Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
In addition to secret splitting, secret reconstruction is another important component of secret sharing. In this paper, the first quantum secret reconstruction protocol is proposed to protect the reconstruction process. Before the protocol, a classical secret is divided into multiple shares that are distributed to the shareholds, respectively. In the presented protocol, the dealer utilizes the secret to encrypt a privacy quantum state, and sends the encrypted state to a combiner who is chosen by the dealer within the shareholders. With the help of other shareholders, the combiner utilizes the properties of cluster states to recover the privacy quantum state. It is shown that the proposed protocol is secure against several common attacks, including external and internal attacks. Compared with classical secret reconstruction protocols, this protocol not only achieves information‐theoretic security of all shares, but is also more efficient due to the reduced distribution and computation cost. To demonstrate the feasibility of the protocol, a corresponding simulation quantum experiment is conducted on the IBM Q. Furthermore, in conjunction with quantum fingerprinting, it can be directly applied to achieve the task of quantum multiple secrets sharing, since the classical shares can be reused in the proposed protocol.
In addition to secret splitting, secret reconstruction is another important component of secret sharing. In this paper, the first quantum secret reconstruction protocol is proposed to protect the reconstruction process. Before the protocol, a classical secret is divided into multiple shares that are distributed to the shareholds, respectively. In the presented protocol, the dealer utilizes the secret to encrypt a privacy quantum state, and sends the encrypted state to a combiner who is chosen by the dealer within the shareholders. With the help of other shareholders, the combiner utilizes the properties of cluster states to recover the privacy quantum state. It is shown that the proposed protocol is secure against several common attacks, including external and internal attacks. Compared with classical secret reconstruction protocols, this protocol not only achieves information‐theoretic security of all shares, but is also more efficient due to the reduced distribution and computation cost. To demonstrate the feasibility of the protocol, a corresponding simulation quantum experiment is conducted on the IBM Q. Furthermore, in conjunction with quantum fingerprinting, it can be directly applied to achieve the task of quantum multiple secrets sharing, since the classical shares can be reused in the proposed protocol.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.