JOURNAL ARTICLE

A Verifiable $(t, n)$ Threshold Quantum State Sharing Against Denial Attack

Xiuli SongYanbing LiuMin XiaoHongyao Deng

Year: 2019 Journal:   IEEE Access Vol: 7 Pages: 98908-98920   Publisher: Institute of Electrical and Electronics Engineers

Abstract

To detect frauds by a dealer or some participants, researchers have proposed verifiable threshold quantum state sharing (VTQSTS) schemes. However, the existing VTQSTS schemes either have lowcomputation efficiency or weak security. In this paper, a verifiable (t, n) threshold quantum state sharing against denial attack (VTQSTS-ADA) scheme is proposed to overcome the above limitations, in which the dealer Alice encodes the quantum secret sequence into two quantum message sequences and a quantum signature sequence. First, for each participant in the authorization subset, the received quantum signature sequence is validated by a quantum verification algorithm, and then a unitary transformation with a rotation key is performed on the received quantum message sequence; next, a new quantum signature sequence is generated by a quantum signature algorithm with the signature key. Each participant sends the new message sequences and signature sequence to the next participant. The original quantum secret sequence can be reconstructed when t(t ≤ n) participants collaborate. The security analysis shows that the proposed VTQSTS-ADA scheme can detect the fraud instances raised by the dealer and participants and provide stronger security such as resisting denial attacks and man-in-middle attacks compared with the existing schemes. The performance analysis shows that the proposed VTQSTS-ADA scheme outperforms the earlier VTQSTS scheme and is comparable to the recent scheme.

Keywords:
Verifiable secret sharing Computer science Sequence (biology) Signature (topology) Quantum Theoretical computer science Blind signature Computer security Merkle signature scheme Security analysis Algorithm Digital signature Hash function Mathematics Physics Quantum mechanics

Metrics

8
Cited By
0.46
FWCI (Field Weighted Citation Impact)
53
Refs
0.71
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Quantum Information and Cryptography
Physical Sciences →  Computer Science →  Artificial Intelligence
Quantum Computing Algorithms and Architecture
Physical Sciences →  Computer Science →  Artificial Intelligence
Quantum Mechanics and Applications
Physical Sciences →  Physics and Astronomy →  Atomic and Molecular Physics, and Optics

Related Documents

JOURNAL ARTICLE

Verifiable ( t , n ) threshold quantum secret sharing using d -dimensional Bell state

Huawang QinYuewei Dai

Journal:   Information Processing Letters Year: 2016 Vol: 116 (5)Pages: 351-355
JOURNAL ARTICLE

Verifiable Threshold Quantum State Sharing Scheme

Hao CaoWenping Ma

Journal:   IEEE Access Year: 2018 Vol: 6 Pages: 10453-10457
JOURNAL ARTICLE

Verifiable quantum (k, n)-threshold secret sharing

Yu‐Guang YangXin JiaHongyang WangHua Zhang

Journal:   Quantum Information Processing Year: 2011 Vol: 11 (6)Pages: 1619-1625
JOURNAL ARTICLE

A Verifiable Dynamic (t,n)$(t, n)$ Threshold Quantum Secret Sharing Protocol with Authentication

J. -C. LiMing‐Ming Wang

Journal:   Advanced Quantum Technologies Year: 2025 Vol: 8 (11)
© 2026 ScienceGate Book Chapters — All rights reserved.