Abstract
Generalizing the notion of dynamic quantum secret sharing (DQSS), a simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is proposed and it is shown that the protocol can be implemented using any existing protocol of quantum key distribution, quantum key agreement or secure direct quantum communication. The security of this proposed protocol against eavesdropping and collusion attacks is discussed with specific attention towards the issues related to the composability of the subprotocols that constitute the proposed protocol. The security and qubit efficiency of the proposed protocol is also compared with that of other existing protocols of DQSS. Further, it is shown that it is possible to design a semi-quantum protocol of HDQSS and in principle, the protocols of HDQSS can be implemented using any quantum state. It is also noted that the completely orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS can be experimentally realized using a large number of alternative approaches.
Similar content being viewed by others
References
Bennett, C.H., Brassard, G.: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, p. 175 (1984)
Ekert, A. K. Phys. Rev. Lett. 67, 661 (1991)
Bennett, C. H.: Phys. Rev. Lett. 68, 3121 (1992)
Goldenberg, L., Vaidman, L.: Phys. Rev. Lett. 75, 1239 (1995)
Noh, T.-G.: Phys. Rev. Lett. 103, 230501 (2009)
Hillery, M., Buzek, V., Bertaiume, A.: Phys. Rev. A 59, 1829 (1999)
Bostrom, K., Felbinger, T.: Phys. Rev. Lett. 89, 187902 (2002)
Lucamarini, M., Mancini, S. Phys. Rev. Lett. 94, 140501 (2005)
Li, X. H., et al.: J. Korean Phys. Soc. 49, 1354 (2006)
Yan, F. L., Zhang, X.: Euro. Phys. J. B41, 75 (2004)
Zhang, Q.-n., Li, C.-c., Li, Y. -h., Nie, Y.-y.: Int. J. Theor. Phys. 52, 22 (2013)
Srinatha, N., Omkar, S., Srikanth, R., Banerjee, S., Pathak, A.: Quant. Inf. Process 13, 59 (2014)
Shukla, C., Pathak, A.: Phys. Lett. A 377, 1337 (2013)
Long, G. L., Liu, X. S.: Phys. Rev. A 65, 032302 (2002)
Degiovanni, I.P., et al.: Phys. Rev. A 69, 032310 (2004)
Cai, Q.Y., Li, B. W.: Phys. Rev. A 69, 054301 (2004)
Liu, J., et al.: Chin. Phys. Lett. 23, 2652 (2006)
Man, Z. X., Zhang, Z. J., Li, Y.: Chin. Phys. Lett. 22, 18 (2005)
Hwang, T., Hwang, C. C., Tsai, C. W.: Euro. Phys. J. D 61, 785 (2011)
Zhu, A. D., Xia, Y., Fan, Q. B., Zhang, S.: Phys. Rev. A 73, 022338 (2006)
Cao, H. J., Song, H. S.: Chin. Phys. Lett. 23, 290 (2006)
Yuan, H., et al.: Int. J. Theor. Phys. 50, 2403 (2011)
Man, Z.-X., Xia, Y.-J., An, N. B.: J. Phys. B 39, 3855 (2006)
Shukla, C., Kothari, V., Banerjee, A., Pathak, A.: Phys. Lett. A 377, 518 (2013)
Hsu, J.-L., Chong, S.-K., Hwang, T., Tsai, C.-W.: Quant. Inf. Process 12, 331 (2013)
Liao, C.-H., Yang, C.-W., Hwang, T.: Quant. Inf. Process 13, 1907 (2014)
Jia, H.-Y., Wen, Q.-Y., Gao, F., Qin, S.-J., Guo, F.-Z.: Phys. Lett. A 376, 1035 (2012)
Wang, T.-Y., Li, Y.-P.: Quant. Inf. Process 12, 1991 (2013)
Liao, C.-H., Yang, C.-W., Hwang, T.: Quant. Inf. Process. 12, 3143 (2013)
Shukla, C., Pathak, A., Srikanth, R.: Int. J. Quantum Info. 10, 1241009 (2012)
Yu, K.-F., Yang, C.-W., Liao, C.-H., Hwang, T.: Quantum Info. Process 13, 1457 (2014)
Shukla, C., Banerjee, A., Pathak, A., Srikanth, R.: preprint arXiv:1407.3412 (2014)
Aravinda, S., Banerjee, A., Pathak, A., Srikanth, R. (2014). arXiv:1409.8505
Wehner, S., Wullschleger, J. Composable security in the bounded-quantum-storage model. In: Automata, Languages and Programming, pp. 604–615. Springer, Berlin (2008)
Capmany, J., Fernandez-Pousa, C. R.: J. Opt. Soc. Am. B 27, A146 (2010)
Kumavor, P.D., Beal, A. C., Yelin, S., Donkor, E.: J. Lightwave Tech. 23, 268 (2005)
Michael, B.-O., Horodecki, M., Leung, D. W., Mayers, D., Oppenheim, J.: Lect. Notes Comput. Sci. 3378, 386–406 (2005)
Michael, B.-O., Mayers, D. arXiv:quant-ph/0409062 (2004)
Peter, W. S., Preskill, J.: Phys. Rev. Lett. 85, 441 (2000)
Canetti, R.: J. Cryptol. 13, 143 (2000)
Backes, M., Pfitzmann, B., Waidner. M.: A Universally Composable Cryptographic Library. IACR Cryptology ePrint Archive 2003, 15 (2003) http://eprint. iacr.org/2003/015
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of the 42th Annual IEEE Symposium on Foundations of Computer Science (FOCS ’01), 136 (2001). Updated Version at http://eprint.iacr.org/2000/067
Unruh, D. arXiv:quant-ph/0409125 (2004)
Tsai, C. W., Hsieh, C. R., Hwang, T.: Eur. Phys. J. D 61, 779 (2011)
Hwang, T., Hwang, C. C., Tsai, C. W.: Eur. Phys. J. D 61, 785 (2011)
Banerjee, A., Pathak, A.: Phys. Lett. A 376, 2944 (2012)
Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, New Delhi (2008)
Shukla, C., Banerjee, A., Pathak, A.: Int. J. Theor. Phys. 52, 1914 (2013)
Cabello, A.: Phys. Rev. Lett. 85, 5635 (2000)
Acknowledgments
A. P. thanks the Department of Science and Technology (DST), India, for the support provided through DST project No. SR/S2/LOP-0012/2010.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mishra, S., Shukla, C., Pathak, A. et al. An Integrated Hierarchical Dynamic Quantum Secret Sharing Protocol. Int J Theor Phys 54, 3143–3154 (2015). https://doi.org/10.1007/s10773-015-2552-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-015-2552-z