Computational quantum secret sharing

Alper Çakan, Vipul Goyal, Chen Da Liu-Zhang, João Ribeiro

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Quantum secret sharing (QSS) allows a dealer to distribute a secret quantum state among a set of parties in such a way that certain authorized subsets can reconstruct the secret, while unauthorized subsets obtain no information about it. Previous works on QSS for general access structures focused solely on the existence of perfectly secure schemes, and the share size of the known schemes is necessarily exponential even in cases where the access structure is computed by polynomial size monotone circuits. This stands in stark contrast to the classical setting, where polynomial-Time computationally-secure secret sharing schemes have been long known for all access structures computed by polynomial-size monotone circuits under standard hardness assumptions, and one can even obtain shares which are much shorter than the secret (which is impossible with perfect security). While QSS was introduced over twenty years ago, previous works only considered informationtheoretic privacy. In this work, we initiate the study of computationally-secure QSS and show that computational assumptions help significantly in building QSS schemes, just as in the classical case. We present a simple compiler and use it to obtain a large variety results: We construct polynomial-Time computationally-secure QSS schemes under standard hardness assumptions for a rich class of access structures. This includes many access structures for which previous results in QSS necessarily required exponential share size. In fact, we can go even further: We construct QSS schemes for which the size of the quantum shares is significantly smaller than the size of the secret. As in the classical setting, this is impossible with perfect security. We also apply our compiler to obtain results beyond computational QSS. In the informationtheoretic setting, we improve the share size of perfect QSS schemes for a large class of n-party access structures to 1.5n+o(n), improving upon best known schemes and matching the best known result for general access structures in the classical setting. Finally, among other things, we study the class of access structures which can be efficiently implemented when the quantum secret sharing scheme has access to a given number of copies of the secret, including all such functions in P and NP.
Original languageEnglish
Title of host publication18th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2023
EditorsOmar Fawzi, Michael Walter
Place of PublicationDagstuhl
PublisherSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
Number of pages26
ISBN (Print)978-3-95977-283-9
DOIs
Publication statusPublished - Jul 2023
Event18th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2023 - Aveiro, Portugal
Duration: 24 Jul 202328 Jul 2023

Publication series

NameLeibniz International Proceedings in Informatics, LIPIcs
PublisherSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
Volume266
ISSN (Print)1868-8969

Conference

Conference18th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2023
Country/TerritoryPortugal
CityAveiro
Period24/07/2328/07/23

Keywords

  • Quantum cryptography
  • Quantum secret sharing

Fingerprint

Dive into the research topics of 'Computational quantum secret sharing'. Together they form a unique fingerprint.

Cite this