Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2024 Aug 8;14:18385. doi: 10.1038/s41598-024-69417-0

Improving security of efficient multiparty quantum secret sharing based on a novel structure and single qubits

Xiao-Qiu Cai 1, Shuang Li 1,2, Zi-Fan Liu 1,2, Tian-Yin Wang 1,2,
PMCID: PMC11310313  PMID: 39117918

Abstract

Quantum secret sharing is a basic quantum cryptographic primitive, which has a lot of applications in information security and privacy preservation. An efficient multiparty quantum secret sharing protocol (Kuo et al. in EPJ Quantum Technol 10(1):29, 2023) based on a novel structure and single qubits was reported recently. In this paper, we give a cryptanalysis of this protocol and show that it cannot satisfy the security requirement for secret sharing because an unauthorized set of agents can gain access to some information on the dealer’s secret by a special collusion attack. Furthermore, we put forward a way to deal with the security problem.

Subject terms: Quantum information, Qubits, Information technology

Introduction

In 1979, Shamir1 and Blakely2 independently introduced the concept of (kn) threshold secret sharing scheme respectively, which allowed a secret s to be split into n shares such that s can be easily reconstructed from any k shares, but less than k shares can reveal no information on the secret s. Owing to the special property, secret sharing was used to construct robust key management, secure multiparty computation or other cryptographic schemes that can function securely and reliably even when misfortunes destroy most of the shares and security breaches expose all but one of the remaining shares35.

In the last decades, the principles of quantum mechanics supplied many interesting cryptographic applications such as quantum key distribution, quantum secure direct communication (QSDC), quantum digital signature, and quantum secret sharing (QSS)68. In contrast to classical secret sharing, the security of QSS is based on the fundamental principles of quantum mechanics rather than mathematical difficult problems, which makes it secure against any opponent even if he/she has infinite computing resources. On account of the security advantage, since the first proposal with Greenberger–Horne–Zeilinger states was given by Hillery et al.9, QSS has attracted much attention and many novel proposals have been reported both in theoretical and experimental aspects1025. According to the quantum resources, these proposals can be divided two kinds: one was based on single photons1013, and the other used entangled states1425. In order to improve the efficiency and feasibility, two typical transmission strategies were introduced, i.e., circular transmission13,16 and teleportation transmission14,15. Additionally, measurement-device-independent QSS was also presented18,19,23,25,26, which can exclude all quantum attacks in the detection part.

As is well known to all, cryptographic design and cryptanalysis are two inherent directions, which are opposite to but stimulate each other. Both of them are indispensable to the development of cryptography. This is also the case for quantum cryptography. Nevertheless, it is very complicated to analyze the security of QSS because multiple participants are involved and some may be not honest2730.

To achieve an excellent balance between security and performance, an efficient multiparty QSS protocol based on a novel structure and single qubits (named KTYC-protocol hereafter) was reported recently31, which can exclude some deficiency of traditional loop QSS schemes because each agent can interact with the dealer independently by an independent secure communication tunnel based on QSDC. In this paper, we analyze the security of KTYC-protocol and give a new collision attack, whereby an unauthorized set of agents can get some information on the dealer’s secret, which is in conflict with the security requirement in the sense that nobody can learn information on the dealer’s secret. Furthermore, the proportion that the unauthorized set can extract information on the secret will be close to 1 with the increase of the agents’ number in the unauthorized set. Finally, we propose a possible way to improve the security of KTYC-protocol.

Results

The KTYC-protocol

In this section, let us give a brief description of KTYC-protocol. Assume that the dealer Alice has a secret s whose length is S, and she wants the secret s to be shared among N agents: P1, P2, ..., PN. This protocol can be described as follows31.

Step 1. Every agent Pi (i=1,2,,N) prepares t qubits j=1t|φji, and each qubit |φji is randomly chosen from the set {|0,|1,|+,|-} for i=1,2,,N and j=1,2,,t, where t=SN, |+=12(|0+|1), |-=12(|0-|1), and denotes the direct product of qubits. Then they send their respective quantum sequences to Alice after inserting several decoy qubits32,33.

Step 2. When receiving the quantum sequences, Alice checks the channel by the decoy qubits. Specifically, Alice randomly chooses sufficient qubits and requires all the agents to publish the basis and states of these qubits. Then she uses the same basis to measure and compare the results. If the error rate is higher than the threshold, she requests that the sequence be resent until it passes the channel checking.

Step 3. Alice joins these sequences together and reorders qubits. Then she encodes the secret s into the sequence by using I and Y operations according to her message “0”and “1”, respectively, and divides it into N sequences, where I=|00|+|11|=1001 Y=|10|-|01|=0-110. Subsequently, she sends these sequences back to all agents after inserting decoy qubits32,33.

Step 4. After all agents have received the sequences, Alice publishes the positions and states of the decoy qubits. All agents check the channel with these decoy qubits inserted by Alice. If the error rate is lower than the threshold, Alice publishes the order of the qubits; otherwise, the communication is terminated and restarted via a different channel.

Step 5. All agents cooperate to recover the secret s by exchanging their information on original quantum states.

The cryptanalysis of KTYC-protocol

As we know, the security of QSS requires that just an authorized set of agents can recover the secret s distributed by the dealer, but any unauthorized set of agents can learn no information on it9,2730. However, here we show that an unauthorized set can gain access to some information on the secret s in the KTYC-protocol. Furthermore, the information on the secret s that an unauthorized set can obtain will increase in proportion to the number’s square of agents in the unauthorized set. The detailed analysis is given as follows.

From the above section, we can see that the KTYC-protocol is a (NN) threshold QSS protocol in fact. Therefore, there is only one authorized set of agents, i.e., {P1,P2,,PN}, who can recover the secret s if all the N agents cooperate with each other in Step 5. As mentioned in31, in contrast to the traditional loop QSS schemes based on QSDC, the KTYC-protocol is based on a new structure that each agent can communicate with the dealer by an independent quantum secure direct communication path. This design makes all the N agents adopt the same privileges in this protocol, but it also gives a good chance for dishonest agents to gain access to the information on the secret s, which can be shown in Theorem 1.

Theorem 1

An unauthorized set can gain access to about d2tN bits of the dealer’s secret s if they collude with each other in the KTYC-protocol, where d (d<N) is the number of agents in the unauthorized set.

Proof

In Step 3, when the dealer Alice receives all the N agents’ quantum sequences j=1t|φj1, j=1t|φj2, ..., j=1t|φjN, she joins them together and encodes the secret s into the quantum sequence. Then she divides it into N sequences and sends these sequences back to N agents. Clearly, each agent will receive a quantum sequence including t encoded qubits from Alice in Step 3, of which about tN qubits are prepared by himself/herself in Step 1 according to the principle of probability distribution. For these qubits, when Alice publishes the order of the qubits in Step 4, the agent can choose the right basis to measure them and then deduce Alice’s encoding operations because he/she knows their initial states. It should be noted that the security check of channel with decoy qubits is invalid to this attack because the agent perform it after confirming the channel’s security. Therefore, any agent can gain access to about tN bits of the secret s, which means that Theorem 1 holds for d=1.

For d=2, i.e., there are two agents in the unauthorized set. In this case, each of them will receive a quantum sequence including t encoding qubits from Alice in Step 3, and thus they hold 2t encoded qubits. According to the principle of probability distribution, about 2tN encoded qubits are prepared by each of them in Step 1. For these qubits, when Alice publishes the order of the qubits in Step 4, they can deduce Alice’s encoding information by measuring them with the right basis. Therefore, they can gain access to about

2tN+2tN=4tN=22tN 1

bits of the secret s.

For d=3, i.e., there are three agents in the unauthorized set. In this case, each of them will receive a quantum sequence including t encoded qubits from Alice in Step 3, and thus they hold 3t encoded qubits. According to the principle of probability distribution, about 3tN encoded qubits are prepared by each of them in Step 1. For these qubits, they can deduce Alice’s encoding information by measuring them with the right basis after Alice publishes the order of the qubits in Step 4. Therefore, they can gain access to about

3tN+3tN+3tN=9tN=32tN 2

bits of the secret s.

For d=4 to N-1, we can get that the unauthorized set can gain access to about d2tN bits of the secret s by simple analysis.

In conclusion, when there are d (d<N) agents in the unauthorized set, they can gain access to about d2tN bits of the secret s. The proof of Theorem 1 is completed.

From Theorem 1, we can find that the information bits on the secret s that an unauthorized set can obtain will increase in proportion to the number’s square of agents in the unauthorized set, which is shown in Fig. 1. Furthermore, the proportion d2N2 that the unauthorized set can extract information on the secret s is close to 1 with the increase of the agents’ number in the unauthorized set, which can be shown in Fig. 2.

Figure 1.

Figure 1

The relation between the number (d) of agents in an unauthorized set and the bits’ number (d2tN) that they can gain on the secret s. The bits that the agents in the unauthorized set can obtain increase in proportion to their number’s square (d2). Here, we set N=10,t=7 and S=tN=70.

Figure 2.

Figure 2

The relation between the number (d) of agents in an unauthorized set and the proportion (d2N2) that they can extract information on the secret s. The proportion d2N2 is close to 1 with the increase of the agents’ number (d) in the unauthorized set. Here we set N=10,t=7 and S=tN=70.

So far, we have given a cryptanalysis of the KTYC-protocol, which shows that this protocol is not secure in the sense that it does not satisfy the security requirement for QSS.

Suggestion for improvement

From the cryptanalysis, it can be seen that the success of the proposed collusion attack is for that the KTYC-protocol is based on a novel structure, which makes other agents have no effect on the dealer’s secret bits if the encoded qubits are not prepared by themselves. Moreover, this attack is performed after the security check of channel. Therefore, the agents in the unauthorized set can choose the right basis to measure the encoded qubits prepared by themselves and then gain access to the information bits on the secret s. In order to deal with the security leak, every agent must hold a share on each bit of the dealer’s secret s, which can be realized in two ways. One is that every agent perform an encryption on each encoded qubit, but this will change the structure of the KTYC-protocol. The other way is that the dealer preprocesses the secret s to be shared in advance. Specifically, the dealer randomly prepares N random numbers s1,s2,,sN in Step 3, where

s1+s2++sN=s. 3

Then the dealer encodes s1,s2,,sN into the qubit sequences j=1t|φj1, j=1t|φj2, ..., j=1t|φjN, respectively. After that, the dealer performs the same actions as that in Step 3 except that the encoding operations are not performed any longer.

Now we show that this way is valid to prevent the collusion attack. Clearly, the shared secret s is the sum of N shares s1,s2,,sN in the improved version, and thus the absence of any share will not reconstruct the secret. Nevertheless, the shares s1,s2, ..., sN are encoded into the qubit sequences j=1t|φj1, j=1t|φj2, ..., j=1t|φjN, respectively. Furthermore, only the agent Pi knows the initial states of the qubits j=1t|φji that are necessary to gain the encoded information si. Therefore, the share si cannot be obtained without the cooperation of the agent Pi. All in all, if and only if all the agents in the authorized set {P1,P2,,PN} cooperate with each other, they can reconstruct the secret s, but any unauthorized set can reveal no information on it.

Conclusion

To sum up, we give a cryptanalysis of the KTYC-protocol and present a new participant attack. Using this attack, an unauthorized set of agents can gain access to some information on the dealer’s secret. Furthermore, it is shown that the information on the dealer’s secret that the unauthorized set can obtain increases in proportion to the number’s square of agents, and the proportion that the unauthorized set can extract information on the dealer’s secret is close to 1 with the increase of the agents’ number in the unauthorized set. Finally, we analyze the reason for the security leak and propose an effective way to improve the KTYC-protocol’s security. We hope this work shed some light on the next development for the design and analyzing of QSS.

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant Nos. 62272208, 62172196, 61902166), and the Natural Science Foundation of Henan Province, China (Grant No. 212300410062).

Author contributions

X.Q. Cai gave the cryptanalysis, S. Li proposed the way to deal the security problem, Z.F. Liu prepared Figs. 1 and 2, X.Q. Cai and T.Y. Wang wrote the main manuscript text. All authors reviewed the manuscript.

Data availability

All data generated or analyzed during this study are included in this article.

Competing interests

The authors declare no competing interests.

Footnotes

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Shamir, A. How to share a secret. Commun. ACM22(11), 612–613 (1979). 10.1145/359168.359176 [DOI] [Google Scholar]
  • 2.Blakely, G. Safeguarding cryptographic keys. In Proceedings of the National Computer Conference FIPS, AFIPS, Montvale 313–317 (IEEE Press, 1979). [Google Scholar]
  • 3.Cramer, R., Damgård, I. & Maurer, U. General secure multi-party computation from any linear secret-sharing scheme. Phys. Rev. A59(3), 316–334 (2000). [Google Scholar]
  • 4.Parakh, A. & Kak, S. Space efficient secret sharing for implicit data security. Inf. Sci.181(2), 335–341 (2011). 10.1016/j.ins.2010.09.013 [DOI] [Google Scholar]
  • 5.Cai, X. Q. et al. Cryptanalysis of secure multiparty quantum summation. Quantum Inf. Process.21(8), 285 (2022). 10.1007/s11128-022-03638-y [DOI] [Google Scholar]
  • 6.Long, G. L. et al. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A65(3), 032302 (2002). 10.1103/PhysRevA.65.032302 [DOI] [Google Scholar]
  • 7.Chen, G. et al. Quantum identity authentication based on the extension of quantum rotation. EPJ Quantum Technol.10(1), 1–18 (2023). 10.1140/epjqt/s40507-023-00170-5 [DOI] [Google Scholar]
  • 8.Ye, C. Q. et al. Security and application of semi-quantum key distribution protocol for users with different quantum capabilities. EPJ Quantum Technol.10(1), 1–23 (2023). 10.1140/epjqt/s40507-023-00180-3 [DOI] [Google Scholar]
  • 9.Hillery, M., Buzěk, V. & Berthiaume, A. Quantum secret sharing. Phys. Rev. A59(3), 1829–1834 (1999). 10.1103/PhysRevA.59.1829 [DOI] [Google Scholar]
  • 10.Zhang, Z. J., Li, Y. & Man, Z. X. Multiparty quantum secret sharing. Phys. Rev. A71(4), 044301 (2005). 10.1103/PhysRevA.71.044301 [DOI] [Google Scholar]
  • 11.Schmid, C. et al. Experimental single qubit quantum secret sharing. Phys. Rev. Lett.95(23), 230505 (2005). 10.1103/PhysRevLett.95.230505 [DOI] [PubMed] [Google Scholar]
  • 12.Deng, F. G., Zhou, H. Y. & Long, G. L. Circular quantum secret sharing. J. Phys. A39(45), 14089 (2006). 10.1088/0305-4470/39/45/018 [DOI] [Google Scholar]
  • 13.Wang, T. Y. et al. An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun.281(24), 6130–6134 (2008). 10.1016/j.optcom.2008.09.026 [DOI] [Google Scholar]
  • 14.Zhang, Z. J. & Man, Z. X. Multiparty quantum secret sharing of classical messages based on entanglement swapping. Phys. Rev. A72(2), 022303 (2005). 10.1103/PhysRevA.72.022303 [DOI] [Google Scholar]
  • 15.Lin, J. & Hwang, T. An enhancement on Shi et al.’s multiparty quantum secret sharing protocol. Opt. Commun.284(5), 1468–1471 (2011). 10.1016/j.optcom.2010.10.095 [DOI] [Google Scholar]
  • 16.Lin, J. & Hwang, T. New circular quantum secret sharing for remote agents. Quantum Inf. Process.12(1), 685–697 (2013). 10.1007/s11128-012-0413-8 [DOI] [Google Scholar]
  • 17.Chen, Y. A. et al. Experimental quantum secret sharing and third-man quantum cryptography. Phys. Rev. Lett.95(20), 200502 (2005). 10.1103/PhysRevLett.95.200502 [DOI] [PubMed] [Google Scholar]
  • 18.Fu, Y. et al. Long-distance measurement-device-independent multiparty quantum communication. Phys. Rev. Lett.1149, 090501 (2015). 10.1103/PhysRevLett.114.090501 [DOI] [PubMed] [Google Scholar]
  • 19.Wu, Y. et al. Continuous-variable measurement-device-independent multipartite quantum communication. Phys. Rev. A93(2), 022325 (2016). 10.1103/PhysRevA.93.022325 [DOI] [Google Scholar]
  • 20.Zhou, Y. et al. Quantum secret sharing among four players using multipartite bound entanglement of an optical field. Phys. Rev. Lett.121(15), 150502 (2018). 10.1103/PhysRevLett.121.150502 [DOI] [PubMed] [Google Scholar]
  • 21.Dou, Z. et al. A secure rational quantum state sharing protocol. Sci. China Inf. Sci.61(2), 1–12 (2018). 10.1007/s11432-016-9151-x [DOI] [Google Scholar]
  • 22.Zhou, Y. Y. et al. Quantum secret sharing among four players using multipartite bound entanglement of an optical field. Phys. Rev. Lett.121(15), 150502 (2018). 10.1103/PhysRevLett.121.150502 [DOI] [PubMed] [Google Scholar]
  • 23.Gao, Z. K., Li, T. & Li, Z. H. Deterministic measurement-device-independent quantum secret sharing. Sci. China-Phys. Mech. Astron.63(12), 120311 (2020). 10.1007/s11433-020-1603-7 [DOI] [Google Scholar]
  • 24.Liao, Q. et al. Quantum secret sharing using discretely modulated coherent states. Phys. Rev. A103(3), 032410 (2021). 10.1103/PhysRevA.103.032410 [DOI] [Google Scholar]
  • 25.Ju, X. X. et al. Measurement-device-independent quantum secret sharing with hyper-encoding. Chin. Phys. B31(10), 100302 (2022). 10.1088/1674-1056/ac70bb [DOI] [Google Scholar]
  • 26.Cai, X. Q. et al. Measurement-device-independent quantum secret sharing. Adv. Quantum Technol.10.1002/qute.202400060 (2024). 10.1002/qute.202400060 [DOI] [Google Scholar]
  • 27.Qin, S. J. et al. Cryptanalysis of the Hillery–Buzek–Berthiaume quantum secret-sharing protocol. Phys. Rev. A76(7), 062324 (2007). 10.1103/PhysRevA.76.062324 [DOI] [Google Scholar]
  • 28.Gao, F. et al. Dense-coding attack on threeparty quantum key distribution protocols. IEEE J. Quantum Electron.47(5), 630–635 (2011). 10.1109/JQE.2011.2107889 [DOI] [Google Scholar]
  • 29.Yang, Y. G. et al. Participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing. Sci. China-Phys. Mech. Astron.64(26), 260321 (2021). 10.1007/s11433-021-1692-5 [DOI] [Google Scholar]
  • 30.Wang, T. Y. et al. Security of a kind of quantum secret sharing with entangled states. Sci. Rep.7, 2485 (2017). 10.1038/s41598-017-02543-0 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 31.Kuo, S. Y. et al. Efficient multiparty quantum secret sharing based on a novel structure and single qubits. EPJ Quantum Technol.10(1), 29 (2023). 10.1140/epjqt/s40507-023-00186-x [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 32.Hwang, W. Y. Quantum key distribution with high loss: Toward global secure communication. Phys. Rev. Lett.91(5), 057901 (2003). 10.1103/PhysRevLett.91.057901 [DOI] [PubMed] [Google Scholar]
  • 33.Li, C. Y. et al. Secure quantum key distribution network with Bell states and local unitary operations. Chin. Phys. Lett.22(5), 1049 (2005). 10.1088/0256-307X/22/5/006 [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

All data generated or analyzed during this study are included in this article.


Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES