1. Introduction
In recent years, with the maturity of quantum theory, quantum communication has developed rapidly. At present, the main branches of quantum communication include quantum key distribution [
1,
2,
3,
4], quantum secret sharing (QSS) [
5,
6,
7,
8], quantum digital signature [
9,
10], quantum authentication [
11,
12], quantum secure direct communication [
13,
14], etc. As an important branch, quantum secret sharing has always been the focus of attention. We usually describe a classic secret sharing as follows: suppose Alice has a secret task that needs to be completed in another place, but she cannot arrive in time. Fortunately, she has two assistants Bob and Charlie at the destination, but Alice does not trust either of them to perform the task alone. So Alice divides her task message into two parts and sends them to Bob and Charlie, respectively. Only the two of them can unite to recover Alice’s mission message, and no one can get Alice’s mission message alone. In this way, we have achieved the goal of managing secrets by multiple people and dispersing risks. However, with the development of science and technology, people have higher and higher requirements for security in the communication process. Classical secret sharing can no longer resist the eavesdropping attacks of modern technology. Since 1999, when Hillery et al. [
5] proposed the first quantum secret sharing scheme (HBB99 protocol) based on the Greenberger–Horne–Zeilinger (GHZ) entangled state, quantum secret sharing has developed rapidly. Many domestic and foreign scholars have used various approaches to construct secret sharing systems, such as quantum error correction code [
15], continuously variable cluster state [
16], dense coding [
17], Grover algorithm [
18], etc.
According to the different methods based on physical resources and carrying information, quantum secret sharing schemes can be roughly divided into three types: the first type is the QSS scheme based on product states [
19,
20,
21,
22]; the second type is the QSS scheme based on single photon [
23,
24,
25,
26,
27,
28]. For example, in 2018, Bai et al. [
26] proposed a new and efficient quantum secret sharing protocol using a d-level single particle, which can realize a general access structure through the idea of cascade. In 2020, Sutradhar et al. [
27] proposed a secure
d-level QSS protocol to share secrets, which could be reconstructed by
t participants without trusted participants. Compared with most QSS protocols, this protocol was more secure, flexible and practical. In 2021, Chou et al. [
28] proposed a novel method to share quantum information and established a
multi-party weighted threshold quantum secret sharing scheme based on the Chinese Remainder Theorem (CRT) and phase shift operation. The third category QSS scheme is based on entanglement [
29,
30,
31,
32,
33,
34]. Among them, in the entangled state-based QSS scheme, researchers have done a lot of work on the efficiency and security of the protocol. In terms of efficiency, Tong Xin et al. [
29] proposed a quantum secret sharing scheme based on GHZ state entanglement exchange in 2007. In this scheme, two GHZ state entanglement exchanges could share 2bit classical messages, which doubled the efficiency compared with the HBB protocol and the KKI protocol [
30]. In 2008, Deng et al. [
31] improved the KKI protocol and proposed an efficient large-capacity key encoding scheme with the efficiency increased to 50%. In 2014, Liao et al. [
32] proposed a three-way dynamic quantum secret sharing scheme based on the GHZ state, which achieved the highest efficiency compared with the existing dynamic quantum secret sharing schemes. In 2019, Song Yun [
33] proposed a quantum secret sharing scheme based on the local measurement of three particle GHZ states. When the number of detected GHZ quantum states is equal to the number of information GHZ quantum states, the efficiency of this scheme can reach 50%, and it does not require unitary operation. Song’s scheme is relatively economical in quantum resources, but limited in the number of participants.
In this paper, we propose a quantum secret sharing scheme based on the particle GHZ state, realize the quantum secret sharing among multiple parties, and the secrets are shared between the two groups. In our scheme, each participant holds a particle sequence of the GHZ state, and the measurement results of the same GHZ state can be found to be related by measurement. Therefore, we use this correlation to detect whether there is external attack in eavesdropping. In the recovery phase, the two groups do not need to exchange any information, and the shared secret can be obtained through the internal measurement and coding of each group, which reduces the external eavesdropping caused by the communication process. In addition, there is no unitary transformation in the transmission of this scheme.
This paper is structured as follows. In
Section 2, we introduce the system definition. In
Section 3, the protocol of the proposed scheme is given. In
Section 4, we consider the intercept-and-resend attack and the entanglement measurement attack, and analyze the security simulation of this scheme. In
Section 5, we analyze the efficiency and compare the performance of the proposed scheme. In
Section 6, the quantum secret sharing schemes based on four-particle GHZ entangled states are listed.
Section 7 gives our conclusion.
2. System Definition
2.1. System Model
In this paper, we construct a QSS scheme, which includes n participants , and the n participants are divided into two groups and with and , where , q is an even number. Participant is the group leader of group , and participant is the group leader of group . This scheme needs to use two GHZ entangled states, respectively, i.e., , , where represents n particles.
2.2. Threat Model
In the attack model, we assume that participants are all honest and fully comply with the rules of this protocol. The external attacker Eve intercepts information through the channel. For the external attacker Eve, we use
to represent the amount of information Eve can acquire, and
f to represent the probability that the cheater is detected. If Eve obtains more than half of the information
, and the probability of being detected is greater than
at the same time, the number of detected particles
(see
Section 4.3 for the proof process). In other words, as the number of detected particles
L increases with
, the probability of Eve being detected increases. Therefore, in the example of
Section 6, we choose the number of detected particles
.
In addition, there is no need to communicate with each other through any classical channel or quantum channel for each group of participants in the same laboratory, and there is no possibility of external eavesdropping in the same laboratory.
3. Quantum Secret Sharing Scheme Based on n Particle GHZ State
3.1. Initial Stage
The measurement bases are
and
, which can be expressed as follows:
By calculating, the basis
can be expressed as
where
.
3.2. Distribution Stage
Participant randomly prepares a sequence of GHZ states consisting of , where . Then, the first particle in each GHZ state is reserved, and the second to the particle in each GHZ state are sent to , respectively. At the same time, the remaining q particles are sent to , respectively, as in the above. In this way, each participant obtained a sequence of particles. We use to represent these particle sequence of participants , respectively, and to do the particle sequence of participants .
3.3. Measurement Phase
After confirming that everyone has received these particles, randomly extracts some particles from his sequence as the detection particles, and informs others of the position of the detection particles (i.e., which particles in will be the detection particles). All participants in group use the base for measurement, and designates group to use the base or for measurement. For the entangled states and , the following four measurements may occur.
If group
and
use base
and
to measure
, respectively, then
If group
and
use base
and
to measure
, respectively, then
where t is an integer.
If group
and
use base
and
to measure
, respectively, then
If group
and
use base
and
to measure
, respectively, then
From the above four measurement results, it can be found that the detection results of
n participants are correlated (
Table A1 and
Table A2 in
Appendix A); that is, as long as the measurement results of any
participants are confirmed, the measurement results of the last participant can be accurately judged without any operation and measurement.
3.4. Detection Stage
After the two groups and were measured according to the requirements, the group leader randomly asked the members of these two groups to make public the sequence of measurement results, but did not make public his own measurement results. Then, he checked whether the correlation was satisfied according to the published results from participants and his own measurement results. Next, compares the measurement results with the initial state. If the measurement result is different from the initial state, ask to stop this round and start a new round. Otherwise, it continues to execute.
3.5. Recovery Phase
The participants of groups and , respectively, measure the remaining particles in their particle sequences, where the participants of group measure particles with the base , and the members of group measure particles with base or . Then they encode these measurement results as binary numbers.The encoding method of participants from group is: the measurement result is , corresponding to binary number 0, and the measurement result is , corresponding to binary number 1. Thus, each participant in group receives a string of private key sequence . Since knows every GHZ state, he encodes the entangled state into a binary sequence ; that is, the entangled state corresponds to the binary number 0 and corresponds to the binary number 1. The coding method of participants from group is: the measurement result is or , corresponding to binary number 0, and or , corresponding to binary number 1. In this way, each participant receives a private key sequence . In addition, the members from group encode the used measurement basis into a sequence of binary key . That is, the measurement basis corresponds to the binary numbers 0,1, respectively. Next, let denote the keys from the group , and the keys from the group ; then the final secret message K can be obtained in the following ways:
(1) When , and can be obtained by , , where and satisfy with . Then the secret message , .
(2) When , and can be obtained by , , where and satisfy with . Then the secret message , .
4. Safety Analysis
In this section, we analyze the security of the proposed scheme, and use MATLAB simulation analysis to show the relationship between the amount of information the adversary can obtain and the probability of being discovered.
4.1. Intercept-and-Resend Attack
We assume that the eavesdropper is Eve, she intercepts the particles sent by participant . After measurement, she forges a particle sequence with the same measurement result and sends it to the other participant. Only the particles from group are transmitted through the quantum channel in the distribution stage. Eve can only intercept the particles from group . However, the fake particle sequence of Eve has no correlation with the particles of , which means that Eve may have been detected in the detection stage. If Eve chooses the correct measurement base and sends faked identical particles to group participants after measurement, the detection can be evaded; if the measurement basis used by Eve is different from that used by participants from group , there is a probability that Eve will not be detected according to the correlation. We consider the worst case here, i.e., if Eve intercepts all particles sent to group and chooses the correct measurement base, then forges the same particle as the measurement result and sends it to the participants from group , the probability that Eve successfully evades detection and obtains GHZ information for a GHZ state is . Let us say there are w GHZ states in total, and Eve has a probability of getting the secret message K without being discovered. When the number of GHZ states increases, that is, w increases, the probability of Eve being detected increases. However, for ordinary attackers, the probability of Eve successfully avoiding eavesdropping and obtaining secret messages is much less than .
