Next Article in Journal
Kinetic Theory and Memory Effects of Homogeneous Inelastic Granular Gases under Nonlinear Drag
Next Article in Special Issue
APR-QKDN: A Quantum Key Distribution Network Routing Scheme Based on Application Priority Ranking
Previous Article in Journal
A Quantile General Index Derived from the Maximum Entropy Principle
Previous Article in Special Issue
Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Party Quantum Secret Sharing Based on GHZ State

School of Mathematics and Statistics, Shaanxi Normal University, Xi’an 710119, China
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(10), 1433; https://doi.org/10.3390/e24101433
Submission received: 6 September 2022 / Revised: 30 September 2022 / Accepted: 4 October 2022 / Published: 8 October 2022
(This article belongs to the Special Issue Practical Quantum Communication II)

Abstract

:
In this paper, we propose an efficient multi-party quantum secret sharing scheme based on GHZ entangled state. The participants in this scheme are divided into two groups, and share secrets as a group. There is no need to exchange any measurement information between the two groups, reducing the security problems caused by the communication process. Each participant holds one particle from each GHZ state; it can be found that the particles of each GHZ state are related after measuring them, and the eavesdropping detection can detect external attacks based on this characteristic. Furthermore, since the participants within the two groups encode the measured particles, they can recover the same secrets. Security analysis shows that the protocol can resist the intercept-and-resend attack and entanglement measurement attack, and the simulation results show that the probability of an external attacker being detected is proportional to the amount of information he can obtain. Compared with the existing protocols, this proposed protocol is more secure, has less quantum resources and is more practical.

1. Introduction

In recent years, with the maturity of quantum theory, quantum communication has developed rapidly. At present, the main branches of quantum communication include quantum key distribution [1,2,3,4], quantum secret sharing (QSS) [5,6,7,8], quantum digital signature [9,10], quantum authentication [11,12], quantum secure direct communication [13,14], etc. As an important branch, quantum secret sharing has always been the focus of attention. We usually describe a classic secret sharing as follows: suppose Alice has a secret task that needs to be completed in another place, but she cannot arrive in time. Fortunately, she has two assistants Bob and Charlie at the destination, but Alice does not trust either of them to perform the task alone. So Alice divides her task message into two parts and sends them to Bob and Charlie, respectively. Only the two of them can unite to recover Alice’s mission message, and no one can get Alice’s mission message alone. In this way, we have achieved the goal of managing secrets by multiple people and dispersing risks. However, with the development of science and technology, people have higher and higher requirements for security in the communication process. Classical secret sharing can no longer resist the eavesdropping attacks of modern technology. Since 1999, when Hillery et al. [5] proposed the first quantum secret sharing scheme (HBB99 protocol) based on the Greenberger–Horne–Zeilinger (GHZ) entangled state, quantum secret sharing has developed rapidly. Many domestic and foreign scholars have used various approaches to construct secret sharing systems, such as quantum error correction code [15], continuously variable cluster state [16], dense coding [17], Grover algorithm [18], etc.
According to the different methods based on physical resources and carrying information, quantum secret sharing schemes can be roughly divided into three types: the first type is the QSS scheme based on product states [19,20,21,22]; the second type is the QSS scheme based on single photon [23,24,25,26,27,28]. For example, in 2018, Bai et al. [26] proposed a new and efficient quantum secret sharing protocol using a d-level single particle, which can realize a general access structure through the idea of cascade. In 2020, Sutradhar et al. [27] proposed a secure d-level QSS protocol to share secrets, which could be reconstructed by t participants without trusted participants. Compared with most QSS protocols, this protocol was more secure, flexible and practical. In 2021, Chou et al. [28] proposed a novel method to share quantum information and established a ( w , ω , n ) multi-party weighted threshold quantum secret sharing scheme based on the Chinese Remainder Theorem (CRT) and phase shift operation. The third category QSS scheme is based on entanglement [29,30,31,32,33,34]. Among them, in the entangled state-based QSS scheme, researchers have done a lot of work on the efficiency and security of the protocol. In terms of efficiency, Tong Xin et al. [29] proposed a quantum secret sharing scheme based on GHZ state entanglement exchange in 2007. In this scheme, two GHZ state entanglement exchanges could share 2bit classical messages, which doubled the efficiency compared with the HBB protocol and the KKI protocol [30]. In 2008, Deng et al. [31] improved the KKI protocol and proposed an efficient large-capacity key encoding scheme with the efficiency increased to 50%. In 2014, Liao et al. [32] proposed a three-way dynamic quantum secret sharing scheme based on the GHZ state, which achieved the highest efficiency compared with the existing dynamic quantum secret sharing schemes. In 2019, Song Yun [33] proposed a quantum secret sharing scheme based on the local measurement of three particle GHZ states. When the number of detected GHZ quantum states is equal to the number of information GHZ quantum states, the efficiency of this scheme can reach 50%, and it does not require unitary operation. Song’s scheme is relatively economical in quantum resources, but limited in the number of participants.
In this paper, we propose a quantum secret sharing scheme based on the n ( n 3 ) particle GHZ state, realize the quantum secret sharing among multiple parties, and the secrets are shared between the two groups. In our scheme, each participant holds a particle sequence of the GHZ state, and the measurement results of the same GHZ state can be found to be related by measurement. Therefore, we use this correlation to detect whether there is external attack in eavesdropping. In the recovery phase, the two groups do not need to exchange any information, and the shared secret can be obtained through the internal measurement and coding of each group, which reduces the external eavesdropping caused by the communication process. In addition, there is no unitary transformation in the transmission of this scheme.
This paper is structured as follows. In Section 2, we introduce the system definition. In Section 3, the protocol of the proposed scheme is given. In Section 4, we consider the intercept-and-resend attack and the entanglement measurement attack, and analyze the security simulation of this scheme. In Section 5, we analyze the efficiency and compare the performance of the proposed scheme. In Section 6, the quantum secret sharing schemes based on four-particle GHZ entangled states are listed. Section 7 gives our conclusion.

