Xu Gang, Zhou Tianai, Chen Xiu-Bo, Wang Xiaojun
School of Information Science and Technology, North China University of Technology, Beijing 100144, China.
Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu 610025, China.
Entropy (Basel). 2022 Mar 8;24(3):381. doi: 10.3390/e24030381.
Quantum information splitting (QIS) provides an idea for transmitting the quantum state through a classical channel and a preshared quantum entanglement resource. This paper presents a new scheme for QIS based on a five-qubit cluster state and a Bell state. In this scheme, the sender transmits the unknown three-qubit secret state to two agents by the quantum channel with the Bell basis measurement three times and broadcasts the measurement results to the agents through the classical channel. The agent who restores the secret state can successfully recover the initial information to be transmitted through the appropriate unitary operation with the help of the other party. Firstly, our scheme's process can be accurately realized by performing the applicable Bell basis measurement, single-qubit measurement, and local unitary operation instead of a multiparticle joint measurement. The splitting process of quantum information is realized through a convenient operation. Secondly, compared with some previous schemes, the efficiency of the total scheme has been improved in principle, and the qubit consumption is reduced. Finally, the security of the quantum information splitting scheme is analyzed from the perspectives of external attacks and participant attacks. It is proved that our scheme can effectively resist internal participant attacks and external eavesdropper attacks.
量子信息分割(QIS)为通过经典信道和预先共享的量子纠缠资源传输量子态提供了一种思路。本文提出了一种基于五量子比特簇态和贝尔态的量子信息分割新方案。在该方案中,发送者通过量子信道利用贝尔基测量三次将未知的三量子比特秘密态发送给两个代理,并通过经典信道将测量结果广播给代理。恢复秘密态的代理可以在另一方的帮助下通过适当的酉操作成功恢复要传输的初始信息。首先,我们方案的过程可以通过执行适用的贝尔基测量、单量子比特测量和局部酉操作来准确实现,而不是进行多粒子联合测量。量子信息的分割过程通过便捷的操作得以实现。其次,与一些先前的方案相比,总体方案的效率在原理上得到了提高,并且量子比特消耗有所减少。最后,从外部攻击和参与者攻击的角度分析了量子信息分割方案的安全性。证明了我们的方案能够有效抵御内部参与者攻击和外部窃听者攻击。