4.2. Entanglement Measurement Attack
In this protocol, the particle states during transmission are all in the maximum mixed state, that is,
, and Eve cannot distinguish them directly. Therefore, Eve chose to perform an eavesdropping operation to obtain more information about a GHZ state where she tries to entangle the additional particle with a particle in a GHZ state in the quantum channel, and measure that additional particle. According to Stinespring’s extension theorem [
35], Eve’s eavesdropping operation may occur on a larger Hilbert space. Let the unitary operator
act on
and the additional particle
; then we can obtain a complex system quantum state
. That is,
, where the dimension of the additional particle is not limited. Participants measure the quantum state
in the recovery phase, and the composite system has the following cases:
(1) Groups
and
measure
with the basis
and
, respectively; then the composite system space can be expressed as
(2) Groups and measure with the basis and , respectively; then the composite system space can be expressed as
According to the above situation, if Eve’s actions did not trigger an error rate in the detection phase. The equation
must be satisfied. Therefore, the above cases are denoted as
According to Equations (10) and (11), the composite quantum state of the additional particle and the GHZ states particle is always a product state without the error rate occurring. Therefore, the entanglement measurement attack is unsuccessful.
4.3. Analysis of Safety Simulation Model
From these two attacks, it can be seen that the error rate occurred with Eve is closely related to the probability that she can successfully evade detection. Next, let us analyze the relationship between them. When Eve wants to entangle the additional particles with the GHZ state in order to eavesdrop messages, the composite system state composed of Eve’s additional particles and GHZ is an entangled state
. Let
denote the amount of information that Eve can extract from the entangled state
, and
denote the error probability that occurred with Eve. According to ref. [
36],
and
have the following relationship:
If there are L GHZ states as the detection quantum states in the detection stage, the probability f of Eve being detected is .
From the above analysis, security model equations can be obtained:
Considering the value of the number of detection particles L, and performing simulation analysis through MATLAB,
Figure 1 can be obtained.
From the above analysis, it can be seen that both the amount of information acquired by Eve and the probability of Eve being detected increase with increases in the error probability
. When the error probability is the same, the greater the number of detected particles, the higher the probability of Eve being detected. From Equation (
13) and this above figure, when the error probability
, the amount of information Eve can obtain reaches the maximum value 1, at which the information about the GHZ state can be obtained completely. The information obtained by Eve is
, and the probability of Eve being detected is
. The number of detected particles
can be obtained by solving. That is to say, as the number of detected particles
L increases with
, the probability of Eve being detected increases. Therefore, in the example of
Section 6, we choose the number of detected particles
.
In addition, the probability of Eve being detected will increase as a convex function when the number of detected particles is small, then the probability of Eve being detected when acquiring information at the initial state is small and the security is low; in contrast, when the number of detected particles is large, the probability of Eve being detected will increase as a concave function. Although the amount of information obtained in the initial state is small, the probability of Eve being detected is very large, and the security of the scheme is increased. Therefore, when the number of detected particles is larger, the security of the protocol is higher. Let , that is, when the error that occurred with Eve is about 0, , this result is consistent with the result of entanglement measurement attack analysis.
5. Performance Comparison
In the following, we compare and analyze the literature [
34,
37,
38,
39] with our scheme from five aspects: using quantum states, space dimension, detecting quantum states, information efficiency and achievable threshold. The common point between these studies and our scheme is that they all use local discrimination to realize secret sharing. First, efficiency is an important criterion for judging an agreement. Cabello [
40] defines a qubit usage efficiency formula
, where
represents the total number of qubits transmitted in the quantum channel, and
represents the total number of shared classical bits. According to the efficiency formula, our scheme will share
m bits of classical information, and its efficiency is
, where
L represents the number of GHZ states as eavesdropping detection. As can be seen from
Table 1,
l GHZ states in the Rahaman scheme [
37] are used to share
m secret bits, since
GHZ states are used to check eavesdropping. Then the information efficiency of their scheme is
. If the number of eavesdropping particles is
, the information efficiency of their scheme is the same as ours. The Bai scheme [
39] uses
m GHZ states to share
m secret bits, and
u single photons are prepared for each particle sequence as detection particles. Then it uses
photons for sharing
m bit information among
n participants. Therefore, the information efficiency of Bai’s scheme is
. For the Yang scheme [
38] and our scheme,
m GHZ states are used to share
m secret bits, and
L GHZ states are applied to detect eavesdropping. Therefore, the information efficiency of both schemes is
. The scheme of Li [
34] uses
two-dimensional generalized Bell states to share
m secret bits, and each participant prepares
single photons as detection particles. Therefore, this scheme with
n participants has
single photons for eavesdropping detection, so the information efficiency is
. Compared with the scheme of Li [
34], our scheme reduces the number of eavesdropping particles, and each GHZ state corresponds to sharing one bit of classical information, so the information efficiency is improved.
From the point of view of resources, although Rahaman’s scheme, Yang’s scheme, Bai’s scheme and our scheme all use the GHZ state with n particles as the transmission state, the particles of the GHZ state in our scheme and Rahaman’s scheme are taken from the two-dimensional space, while each particle of the GHZ state in Yang’s scheme and Bai’s scheme is taken from the high-dimensional space. Here we denote the dimension of the space as . By comparison of these two kinds of quantum states, obviously, the quantum state in our paper is easier to prepare and the cost will be lower. Li’s scheme uses the generalized Bell state as the transmission state. Each state contains two particles which also come from the high-dimensional space. Therefore, compared with Li’s paper, the particles required by Li are more difficult to prepare.
6. Example
This protocol is extended to the quantum secret sharing scheme of the
particle GHZ state. When
, the detailed protocol process is given in Song’s scheme [
33]. In her protocol, Alice is equivalent to the leader
of group
, Bob is equivalent to the leader
of group
, and Charlie is equivalent to other members of group
. Alice prepares a list of GHZ entangled states arbitrarily, and keeps the first particle of each GHZ state, then sends the second particle and the third particle to Bob and Charlie, respectively. In the measurement phase, Alice measures the particle with
base, Bob and Charlie measure with the same base
or
, and encode the result into binary numbers according to the same method as our protocol. It is easy to verify that Bob and Charlie together can restore Alice’s secret. Since the simulation model analysis detects the number of eavesdropping quantum states
, Song’s scheme is safe. Therefore, this paper takes
and
as an example to implement the protocol in detail.
6.1. Protocol Process
6.1.1. Initial Stage
There are four participants who are divided into two groups
and
, with
and
. The structure is shown in
Figure 2. As shown in
Figure 2, these two groups only have unique communication in the distribution stage, and the same secret is obtained through coding.
6.1.2. Distribution Stage
Two groups of participants
prepare a column of four particles GHZ. They are as follows:
Participant
keeps the first particle in each GHZ state, and sends the second particle to
of Group
, then sends the third and fourth particles to
and
of group
through the quantum channel. Thus, each participant holds a sequence of particles. We use
to represent the particle groups of participants
, respectively. The structure is shown as (I) in
Figure 3.
6.1.3. Measurement Phase
After confirming that the other three participants have received particles, participant
selects the second, third, fifth and eighth particles as the detection particles, and informs the other three participants of the location of these detection particles, The process is shown as (II) in
Figure 3. All participants in group
are measured with base
, while
assigns the second and fifth particles in group
to be measured with base
, and the third and eighth particles to be measured with base
. Then the measurement results of the extracted three GHZ quantum states may appear as the following:
According to the above results, we can find that the measurement results of the four participants are correlated, The measurement results are shown in
Figure 3III.
6.1.4. Detection Stage
After the four participants measured completely,
randomly asked the other three participants to make public the order of measurement results, but did not make public his own measurement results.
tested whether the correlation between
Table A1 and
Table A2 (in
Appendix A) was satisfied according to the public results of the other three participants and his own measurement results. Here, we calculate a threshold considering the error rate of the quantum channel during transmission. If the error rate of the detection result is higher than this threshold, the communication will be abandoned. Otherwise, the agreement continues.
6.1.5. Recovery Phase
Members of two groups
and
measure the remaining four particles, respectively. Group
uses the basis
for all measurements, and
uses the basis
to measure four particles, respectively. Since the measurement results of each particle may have two results, it is advisable to assume that the measurement results of the four particles held by
are
, respectively. Thus, the original four GHZ entangled states collapse into the following situations:
The two groups of participants code after each measurement:
Thus, groups
and
recover the secret message
and
, respectively. The result is shown as (IV) in
Figure 3.
6.2. Efficiency Analysis
In the above example, the number L of detected quantum states is equal to 4 and the number m of the classical bits shared by four participants is equal to 4. Therefore, according to the efficiency formula , the efficiency of this example is .
6.3. Security Simulation Model Analysis
From the above, the number L of detected quantum states is equal to 4. The result is substituted into equation system (13) to obtain the following equation system
Figure 4 can be obtained by simulation analysis with MATLAB.
As can be seen from
Figure 4, when the probability of detection of the external attacker Eve is
, the information she can obtain is less than 1. Under such circumstance, we believe that this scheme is safe enough.