2. System Definition

2.1. System Model

In this paper, we construct a QSS scheme, which includes n participants P 1 , P 2 , , P n , and the n participants are divided into two groups P A and P B with P A = { P A 1 , P A 2 , , P A p } and P B = { P B 1 , P B 2 , , P B q } , where n = p + q , q is an even number. Participant P A 1 is the group leader of group P A , and participant P B 1 is the group leader of group P B . This scheme needs to use two GHZ entangled states, respectively, i.e., | G H Z 0 1 , , n = 1 2 ( | 00 0 + | 11 1 ) , | G H Z 1 1 , , n = 1 2 ( | 00 0 | 11 1 ) , where 1 , , n represents n particles.

2.2. Threat Model

In the attack model, we assume that participants are all honest and fully comply with the rules of this protocol. The external attacker Eve intercepts information through the channel. For the external attacker Eve, we use I E v e to represent the amount of information Eve can acquire, and f to represent the probability that the cheater is detected. If Eve obtains more than half of the information I E v e , and the probability of being detected is greater than 1 2 at the same time, the number of detected particles L 3.3029 (see Section 4.3 for the proof process). In other words, as the number of detected particles L increases with L 4 , the probability of Eve being detected increases. Therefore, in the example of Section 6, we choose the number of detected particles L = 4 .
In addition, there is no need to communicate with each other through any classical channel or quantum channel for each group of participants in the same laboratory, and there is no possibility of external eavesdropping in the same laboratory.

3. Quantum Secret Sharing Scheme Based on n Particle GHZ State

3.1. Initial Stage

The measurement bases are B x = { | x 0 , | x 1 } and B y = { | y 0 , | y 1 } , which can be expressed as follows:
| x 0 = 1 2 ( | 0 + | 1 ) , | x 1 = 1 2 ( | 0 | 1 ) , | y 0 = 1 2 ( | 0 + i | 1 ) , | y 1 = 1 2 ( | 0 i | 1 ) .
By calculating, the basis | 0 , | 1 can be expressed as
| k = 1 2 l = 0 1 e π k i l | x l = 1 2 l = 0 1 e π k i ( l + 3 2 ) | y l ,
where k = 0 , 1 .

3.2. Distribution Stage

Participant P A 1 randomly prepares a sequence of GHZ states consisting of | G H Z i 1 , , n , where i { 0 , 1 } . Then, the first particle in each GHZ state is reserved, and the second to the p t h particle in each GHZ state are sent to P A 2 , , P A p , respectively. At the same time, the remaining q particles are sent to P B 1 , , P B q , respectively, as in the above. In this way, each participant obtained a sequence of particles. We use L A 1 , L A 2 , , L A p to represent these particle sequence of participants P A 1 , P A 2 , , P A p , respectively, and L B 1 , L B 2 , , L B q to do the particle sequence of participants P B 1 , P B 2 , , P B q .

3.3. Measurement Phase

After confirming that everyone has received these particles, P A 1 randomly extracts some particles from his sequence L A 1 as the detection particles, and informs others of the position of the detection particles (i.e., which particles in L A 1 will be the detection particles). All participants in group P A use the base B x = { | x 0 , | x 1 } for measurement, and P A 1 designates group P B to use the base B x = { | x 0 , | x 1 } or B y = { | y 0 , | y 1 } for measurement. For the entangled states | G H Z 0 1 , , n and | G H Z 1 1 , , n , the following four measurements may occur.
If group P A and P B use base B x and B x to measure | G H Z 0 1 , , n , respectively, then
| G H Z 0 1 , , n = 2 n 1 2 l 1 , , l p , l 1 , , l q = 0 l 1 + + l p + l 1 + + l q 0 ( mod 2 ) 1 | x l 1 | x l p | x l 1 | x l q .
If group P A and P B use base B x and B y to measure | G H Z 0 1 , , n , respectively, then
| G H Z 0 1 , , n = 2 n 1 2 l 1 , , l p , l 1 , , l q = 0 l 1 + + l p + l 1 + + l q 0 ( mod 2 ) 1 | x l 1 | x l p | y l 1 | y l q , if q = 4 t . 2 n 1 2 l 1 , , l p , l 1 , , l q = 0 l 1 + + l p + l 1 + + l q 1 ( mod 2 ) 1 | x l 1 | x l p | y l 1 | y l q , if q = 4 t + 2 .
where t is an integer.
If group P A and P B use base B x and B x to measure | G H Z 1 1 , , n , respectively, then
| G H Z 1 1 , , n = 2 n 1 2 l 1 , , l p , l 1 , , l q = 0 l 1 + + l p + l 1 + + l q 1 ( mod 2 ) 1 | x l 1 | x l p | x l 1 | x l q .
If group P A and P B use base B x and B y to measure | G H Z 1 1 , , n , respectively, then
| G H Z 1 1 , , n = 2 n 1 2 l 1 , , l p , l 1 , , l q = 0 l 1 + + l p + l 1 + + l q 1 ( mod 2 ) 1 | x l 1 | x l p | y l 1 | y l q , if q = 4 t . 2 n 1 2 l 1 , , l p , l 1 , , l q = 0 l 1 + + l p + l 1 + + l q 0 ( mod 2 ) 1 | x l 1 | x l p | y l 1 | y l q , if q = 4 t + 2 .
From the above four measurement results, it can be found that the detection results of n participants are correlated (Table A1 and Table A2 in Appendix A); that is, as long as the measurement results of any n 1 participants are confirmed, the measurement results of the last participant can be accurately judged without any operation and measurement.

3.4. Detection Stage

After the two groups P A and P B were measured according to the requirements, the group leader P A 1 randomly asked the members of these two groups to make public the sequence of measurement results, but did not make public his own measurement results. Then, he checked whether the correlation was satisfied according to the published results from n 1 participants and his own measurement results. Next, P A 1 compares the measurement results with the initial state. If the measurement result is different from the initial state, P A 1 ask to stop this round and start a new round. Otherwise, it continues to execute.

3.5. Recovery Phase

The participants of groups P A and P B , respectively, measure the remaining particles in their particle sequences, where the participants of group P A measure particles with the base B x = { | x 0 , | x 1 } , and the members of group P B measure particles with base B x = { | x 0 , | x 1 } or B y = { | y 0 , | y 1 } . Then they encode these measurement results as binary numbers.The encoding method of participants from group P A is: the measurement result is | x 0 , corresponding to binary number 0, and the measurement result is | x 1 , corresponding to binary number 1. Thus, each participant in group P A receives a string of private key sequence K A i ( i = 1 , , p ) . Since P A 1 knows every GHZ state, he encodes the entangled state into a binary sequence K a ; that is, the entangled state | G H Z 0 1 , , n corresponds to the binary number 0 and | G H Z 1 1 , , n corresponds to the binary number 1. The coding method of participants from group P B is: the measurement result is | x 0 or | y 0 , corresponding to binary number 0, and | x 1 or | y 1 , corresponding to binary number 1. In this way, each participant P B i receives a private key sequence K B i ( i = 1 , , q ) . In addition, the members from group P B encode the used measurement basis into a sequence of binary key K b . That is, the measurement basis B x , B y corresponds to the binary numbers 0,1, respectively. Next, let K A denote the keys from the group P A , and K B the keys from the group P B ; then the final secret message K can be obtained in the following ways:
(1) When q = 4 t , K A and K B can be obtained by K A = i = 0 p K A i + K a , K B = i = 0 q K B i , where K A i and K B i satisfy with i = 0 p K A i + K a = i = 0 q K B i . Then the secret message K = i = 0 p K A i + K a , K = i = 0 q K B i .
(2) When q = 4 t + 2 , K A and K B can be obtained by K A = i = 0 p K A i + K a , K B = i = 0 q K B i + K b , where K A i and K B i satisfy with i = 0 p K A i + K a = i = 0 q K B i + K b . Then the secret message K = i = 0 p K A i + K a , K = i = 0 q K B i + K b .

4. Safety Analysis

In this section, we analyze the security of the proposed scheme, and use MATLAB simulation analysis to show the relationship between the amount of information the adversary can obtain and the probability of being discovered.

4.1. Intercept-and-Resend Attack

We assume that the eavesdropper is Eve, she intercepts the particles sent by participant P A 1 . After measurement, she forges a particle sequence with the same measurement result and sends it to the other participant. Only the particles from group P B are transmitted through the quantum channel in the distribution stage. Eve can only intercept the particles from group P B . However, the fake particle sequence of Eve has no correlation with the particles of P A 1 , which means that Eve may have been detected in the detection stage. If Eve chooses the correct measurement base and sends faked identical particles to group P B participants after measurement, the detection can be evaded; if the measurement basis used by Eve is different from that used by participants from group P B , there is a 1 / 2 probability that Eve will not be detected according to the correlation. We consider the worst case here, i.e., if Eve intercepts all particles sent to group P B and chooses the correct measurement base, then forges the same particle as the measurement result and sends it to the participants from group P B , the probability that Eve successfully evades detection and obtains GHZ information for a GHZ state is 1 2 · 1 2 · 1 2 = 1 8 . Let us say there are w GHZ states in total, and Eve has a ( 1 8 ) w probability of getting the secret message K without being discovered. When the number of GHZ states increases, that is, w increases, the probability of Eve being detected increases. However, for ordinary attackers, the probability of Eve successfully avoiding eavesdropping and obtaining secret messages is much less than ( 1 8 ) w .

4.2. Entanglement Measurement Attack

In this protocol, the particle states during transmission are all in the maximum mixed state, that is, ρ = T r ( | 0 0 | + | 1 1 | = I 2 ) , and Eve cannot distinguish them directly. Therefore, Eve chose to perform an eavesdropping operation to obtain more information about a GHZ state where she tries to entangle the additional particle with a particle in a GHZ state in the quantum channel, and measure that additional particle. According to Stinespring’s extension theorem [35], Eve’s eavesdropping operation may occur on a larger Hilbert space. Let the unitary operator F ^ act on | G H Z 0 1 , , n and the additional particle | χ ; then we can obtain a complex system quantum state | ϕ . That is, | ϕ = F ^ | G H Z 0 1 , , n | χ = k = 0 1 | k 1 | k n η k , where the dimension of the additional particle is not limited. Participants measure the quantum state | G H Z 0 1 , , n in the recovery phase, and the composite system has the following cases:
(1) Groups P A and P B measure | ϕ with the basis B x and B x , respectively; then the composite system space can be expressed as
| ϕ = 2 n 2 l 1 , , l n = 0 l 1 + + l n 0 ( mod 2 ) 1 | x l 1 | x l n ( η 0 + η 1 ) + 2 n 2 l 1 , , l n = 0 l 1 + + l n 1 ( mod 2 ) 1 e π i ( l 1 + + l n ) | x l 1 | x l n ( η 0 η 1 ) .
(2) Groups P A and P B measure | ϕ with the basis B x and B y , respectively; then the composite system space can be expressed as
(i) When q = 4 t ,
| ϕ = 2 n 2 l 1 , , l p , l 1 , , l q = 0 l 1 + + l p + l 1 + + l q 0 ( mod 2 ) 1 | x l 1 | x l p | y l 1 | y l q ( η 0 + η 1 ) + 2 n 2 l 1 , , l p , l 1 , , l q = 0 l 1 + + l p + l 1 + + l q 1 ( mod 2 ) 1 | x l 1 | x l p | y l 1 | y l q ( η 0 η 1 ) .
(ii) When q = 4 t + 2 ,
| ϕ = 2 n 2 l 1 , , l p , l 1 , , l q = 0 l 1 + + l p + l 1 + + l q 1 ( mod 2 ) 1 | x l 1 | x l p | y l 1 | y l q ( η 0 + η 1 ) + 2 n 2 l 1 , , l p , l 1 , , l q = 0 l 1 + + l p + l 1 + + l q 0 ( mod 2 ) 1 | x l 1 | x l p | y l 1 | y l q ( η 0 η 1 ) .
According to the above situation, if Eve’s actions did not trigger an error rate in the detection phase. The equation η 0 = η 1 must be satisfied. Therefore, the above cases are denoted as
| ϕ = 2 n 2 l 1 , , l n = 0 l 1 + + l n 0 ( mod 2 ) 1 | x l 1 | x l n ( η 0 + η 1 )
 
| ϕ = 2 n 2 l 1 , , l p , l 1 , , l q = 0 l 1 + + l p + l 1 + + l q 0 ( mod 2 ) 1 | x l 1 | x l p | y l 1 | y l q ( η 0 + η 1 ) , when q = 4 t . 2 n 2 l 1 , , l p , l 1 , , l q = 0 l 1 + + l p + l 1 + + l q 1 ( mod 2 ) 1 | x l 1 | x l p | y l 1 | y l q ( η 0 + η 1 ) , when q = 4 t + 2 .
According to Equations (10) and (11), the composite quantum state of the additional particle and the GHZ states particle is always a product state without the error rate occurring. Therefore, the entanglement measurement attack is unsuccessful.

4.3. Analysis of Safety Simulation Model

From these two attacks, it can be seen that the error rate occurred with Eve is closely related to the probability that she can successfully evade detection. Next, let us analyze the relationship between them. When Eve wants to entangle the additional particles with the GHZ state in order to eavesdrop messages, the composite system state composed of Eve’s additional particles and GHZ is an entangled state ϕ A 1 E . Let I E v e denote the amount of information that Eve can extract from the entangled state ϕ A 1 E , and γ denote the error probability that occurred with Eve. According to ref. [36], γ and I E v e have the following relationship:
I E v e ( 1 γ ) l o g 2 ( 1 γ ) γ l o g 2 ( γ 3 ) .
If there are L GHZ states as the detection quantum states in the detection stage, the probability f of Eve being detected is f = 1 ( 1 γ ) L .
From the above analysis, security model equations can be obtained:
I E v e ( 1 γ ) l o g 2 ( 1 γ ) γ l o g 2 ( γ 3 ) f = 1 ( 1 γ ) L
Considering the value of the number of detection particles L, and performing simulation analysis through MATLAB, Figure 1 can be obtained.
From the above analysis, it can be seen that both the amount of information acquired by Eve and the probability of Eve being detected increase with increases in the error probability γ . When the error probability is the same, the greater the number of detected particles, the higher the probability of Eve being detected. From Equation (13) and this above figure, when the error probability γ [ 0.739 , 0.761 ] , the amount of information Eve can obtain reaches the maximum value 1, at which the information about the GHZ state can be obtained completely. The information obtained by Eve is I E v e 1 , and the probability of Eve being detected is f 1 2 . The number of detected particles L 3.3029 can be obtained by solving. That is to say, as the number of detected particles L increases with L 4 , the probability of Eve being detected increases. Therefore, in the example of Section 6, we choose the number of detected particles L = 4 .
In addition, the probability of Eve being detected will increase as a convex function when the number of detected particles is small, then the probability of Eve being detected when acquiring information at the initial state is small and the security is low; in contrast, when the number of detected particles is large, the probability of Eve being detected will increase as a concave function. Although the amount of information obtained in the initial state is small, the probability of Eve being detected is very large, and the security of the scheme is increased. Therefore, when the number of detected particles is larger, the security of the protocol is higher. Let γ = 0 , that is, when the error that occurred with Eve is about 0, I E v e 0 , this result is consistent with the result of entanglement measurement attack analysis.

5. Performance Comparison

In the following, we compare and analyze the literature [34,37,38,39] with our scheme from five aspects: using quantum states, space dimension, detecting quantum states, information efficiency and achievable threshold. The common point between these studies and our scheme is that they all use local discrimination to realize secret sharing. First, efficiency is an important criterion for judging an agreement. Cabello [40] defines a qubit usage efficiency formula η = b s q t , where q t represents the total number of qubits transmitted in the quantum channel, and b s represents the total number of shared classical bits. According to the efficiency formula, our scheme will share m bits of classical information, and its efficiency is η = m n ( m + L ) , where L represents the number of GHZ states as eavesdropping detection. As can be seen from Table 1, l GHZ states in the Rahaman scheme [37] are used to share m secret bits, since l m GHZ states are used to check eavesdropping. Then the information efficiency of their scheme is m n l ( l > m ) . If the number of eavesdropping particles is L = l m , the information efficiency of their scheme is the same as ours. The Bai scheme [39] uses m GHZ states to share m secret bits, and u single photons are prepared for each particle sequence as detection particles. Then it uses n ( m + u ) photons for sharing m bit information among n participants. Therefore, the information efficiency of Bai’s scheme is m n ( m + u ) . For the Yang scheme [38] and our scheme, m GHZ states are used to share m secret bits, and L GHZ states are applied to detect eavesdropping. Therefore, the information efficiency of both schemes is m n ( m + L ) . The scheme of Li [34] uses 2 m two-dimensional generalized Bell states to share m secret bits, and each participant prepares n u single photons as detection particles. Therefore, this scheme with n participants has n 2 u single photons for eavesdropping detection, so the information efficiency is m n ( 2 m + n u ) . Compared with the scheme of Li [34], our scheme reduces the number of eavesdropping particles, and each GHZ state corresponds to sharing one bit of classical information, so the information efficiency is improved.
From the point of view of resources, although Rahaman’s scheme, Yang’s scheme, Bai’s scheme and our scheme all use the GHZ state with n particles as the transmission state, the particles of the GHZ state in our scheme and Rahaman’s scheme are taken from the two-dimensional space, while each particle of the GHZ state in Yang’s scheme and Bai’s scheme is taken from the high-dimensional space. Here we denote the dimension of the space as k ( k 3 ) . By comparison of these two kinds of quantum states, obviously, the quantum state in our paper is easier to prepare and the cost will be lower. Li’s scheme uses the generalized Bell state as the transmission state. Each state contains two particles which also come from the high-dimensional space. Therefore, compared with Li’s paper, the particles required by Li are more difficult to prepare.

6. Example

This protocol is extended to the quantum secret sharing scheme of the n ( n 3 ) particle GHZ state. When n = 3 , the detailed protocol process is given in Song’s scheme [33]. In her protocol, Alice is equivalent to the leader P A 1 of group P A , Bob is equivalent to the leader P B 1 of group P B , and Charlie is equivalent to other members of group P B . Alice prepares a list of GHZ entangled states arbitrarily, and keeps the first particle of each GHZ state, then sends the second particle and the third particle to Bob and Charlie, respectively. In the measurement phase, Alice measures the particle with B x base, Bob and Charlie measure with the same base B x or B y , and encode the result into binary numbers according to the same method as our protocol. It is easy to verify that Bob and Charlie together can restore Alice’s secret. Since the simulation model analysis detects the number of eavesdropping quantum states L 3.3029 , Song’s scheme is safe. Therefore, this paper takes n = 4 and L = 4 as an example to implement the protocol in detail.

6.1. Protocol Process

6.1.1. Initial Stage

There are four participants who are divided into two groups P A and P B , with P A = { P A 1 , P A 2 } and P B = { P B 1 , P B 2 } . The structure is shown in Figure 2. As shown in Figure 2, these two groups only have unique communication in the distribution stage, and the same secret is obtained through coding.

6.1.2. Distribution Stage

Two groups of participants P A 1 prepare a column of four particles GHZ. They are as follows:
| G H Z 0 1 , 2 , 3 , 4 , | G H Z 1 1 , 2 , 3 , 4 , | G H Z 0 1 , 2 , 3 , 4 , | G H Z 1 1 , 2 , 3 , 4 , | G H Z 0 1 , 2 , 3 , 4 , | G H Z 1 1 , 2 , 3 , 4 , | G H Z 0 1 , 2 , 3 , 4 , | G H Z 1 1 , 2 , 3 , 4 .
Participant P A 1 keeps the first particle in each GHZ state, and sends the second particle to P A 2 of Group P A , then sends the third and fourth particles to P B 1 and P B 2 of group P B through the quantum channel. Thus, each participant holds a sequence of particles. We use L A 1 , L A 2 , L B 1 , L B 2 to represent the particle groups of participants P A 1 , P A 2 , P B 1 , P B 2 , respectively. The structure is shown as (I) in Figure 3.

6.1.3. Measurement Phase

After confirming that the other three participants have received particles, participant P A 1 selects the second, third, fifth and eighth particles as the detection particles, and informs the other three participants of the location of these detection particles, The process is shown as (II) in Figure 3. All participants in group P A are measured with base B x = { | x 0 , | x 1 } , while P A 1 assigns the second and fifth particles in group P B to be measured with base B y = { | y 0 , | y 1 } , and the third and eighth particles to be measured with base B x = { | x 0 , | x 1 } . Then the measurement results of the extracted three GHZ quantum states may appear as the following:
| G H Z 1 1 , 2 , 3 , 4 = 1 2 2 ( | x 0 | x 0 | y 0 | y 0 + | x 0 | x 0 | y 1 | y 1 + | x 0 | x 1 | y 0 | y 1 + | x 1 | x 0 | y 0 | y 1 + | x 0 | x 1 | y 1 | y 0 + | x 1 | x 0 | y 1 | y 0 + | x 1 | x 1 | y 0 | y 0 + | x 1 | x 1 | y 1 | y 1 ) . | G H Z 0 1 , 2 , 3 , 4 = 1 2 2 ( | x 0 | x 0 | x 0 | x 0 + | x 0 | x 0 | x 1 | x 1 + | x 0 | x 1 | x 0 | x 1 + | x 1 | x 0 | x 0 | x 1 + | x 0 | x 1 | x 1 | x 0 + | x 1 | x 0 | x 1 | x 0 + | x 1 | x 1 | x 0 | x 0 + | x 1 | x 1 | x 1 | x 1 ) . | G H Z 0 1 , 2 , 3 , 4 = 1 2 2 ( | x 0 | x 0 | y 0 | y 1 + | x 0 | x 0 | y 1 | y 0 + | x 0 | x 1 | y 0 | y 0 + | x 0 | x 1 | y 1 | y 1 + | x 1 | x 0 | y 0 | y 0 + | x 1 | x 0 | y 1 | y 1 + | x 1 | x 1 | y 0 | y 1 + | x 1 | x 1 | y 1 | y 0 ) . | G H Z 1 1 , 2 , 3 , 4 = 1 2 2 ( | x 0 | x 0 | x 0 | x 1 + | x 0 | x 0 | x 1 | x 0 + | x 0 | x 1 | x 0 | x 0 + | x 0 | x 1 | x 1 | x 1 + | x 1 | x 0 | x 0 | x 0 + | x 1 | x 0 | x 1 | x 1 + | x 1 | x 1 | x 0 | x 1 + | x 1 | x 1 | x 1 | x 0 ) .
According to the above results, we can find that the measurement results of the four participants are correlated, The measurement results are shown in Figure 3III.

6.1.4. Detection Stage

After the four participants measured completely, P A 1 randomly asked the other three participants to make public the order of measurement results, but did not make public his own measurement results. P A 1 tested whether the correlation between Table A1 and Table A2 (in Appendix A) was satisfied according to the public results of the other three participants and his own measurement results. Here, we calculate a threshold considering the error rate of the quantum channel during transmission. If the error rate of the detection result is higher than this threshold, the communication will be abandoned. Otherwise, the agreement continues.

6.1.5. Recovery Phase

Members of two groups P A and P B measure the remaining four particles, respectively. Group P A uses the basis B x = { | x 0 , | x 1 } for all measurements, and P B 1 uses the basis B x , B x , B y , B y to measure four particles, respectively. Since the measurement results of each particle may have two results, it is advisable to assume that the measurement results of the four particles held by P A 1 , P A 2 , P B 1 , P B 2 are { | x 0 , | x 0 , | x 1 , | x 1 } , { | x 1 , | x 1 , | x 0 , | x 1 } , { | x 0 , | x 0 , | y 0 , | y 0 } , { | x 1 , | x 0 , | y 1 , | y 1 } , respectively. Thus, the original four GHZ entangled states collapse into the following situations:
| G H Z 0 = 1 2 2 | x 0 | x 1 | x 0 | x 1 , | G H Z 1 = 1 2 2 | x 0 | x 1 | x 0 | x 0 , | G H Z 1 = 1 2 2 | x 1 | x 0 | y 0 | y 1 , | G H Z 0 = 1 2 2 | x 1 | x 1 | y 0 | y 1 .
The two groups of participants code after each measurement:
group P A : K A 1 = { 0011 } , K A 2 = { 0011 } , K a = { 0110 } ,
group P B : K B 1 = { 0000 } , K B 2 = { 1011 } , K b = { 0011 } .
Thus, groups P A and P B recover the secret message K A = { 1000 } and K B = { 1000 } , respectively. The result is shown as (IV) in Figure 3.

6.2. Efficiency Analysis

In the above example, the number L of detected quantum states is equal to 4 and the number m of the classical bits shared by four participants is equal to 4. Therefore, according to the efficiency formula η = m n ( m + L ) , the efficiency of this example is 1 8 .

6.3. Security Simulation Model Analysis

From the above, the number L of detected quantum states is equal to 4. The result is substituted into equation system (13) to obtain the following equation system
I E v e ( 1 γ ) l o g 2 ( 1 γ ) γ l o g 2 ( γ 3 ) f = 1 ( 1 γ ) 4
Figure 4 can be obtained by simulation analysis with MATLAB.
As can be seen from Figure 4, when the probability of detection of the external attacker Eve is 0.5 , the information she can obtain is less than 1. Under such circumstance, we believe that this scheme is safe enough.

7. Conclusions

In this paper, we propose a multi-party and efficient quantum secret sharing scheme based on the GHZ entangled state of n particles. The scheme realizes the secret sharing in small groups through local measurement. Different from classical secret sharing, the consumption of quantum resources is one of the important criteria for judging quantum secret sharing schemes, and the information efficiency of our scheme is m n ( m + L ) . This protocol theoretically proposes an n particle GHZ entangled state and a multi-party and efficient quantum secret sharing scheme. According to the latest domestic research, the entangled state of up to 18 qubits can be realized at present. Therefore, it is also worth studying the implementation and optimization of this protocol in the actual environment by using the existing entangled states.

Author Contributions

Conceptualization, Z.L.; writing—original draft preparation, X.J. and L.L.; writing—review and editing, X.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by National Natural Science Foundation of China, grant number 11671244.

Data Availability Statement

The data on the correlation of the measured results in Section 3.3 (i.e., Table A1 and Table A2 in the Appendix A) are derived from reference [33,37].

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. If the number of participants in group P B is q = 4 t , the correlation of n party measurement results of | G H Z i 1 , 2 , , n .
Table A1. If the number of participants in group P B is q = 4 t , the correlation of n party measurement results of | G H Z i 1 , 2 , , n .
Measurement Basis
Used in Group B
Measurement Results
of Group B
Measurement Results
of P A P A 1
Measurement
Results of P A
| G H Z 0 1 , 2 , , n B x l 1 , , l q = 0 l 1 + + l q 0 ( mod 2 ) 1 | x l 1 | x l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
l 1 , , l q = 0 l 1 + + l q 1 ( mod 2 ) 1 | x l 1 | x l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
B y l 1 , , l q = 0 l 1 + + l q 0 ( mod 2 ) 1 | y l 1 | y l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
l 1 , , l q = 0 l 1 + + l q 1 ( mod 2 ) 1 | y l 1 | y l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
| G H Z 1 1 , 2 , , n B x l 1 , , l q = 0 l 1 + + l q 0 ( mod 2 ) 1 | x l 1 | x l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
l 1 , , l q = 0 l 1 + + l q 1 ( mod 2 ) 1 | x l 1 | x l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
B y l 1 , , l q = 0 l 1 + + l q 0 ( mod 2 ) 1 | y l 1 | y l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
l 1 , , l q = 0 l 1 + + l q 1 ( mod 2 ) 1 | y l 1 | y l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
Table A2. If the number of participants in group P B is q = 4 t + 2 , the correlation of n party measurement results of | G H Z i 1 , 2 , , n .
Table A2. If the number of participants in group P B is q = 4 t + 2 , the correlation of n party measurement results of | G H Z i 1 , 2 , , n .
Measurement Basis
Used in Group B
Measurement Results
of Group B
Measurement Results
of P A P A 1
Measurement
Results of P A
| G H Z 0 1 , 2 , , n B x l 1 , , l q = 0 l 1 + + l q 0 ( mod 2 ) 1 | x l 1 | x l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
l 1 , , l q = 0 l 1 + + l q 1 ( mod 2 ) 1 | x l 1 | x l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
B y l 1 , , l q = 0 l 1 + + l q 0 ( mod 2 ) 1 | y l 1 | y l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
l 1 , , l q = 0 l 1 + + l q 1 ( mod 2 ) 1 | y l 1 | y l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
| G H Z 1 1 , 2 , , n B x l 1 , , l q = 0 l 1 + + l q 0 ( mod 2 ) 1 | x l 1 | x l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
l 1 , , l q = 0 l 1 + + l q 1 ( mod 2 ) 1 | x l 1 | x l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
B y l 1 , , l q = 0 l 1 + + l q 0 ( mod 2 ) 1 | y l 1 | y l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
l 1 , , l q = 0 l 1 + + l q 1 ( mod 2 ) 1 | y l 1 | y l q l 2 , , l p = 0 l 2 + + l p 0 ( mod 2 ) 1 | x l 2 | x l p | 0 | 1
l 2 , , l p = 0 l 2 + + l p 1 ( mod 2 ) 1 | x l 2 | x l p | 0 + | 1

References

  1. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 2014, 560, 7–11. [Google Scholar] [CrossRef]
  2. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Wang, X.B.; Yu, Z.W.; Hu, X.L. Twin-field quantum key distribution with large misalignment error. Phys. Rev. A 2018, 98, 62323. [Google Scholar] [CrossRef] [Green Version]
  4. Zhou, Y.H.; Yu, Z.W.; Wang, X.B. Making the decoy-state measurement-device-independent quantum key distribution practically useful. Phys. Rev. A 2015, 93, 042324. [Google Scholar] [CrossRef] [Green Version]
  5. Hillery, M.; Nek, V.; Berthiaume, A. Quantum secret sharing. Phys. Rev. A 1999, 59, 1829–1834. [Google Scholar] [CrossRef] [Green Version]
  6. Guo, G.P.; Guo, G.C. Quantum secret sharing without entanglement. Phys. Lett. A 2002, 310, 247–251. [Google Scholar] [CrossRef] [Green Version]
  7. Musanna, F.; Kumar, S. A novel three-party quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing. Quantum Inf. Process. 2020, 19, 348. [Google Scholar] [CrossRef]
  8. Zhi, D.L.; Li, Z.H.; Han, Z.W.; Liu, L.J. A verifiable quantum secret sharing based on a single qudit. Int. J. Theor. Phys. 2020, 59, 3672–3684. [Google Scholar] [CrossRef]
  9. Zeng, G.H.; Ma, W.P.; Wang, X.M.; Zhu, H.W. Signature Scheme Based on Quantum Cryptography. Acta Electron. Sin. 2001, 29, 1098–1100. [Google Scholar]
  10. Zhang, H.; An, X.B.; Zhang, C.H.; Zhang, C.H.; Wang, Q. High-efficiency quantum digital signature scheme for signing long messages. Quantum Inf. Process. 2019, 18, 1–9. [Google Scholar] [CrossRef]
  11. Lei, H.X.; Peng, J.Y.; Liu, Y. Termination verification of some kinks nondeterministic quantum programs. Acta Electron. Sin. 2016, 44, 2932–2938. [Google Scholar]
  12. Zhu, H.F.; Wang, C.N.; Li, Z.X. Semi-honest three-party mutual authentication quantum key agreement protocol based on GHZ-like state. Int. J. Theor. Phys. 2021, 60, 293–303. [Google Scholar] [CrossRef]
  13. Long, G.L.; Liu, X.S. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 2002, 65, 32302. [Google Scholar] [CrossRef] [Green Version]
  14. Yin, A.; Lin, W.; He, K.; Han, Z.; Fan, P. Controlled bidirectional quantum secure direct communication protocol based on Grover’s algorithm. Mod. Phys. Lett. A 2020, 35, 2050228. [Google Scholar] [CrossRef]
  15. Cleve, R.; Gottesman, D.; Lo, H.K. How to share a quantum secret. Phys. Rev. Lett. 1999, 83, 648. [Google Scholar] [CrossRef] [Green Version]
  16. Lau, H.K.; Weedbrook, C. Quantum secret sharing with continuous-variable cluster states. Phys. Rev. A 2013, 88, 42313. [Google Scholar] [CrossRef] [Green Version]
  17. Du, Y.T.; Bao, W.S.; Guan, W.Q. Multiparty-to-multiparty quantum secret sharing based on dense-coding. J. Electron. Inf. Technol. 2013, 35, 2623–2629. [Google Scholar] [CrossRef]
  18. Hsu, L.Y. Quantum secret-sharing protocol based on Grover’s algorithm. Phys. Rev. A 2003, 68, 22306. [Google Scholar] [CrossRef]
  19. Zhang, Z.J. Multiparty quantum secret sharing of secure direct communication. Phys. Lett. A 2005, 342, 60–66. [Google Scholar] [CrossRef] [Green Version]
  20. Hsu, L.Y.; Li, C.M. Quantum secret sharing using product states. Phys. Rev. A 2005, 71, 22321. [Google Scholar] [CrossRef] [Green Version]
  21. Yang, Y.G.; Wen, Q.Y.; Zhu, F.C. An efficient quantum secret sharing protocol with orthogonal product states. Sci. China Ser. G 2007, 50, 331–338. [Google Scholar] [CrossRef]
  22. Xu, J.; Chen, H.W.; Liu, W.J.; Liu, Z.H. An efficient quantum secret sharing scheme based on orthogonal product states. In Proceedings of the IEEE Congress on Evolutionary Computation, Barcelona, Spain, 18–23 July 2010; pp. 1–4. [Google Scholar]
  23. Yan, F.L.; Gao, T. Quantum secret sharing between multiparty and multiparty without entanglement. Phys. Rev. A 2005, 72, 12304. [Google Scholar] [CrossRef]
  24. Deng, F.G.; Zhou, H.Y.; Long, G.L. Bidirectional quantum secret sharing and secret splitting with polarized single photons. Phys. Lett. A 2005, 337, 329–334. [Google Scholar] [CrossRef] [Green Version]
  25. Bai, C.M.; Li, Z.H.; Li, Y.M. Sequential quantum secret sharing using a single qudit. Commun. Theor. Phys. 2018, 69, 513–518. [Google Scholar] [CrossRef]
  26. Sutradhar, K.; Om, H. Efficient quantum secret sharing without a trusted player. Quantum Inf. Process. 2020, 19, 1–15. [Google Scholar] [CrossRef]
  27. Chou, Y.H.; Zeng, G.J.; Chen, X.Y.; Kuo, S.Y. Multiparty weighted threshold quantum secret sharing based on the Chinese remainder theorem to share quantum information. Sci. Rep. 2021, 11, 6093. [Google Scholar] [CrossRef]
  28. Yang, Y.G.; Wen, Q.Y. Threshold quantum secret sharing between multi-party and multi-party. Sci. China Ser. G-Phys. Mech. Astron. 2008, 51, 1308–1315. [Google Scholar] [CrossRef]
  29. Tong, X.; Wen, Q.Y.; Zhu, F.C. Quantum secret sharing based on GHZ states entanglement swapping. J. Beijing Univ. Posts Telecommun. 2007, 30, 44–48. [Google Scholar]
  30. Karlsson, A.; Koashi, M.; Imoto, N. Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 1999, 59, 162–168. [Google Scholar] [CrossRef]
  31. Deng, F.G.; Li, X.H.; Zhou, H.Y. Efficient high-capacity quantum secret sharing with two-photon entanglement. Phys. Lett. A 2008, 372, 1957–1962. [Google Scholar] [CrossRef] [Green Version]
  32. Liao, C.H.; Yang, C.W.; Hwang, T. Dynamic quantum secret sharing protocol based on GHZ state. Quantum Inf. Process. 2014, 13, 1907–1916. [Google Scholar] [CrossRef]
  33. Song, Y. Quantum secret sharing based on GHZ states local measurements. Acta Electron. Sin. 2019, 47, 1443–1448. [Google Scholar]
  34. Li, F.; Yan, J.; Zhu, S. General quantum secret sharing scheme based on two qudit. Quantum Inf. Process. 2021, 20, 328. [Google Scholar] [CrossRef]
  35. Stinespring, W.F. Positive functions on C-algebras. Proc. Am. Math. Soc. 1955, 6, 211–216. [Google Scholar]
  36. Gao, F.; Guo, F.Z.; Wen, Q.Y.; Zhu, F.C. Quantum key distribution without alternative measurements and rotations. Phys. Lett. A 2006, 349, 53–58. [Google Scholar] [CrossRef]
  37. Rahaman, R.; Parker, M.G. Quantum scheme for secret sharing based on local distinguishability. Phys. Rev. A 2015, 91, 022330. [Google Scholar] [CrossRef] [Green Version]
  38. Yang, Y.H.; Gao, F.; Wu, X.; Qin, S.J.; Zuo, J.H.; Wen, Q.Y. Quantum secret sharing via local operations and classical communication. Sci. Rep. 2015, 5, 16967. [Google Scholar] [CrossRef] [Green Version]
  39. Bai, C.M.; Li, Z.H.; Xu, T.T.; Li, Y.M. Quantum secret sharing using the d-dimensional GHZ state. Quantum Inf. Process. 2017, 16, 59–72. [Google Scholar] [CrossRef]
  40. Cabello, A. Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 2000, 85, 5635–5638. [Google Scholar] [CrossRef]
Figure 1. The relationship between I E v e and f.
Figure 1. The relationship between I E v e and f.
Entropy 24 01433 g001
Figure 2. Square structure diagram.
Figure 2. Square structure diagram.
Entropy 24 01433 g002
Figure 3. Flow chart of four particle GHZ states. ((I) represents the distribution stage, (II) represents the measurement phase, (III) represents the measurement results of the measurement phase, and (IV) represents the secret message that can finally be recovered.)
Figure 3. Flow chart of four particle GHZ states. ((I) represents the distribution stage, (II) represents the measurement phase, (III) represents the measurement results of the measurement phase, and (IV) represents the secret message that can finally be recovered.)
Entropy 24 01433 g003
Figure 4. The relationship between I E v e and f when the quantum state L = 4 is detected.
Figure 4. The relationship between I E v e and f when the quantum state L = 4 is detected.
Entropy 24 01433 g004
Table 1. Comparison between this scheme and existing schemes.
Table 1. Comparison between this scheme and existing schemes.
Rahaman [37]Yang [38]Bai [39]Li [34]Our Scheme
Quantum states 1GHZ stateGHZ stateGHZ stateThe generalized Bell stateGHZ state
Dimension2kkk2
Quantum states 2GHZ stateGHZ statesingle photonsingle photonGHZ state
Efficiency m n ( m + L ) m n ( m + L ) m n ( m + u ) m n ( 2 m + n u ) m n ( m + L )
Threshold R ( 2 , n ) ( 2 , n ) R ( 2 , n ) ( k , n ) R ( 2 , n )
In Table 1, Quantum states 1 denotes the used quantum states, and Quantum states 2 denotes the detected quantum states. R − (2, n) denotes the restricted QSS.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, Z.; Jiang, X.; Liu, L. Multi-Party Quantum Secret Sharing Based on GHZ State. Entropy 2022, 24, 1433. https://doi.org/10.3390/e24101433

AMA Style

Li Z, Jiang X, Liu L. Multi-Party Quantum Secret Sharing Based on GHZ State. Entropy. 2022; 24(10):1433. https://doi.org/10.3390/e24101433

Chicago/Turabian Style

Li, Zhihui, Xue Jiang, and Lu Liu. 2022. "Multi-Party Quantum Secret Sharing Based on GHZ State" Entropy 24, no. 10: 1433. https://doi.org/10.3390/e24101433

APA Style

Li, Z., Jiang, X., & Liu, L. (2022). Multi-Party Quantum Secret Sharing Based on GHZ State. Entropy, 24(10), 1433. https://doi.org/10.3390/e24101433

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop