Efficient Three-Party Quantum Secret Sharing with Single Photons
HOU Ping 1,2, LI Xi-Han 1,2, DENG Fu-Guo 1,2,3, ZHOU Hong-Yu 1,2,3
1Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 1008752Institute of Low Energy Nuclear Physics, and Department of Material Science and Engineering, Beijing Normal University, Beijing 1008753Beijing Radiation Center, Beijing 100875
Efficient Three-Party Quantum Secret Sharing with Single Photons
1Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 1008752Institute of Low Energy Nuclear Physics, and Department of Material Science and Engineering, Beijing Normal University, Beijing 1008753Beijing Radiation Center, Beijing 100875
摘要A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice who checks the security of the transmission with measurements and produces some decoy photons by rearranging the orders of some sample photons. Alice encodes her bits with two unitary operations on the photons and then sends them to the other agent. The security of this scheme is equivalent to that in the modified Bennett--Brassard 1984 quantum key distribution protocol. Moreover, each photon can carry one bit of the private key and the intrinsic efficiency for qubits and the total efficiency both approach the maximal value 100% when the number of the bits in the key is very large.
Abstract:A scheme for three-party quantum secret sharing of a private key is presented with single photons. The agent Bob first prepares a sequence of single photons with two biased bases and then sends them to the boss Alice who checks the security of the transmission with measurements and produces some decoy photons by rearranging the orders of some sample photons. Alice encodes her bits with two unitary operations on the photons and then sends them to the other agent. The security of this scheme is equivalent to that in the modified Bennett--Brassard 1984 quantum key distribution protocol. Moreover, each photon can carry one bit of the private key and the intrinsic efficiency for qubits and the total efficiency both approach the maximal value 100% when the number of the bits in the key is very large.
[1] Nielsen M A and Chuang I L Quantum Computationand Quantum Information (Cambridge: Cambridge University Press) [2] Gisin N, Ribordy G, Tittel W and Zbinden H 2002 Rev. Mod. Phys. 74 145 [3] Bennett C H and Brassad G 1984 Proc. IEEE Int. Conf. Computers, Systemsand Signal Processing (Bangalore, India (New York: IEEE) p175 [4] Long G L and Liu X S 2002 Phys. Rev. A 65 032302 [5] Deng F G and Long G L 2003 Phys. Rev. A 68 042315 [6] Deng F G and Long G L 2004 Phys. Rev. A 70012311 [7] Lo H K et al 2005 J. Cryptology 18 122 [8] Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68042317 [9] Deng F G and Long G L 2004 Phys. Rev. A 69052319 Deng F G and Long G L 2006 Commun. Theor. Phys. 46 443 [11] Wang C et al 2005 Phys. Rev. A 71 044305 Wang C et al 2005 Opt. Commun. 253 15 [12] Deng F G et al 2006 Phys. Lett. A 359 359 [13] Hillery M, Bu\v{zek V and Berthiaume A 1999 Phys. Rev.A 59 1829 [14] Karlsson A, Koashi M and Imoto N 1999 Phys. Rev. A 59 162 [15] Xiao L et al 2004 Phys. Rev. A 69 052307 Deng F G et al 2004 Chin. Phys. Lett. 21 2097 [16] Deng F G et al 2005 Phys. Lett. A 340 43 [17] Bandyopadhyay S 2000 Phys. Rev. A 62 012308 [18] Chen P et al 2006 Chin. Phys. 15 2228 [19] Guo G P and Guo G C 2003 Phys. Lett. A 310 247 [20] Deng F G et al 2005 Phys. Lett. A 337 329 [21] Deng F G, Zhou H Y and Long G L 2006 J. Phys. A 3914089 [22] Yan F L and Gao T 2005 Phys. Rev. A 72 012304 [23] Zhang Z J et al 2005 Phys. Rev. A 71 044301 [24] Deng F G et al 2005 Phys. Rev. A 72 044302 [25] Li Y M, Zhang K S and Peng K C 2004 Phys. Lett. A 324 420 [26] Deng F G et al 2005 Phys. Rev. A 72 044301 Deng F G et al 2005 Phys. Rev. A 72 022338 [27] Li X H et al 2006 J. Phys. B 39 1975 Deng F G et al 2006 Eur. Phys. J. D 39 459 Li X H et al 2007 Chin. Phys. Lett. 24 1151 [28]Zhang Z J 2005 Eur. Phys. J. D 33133 Zhang Y Q, Jin X R and Zhang S 2006 Chin. Phys. 152252 [29] Man Z X, Xia Y J and An N B 2007 Eur. Phys. J. D 42 333 [30] Deng F G, Li X H and Zhou H Y 2007 Phys. Rev. A(submitted) [31] Li X H et al 2006 Phys. Rev. A 74 054302 [32] Li C Y et al 2005 Chin. Phys. Lett. 22 1049 [33] Li X H et al 2006 J. Korean Phys. Soc. 49 1354 [34] Deng F G et al 2006 Chin. Phys. Lett. 23 1676 [35] Li C Y et al 2006 Chin. Phys. Lett. 23 2896 [36] Deng F G et al 2006 Chin. Phys. Lett. 23 1084 [37] Zhou P et al 2007 Physica A 381 164 [38] Cai Q Y 2006 Phys. Lett. A 351 23