Download PDFOpen PDF in browser

Circular Quantum Secret Sharing Based on SWAP Gates

14 pagesPublished: August 21, 2025

Abstract

Most existing quantum secret sharing (QSS) protocols can be classified into two types of transmission structures: tree-type and circular-type. Compared to circular-type protocols, tree-type QSS protocols are more difficult to implement in practice due to photon energy loss over long distances, rendering them unsuitable when parties are widely separated. However, circular-type protocols still face two major challenges: (1) maintaining the energy of transmitted photons across a long chain of intermediate nodes is infeasible, and (2) reliance on relay transmission makes them vulnerable to Trojan horse attacks. To address these issues, we propose two novel circular-type QSS protocols based on SWAP gates. The proposed protocols are immune to Trojan horse attacks and offer a practical solution for relay transmission, enabling the long-distance distribution of shadow keys to each agent.

Keyphrases: circular transmission, quantum secret sharing, single photons, swap gates, trojan horse attacks

In: Akira Yamada, Huy Kang Kim, Yujue Wang and Tung-Tso Tsai (editors). Proceedings of the 20th Asia Joint Conference on Information Security, vol 106, pages 70-83.

BibTeX entry
@inproceedings{AsiaJCIS2025:Circular_Quantum_Secret_Sharing,
  author    = {Pei-Shiun Tsai and Tzu-Yu Liao and Wei-Rung Chen and Jason Lin and Iuon-Chang Lin},
  title     = {Circular Quantum Secret Sharing Based on SWAP Gates},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/BjTF},
  doi       = {10.29007/9lzf},
  pages     = {70-83},
  year      = {2025}}
Download PDFOpen PDF in browser