Font Size: a A A

The Study On Secret Sharing Scheme And Its Application

Posted on:2014-06-14Degree:MasterType:Thesis
Country:ChinaCandidate:H P ChaiFull Text:PDF
GTID:2268330392473547Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer, network communication technology, human society entered the high-tech era of global digital and information technology. How to ensure the security of information is extremely concerned in modern society. Secret sharing theory is widely used in the field of information security, it has a wide application range of data security, bank management, missile control, and many other applications. It can also combine with the key management, digital signatures and authentication password, derived many schemes that have significant value, such as the key management schemes, the digital signature schemes, and the authentication schemes, which further broaden the secret sharing applications. With the rapid increasing of human computing power, especially the quantum parallel algorithms was proposed,the security of classical cryptosystem based on the computational complexity faces serious challenges. Many domestic and foreign scholars turn their attention to quantum information science.Quantum secret sharing (QSS) is an important branch of quantum cryptography, as promotion of the quantum to classical secret sharing.The main researching content of the article includes the following aspects:(1)An efficient trusted multi-party authentication scheme based on threshold secret sharing is proposed.In this scheme, constructed and implemented for multiple users simultaneously-only authentication mode, breaking the limitation of current authentication scheme for user authentication by one single model. Scheme can be dynamically do the system update, other users do not need change the premise of the secret sub-key dynamically add new registered users, update existing user’s password, and delete a user sub-key.(2)A trusted multi-party authentication scheme based on proactive-ElGamal threshold secret sharing system is proposed.The threshold scheme based onsecret sharing, design threshold authentication scheme, it can authenticate t users who meet the conditions, can dynamically addition a new user, update existing users sub-keys and delete a user without changing other users secret sub-key. New users’sub-keys generate by the t old users and the new one,thus reduce system’s communications and computational burden.(3)A fault tolerant quantum secret sharing against collective amplitude-damping noise is proposed. Each logical qubit is encoded in two qubit noiseless states. So it can function over such a noisy channel. The two agents encode their messages on each logical qubit only by performing a permutation operation on two physical qubits. Although each logical qubit received by each agent only carries a bit of information, the boss Alice can read out her agents’information by discriminating two orthogonal states by performing single-qubit measurements assisted by local operation and classical communication (LOCC).This QSS protocol has the following features.(i) Although the three parties should exploit four qubits to create only a bit of private key KA=KB(?)KC in principle, this QSS protocol is immune to collective-amplitude-damping noise.(ii)The two agents Bob and Charlie encode their messages only by performing permutation operation on the received logical qubits, which will simplify the implementation of this QSS protocol in a practical application.(iii) The parties need not exchange classical information for creating their private key xcept for eavesdropping check, which makes this protocol has a high intrinsic efficiency.(iv) Although each logical qubit received by each agent only carries a bit of information, the boss Alice can read out her agents’information by discriminating two orthogonal states by performing single-particle measurements assisted by LOCC.(4)A fault tolerant quantum secret sharing against collective collective-dephasing noise is proposed.Each logical qubit is made up of two physical qubits and is invariant over a collective-noise channel. The information is encoded on logical qubits with two logical unitary operations,which will not destroy the anti-noise trait of the quantum systems. Alice can read out her two agents’message with the channel decoding and von Neumann measurements on the single-photon systems, which will make the protocol more convenient in a practical application with DFS. With each logical qubit transmitted, the three parties can create a bit of private key in principle. Also the exchange of the classical information is not required in the process of creating a private key, but is just used for the eavesdropping check, which makes the protocol have a high intrinsic efficiency. The protocol have the traits of quantum dense coding and fault-tolerant quantum cryptography, so they are more convenient than other QSS protocols with a collective-noise channel.
Keywords/Search Tags:Threshold secret sharing, quantum secret sharing, amplitude-dampingnoise, collective-dephasing noise
PDF Full Text Request
Related items