ID: quant-ph/0506194

Improving the security of multiparty quantum secret sharing against Trojan horse attack

June 23, 2005

View on ArXiv
Fu-Guo Deng, Xi-Han Li, Hong-Yu Zhou, Zhan-jun Zhang
Quantum Physics

We analyzed the security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang, Li and Man [Phys. Rev. A \textbf{71}, 044301 (2005)] and found that this protocol is secure for any other eavesdropper except for the agent Bob who prepares the quantum signals as he can attack the quantum communication with a Trojan horse. That is, Bob replaces the single-photon signal with a multi-photon one and the other agent Charlie cannot find this cheating as she does not measure the photons before they runs back from the boss Alice, which reveals that this MQSS protocol is not secure for Bob. Finally, we present a possible improvement of the MQSS protocol security with two single-photon measurements and six unitary operations.

Similar papers 1

Addendum to "Quantum secret sharing between multiparty and multiparty without entanglement"

August 23, 2005

92% Match
Fu-Guo Deng, Feng-Li Yan, Xi-Han Li, Chun-Yan Li, ... , Gao Ting
Quantum Physics

Recently, Yan and Gao proposed a quantum secret sharing protocol between multiparty ($m$ members in group 1) and multiparty ($n$ members in group 2) using a sequence of single photons (Phys. Rev. A \textbf{72}, 012304 (2005)). We find that it is secure if the quantum signal transmitted is only a single photon but insecure with a multi-photon signal as some agents can get the information about the others' message if they attack the communication with a Trojan horse. However, s...

Find SimilarView on arXiv

Multiparty Mediated Quantum Secret Sharing Protocol

February 13, 2021

91% Match
Chia-Wei Tsai, Chun-Wei Yang, Jason Lin
Cryptography and Security

This study proposes a multiparty mediated quantum secret sharing (MQSS) protocol that allows n restricted quantum users to share a secret via the assistance of a dishonest third-party (TP) with full quantum capabilities. Under the premise that a restricted quantum user can only perform the Hadamard transformation and the Z-basis measurement, the proposed MQSS protocol has addressed two common challenges in the existing semi-quantum secret sharing protocols: (1) the dealer mus...

Find SimilarView on arXiv

Improving the security of multiparty quantum secret splitting and quantum state sharing

May 6, 2006

89% Match
Hong-Fu Wang, Xin Ji, Shou Zhang
Quantum Physics

A protocol for multiparty quantum secret splitting (MQSS) with an ordered $N$ Einstein-Podolsky-Rosen (EPR) pairs and Bell state measurements is recently proposed by Deng {\rm et al.} [Phys. Lett. A 354(2006)190]. We analyzed the security of the protocol and found that this protocol is secure for any other eavesdropper except for the agent Bob who adopts intercept-and-resend attack. Bob can obtain all the information of Alice's alone without being found. We also propose an im...

Find SimilarView on arXiv

Eavesdropping on the improved three-party quantum secret sharing protocol

January 11, 2011

89% Match
Gan Gao
Quantum Physics

Lin et al. [S. Lin, F. Gao, Q.-y. Wen, F.-c. Zhu, Opt. Commun. 281 (2008) 4553] pointed that the multiparty quantum secret sharing protocol [Z.-j. Zhang, G. Gao, X. Wang, L.-f. Han, S.-h. Shi, Opt. Commun. 269 (2007) 418] is insecure and proposed an improved three-party quantum secret sharing protocol. In this paper, we study the security of the improved three-party quantum secret sharing protocol and find that it is still insecure. Finally, a further improved three-party qua...

Find SimilarView on arXiv

Quantum secret sharing between multiparty and multiparty with four states

January 28, 2006

89% Match
Yan Fengli, Gao Ting, Li Youcheng
Quantum Physics

An protocol of quantum secret sharing between multiparty and multiparty with four states is presented. We show that this protocol can make the Trojan horse attack with a multi-photon signal, the fake-signal attack with EPR pairs, the attack with single photons, and the attack with invisible photons to be nullification. In addition, we also give the upper bounds of the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with ...

Find SimilarView on arXiv

Comment on "Cryptanalysis and improvement of multiparty quantum secret sharing schemes"

July 22, 2011

89% Match
Gan Gao
Quantum Physics

We show that, using Wang et al. attack [T.-y. Wang, Q.-y. Wen, F. Gao, S. Lin, F.-c. Zhu, Phys. Lett. A 373 (2008) 65], the first agent and the last agent cannot eavesdrop all the secret messages in Zhang et al. QSSCM scheme [Z.-j. Zhang, G. Gao, X. Wang, L.-f Han, S.-h. Shi, Opt. Commun. 269 (2007) 418]. In some sense, Wang et al. attack is unsuccessful for Zhang et al. QSSCM scheme.

Find SimilarView on arXiv

Lightweight Mediated Semi-Quantum Secret Sharing Protocol

October 14, 2020

89% Match
Chia-Wei Tsai, Zong-Liang Zhang, ... , Chang Yao-Chung
Cryptography and Security

Due to the exiting semi-quantum secret sharing protocol have two challenges including (1) the dealer must be the quantum user, and (2) the classical users must equip with the Trojan Horse detectors, this study wants to propose a novel mediate semi-quantum secret sharing (MSQSS) protocol to let a classical dealer can share his/her secrets to the classical agents with the help of a dishonest third-party (TP). The proposed MSQSS protocol adopts the one-way quantum communication ...

Find SimilarView on arXiv

Improving the security of multiparty quantum secret sharing based on entanglement swapping against participant attack

December 9, 2006

89% Match
Song Lin, Fei Gao, Fen-Zhuo Guo, ... , Zhu Fu-Chen
Quantum Physics

In a recent paper [Z. J. Zhang and Z. X. Man, Phys. Rev. A 72, 022303(2005)], a multiparty quantum secret sharing protocol based on entanglement swapping was presented. However, as we show, this protocol is insecure in the sense that an unauthorized agent group can recover the secret from the dealer. Hence, we propose an improved version of this protocol which can stand against this kind of attack.

Find SimilarView on arXiv

Robustness of two-way quantum communication protocols against Trojan horse attack

August 23, 2005

89% Match
Fu-Guo Deng, Ping Zhou, Xi-Han Li, ... , Zhou Hong-Yu
Quantum Physics

We discuss the robustness of two-way quantum communication protocols against Trojan horse attack and introduce a novel attack, delay-photon Trojan horse attack. Moreover, we present a practical way for two-way quantum communication protocols to prevent the eavesdropper from stealing the information transmitted with Trojan horse attacks. It means that two-way quantum communication protocols is also secure in a practical application.

Find SimilarView on arXiv

Experimental Quantum Secret Sharing and Third-Man Quantum Cryptography

February 21, 2005

89% Match
Yu-Ao Chen, An-Ning Zhang, Zhi Zhao, Xiao-Qi Zhou, Chao-Yang Lu, Cheng-Zhi Peng, ... , Pan Jian-Wei
Quantum Physics

Quantum secret sharing (QSS) is a protocol to split a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. In the scheme, three parties Alice, Bob and Charlie first share a three-photon entangled state, Charlie can then force Alice and Bob to cooperate to be able to establish the secret key with him by performing proper polarization measurements on his photon and announcing which polarization basis he has chosen. In a...

Find SimilarView on arXiv