter, H., Vedral, V., Aspelmeyer, M., Zeilinger, A.: Nature 434, 169 (2005)

    Google Scholar 

  20. Barz, S., Kashefi, E., Broadbent, A., Fitzsimons, J.F., Zeilinger, A., Walther, P.: Science 335, 303 (2012)

    Article  MathSciNet  Google Scholar 

  21. Bell, B.A., Herrera-Mart, D.A., Tame, M.S., Markham, M.S., Wadsworth, W.J., Rarity, W.J.: Nature Communications 5, 3658 (2014)

    Google Scholar 

  22. Broadbent, A., Chouha, P.R., Tapp, A.: Proceedings of the Third International Conference on Quantum, Nano and Micro Technologies (ICQNM 2009), pp. 59–62 (2009)

    Google Scholar 

  23. Javelle, J., Mhalla, M., Perdrix, S.: (2011), Preprint at http://arxiv.org/abs/1109.1487

  24. Wunderlich, H., Wunderlich, C., Singer, K., Schmidt-Kaler, F.: Physical Review A 79, 052324 (2009)

    Google Scholar 

  25. Lanyon, B.P., Jurcevic, P., Zwerger, M., Hempel, C., Martinez, E.A., Briegel, W.H.J., Blatt, R., Roos, C.F.: Measurement-based quantum computation with trapped ions. Physical Review Letters 111, 210501 (2013)

    Article  Google Scholar 

  26. Sheridan, L., Scarani, V.: Phys. Rev. A 82, 030301(R) (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Markham, D., Marin, A. (2015). Practical Sharing of Quantum Secrets over Untrusted Channels. In: Lehmann, A., Wolf, S. (eds) Information Theoretic Security. ICITS 2015. Lecture Notes in Computer Science(), vol 9063. Springer, Cham. https://doi.org/10.1007/978-3-319-17470-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17470-9_1

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17469-3

  • Online ISBN: 978-3-319-17470-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics