Computational Quantum Secret Sharing

04/29/2023
โˆ™
by   Alper Cakan, et al.
โˆ™
0
โˆ™

Quantum secret sharing (QSS) allows a dealer to distribute a secret quantum state among a set of parties so that certain subsets can reconstruct the secret, while unauthorized subsets obtain no information. While QSS was introduced over twenty years ago, previous works focused only on existence of perfectly secure schemes, and the share size of the known schemes is exponential even for access structures computed by polynomial size monotone circuits. This stands in contrast to the classical case, where efficient computationally-secure schemes have been long known for all access structures in ๐—†๐—ˆ๐—‡๐—ˆ๐—๐—ˆ๐—‡๐–พย ๐–ฏ, and one can even obtain shares which are much shorter than the secret which is impossible with perfect security. In this work, we initiate the study of computationally-secure QSS and show that computational assumptions help significantly in building QSS schemes. We present a simple compiler and use it to obtain a large variety results: We construct polynomial-time QSS schemes under standard assumptions for a rich class of access structures. This includes many access structures for which previous results in QSS required exponential share size. We also construct QSS schemes for which the size of the shares is significantly smaller than the size of the secret. As in the classical case, this is impossible with perfect security. We also use our compiler to obtain results beyond computational QSS. In the information-theoretic setting, we improve the share size of perfect QSS schemes for a large class of access structures to 1.5^n+o(n), improving upon best known schemes and matching the best known result for general access structures in the classical case. Finally, we show construct efficient schemes for all access structures in ๐–ฏ and ๐–ญ๐–ฏ when the quantum secret sharing scheme is given multiple of copies of the secret.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
โˆ™ 03/28/2018

Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding Theory

We consider secret sharing schemes with a classical secret and quantum s...
research
โˆ™ 08/21/2020

Indistinguishability Obfuscation from Well-Founded Assumptions

In this work, we show how to construct indistinguishability obfuscation ...
research
โˆ™ 11/13/2018

Classical Access Structures of Ramp Secret Sharing Based on Quantum Stabilizer Codes

In this paper we consider to use the quantum stabilizer codes as secret ...
research
โˆ™ 11/30/2020

Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious Majority and Free Verification

Secret sharing allows a dealer to distribute a secret among several part...
research
โˆ™ 08/18/2020

Access Structure Hiding Secret Sharing from Novel Set Systems and Vector Families

Secret sharing provides a means to distribute shares of a secret such th...
research
โˆ™ 06/20/2023

A Survey of Multivariate Polynomial Commitment Schemes

A commitment scheme is a cryptographic tool that allows one to commit to...
research
โˆ™ 06/27/2019

Smallest graphs achieving the Stinson bound

Perfect secret sharing scheme is a method of distribute a secret informa...

Please sign up or login with your details

Forgot password? Click here to reset