A simple participant attack on the brádler-dušek protocol

  • Authors:
  • Fei Gao;Su-Juan Qin;Qiao-Yan Wen;Fu-Chen Zhu

  • Affiliations:
  • State Key Laboratory of Integrated Services Network, Xidian University, Xi'an, China and School of Science, Beijing University of Posts and Telecommunications, Beijing, China;School of Science, Beijing University of Posts and Telecommunications, Beijing, China;School of Science, Beijing University of Posts and Telecommunications, Beijing, China;National Laboratory for Modern Communications, Chengdu, China

  • Venue:
  • Quantum Information & Computation
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The ring-arrangement quantum secret sharing protocol in the paper [K. Brádler and M. Dušek (2004) J. Opt. B: Quantum Semiclass. Opt. 6 63] is analyzed and it is shown that this protocol is secure for any eavesdropper except for a dishonest participant. For example, by a special strategy, Bob can steal Charlie's portion of information without being detected and then recover Alice's secret by himself. We give a description of this strategy and point out a possible way to improve the protocol to stand against this attack.