Understanding Quantum secret sharing part13(Quantum Computing) | by Monodeep Mukherjee | Nov, 2023

    Published on:

    1. Implementation of quantum secret sharing and quantum binary voting protocols on IBM quantum computer (arXiv)

    author : Dinto Montjoy, M. Saville, Bikash K. Behera, Prasanta K. Panigrahi

    Abstract: Quantum secret sharing is a way to share secret messages between clients in a group with complete security. For the first time, Hilary et al. (Phys Rev A 59:1829, 1999) proposed a quantum version of the classical secret sharing protocol using GHZ states. Here, we implement the quantum secret sharing protocol described above on the IBM Q 5 Tenerife quantum processor and compare the experimentally obtained results with the theoretically predicted results. Additionally, a new quantum binary voting protocol is proposed and implemented on a 14-qubit “IBM Q 14 Melbourne” quantum processor. The results are analyzed through quantum state tomography techniques to calculate state fidelity for different numbers of runs performed within the device.

    2. Verifiable framework for entanglement-free quantum secret sharing with information-theoretic security (arXiv)

    author : Lou Changbin, Furong Miao, Hou Junpeng, Huang Wenchao, Yang Xiong

    Abstract: Entanglement-free quantum secret sharing (QSS) schemes have significant advantages in terms of scalability and are easy to implement as they only require sequential communication of a single quantum system. However, these schemes often come with drawbacks such as lack of precise (n,n) structure, security flaws, and effective fraud detection. To address these issues, we propose a verifiable framework that leverages disentangled states to construct (t,n)-QSS schemes. Our study is a heuristic step towards information-theoretic security in unentangled QSSs and reveals how to establish effective verification mechanisms against fraud. As a result, the proposed framework becomes of great importance in building QSS schemes for versatile applications in quantum networks due to its inherent scalability, flexibility, and information-theoretic security.


    Leave a Reply

    Please enter your comment!
    Please enter your name here