摘要
In a recent paper [Yan F L et al. Chin.Phys.Lett. 25(2008)1187], a quantum secret sharing the protocol between multiparty and multiparty with single photons and unitary transformations was presented. We analyze the security of the protocol and find that a dishonest participant can eavesdrop the key by using a special attack. Finally, we give a description of this strategy and put forward an improved version of this protocol which can stand against this kind of attack.
In a recent paper [Yan F L et al. Chin.Phys.Lett. 25(2008)1187], a quantum secret sharing the protocol between multiparty and multiparty with single photons and unitary transformations was presented. We analyze the security of the protocol and find that a dishonest participant can eavesdrop the key by using a special attack. Finally, we give a description of this strategy and put forward an improved version of this protocol which can stand against this kind of attack.
基金
Supported by the National Natural Science Foundation of China under Grant Nos 60873191, 60903152 and 60821001, the SRFDP under Grant No 200800131016, Beijing Nova Program under Grant No 2008B51, Key Project of the Ministry of Education of China under Grant No 109014, China Postdoctoral Science Foundation under Grant No 20090450018, Fujian Provincial Natural Science Foundation under Grant No 2008J0013, and the Foundation of Fujian Education Bureau under Grant No 3A08044.