Genuine Secret-Sharing States
Abstract
Quantum secret sharing allows each player to have classical information for secret sharing in quantum mechanical ways. In this work, we construct a class of quantum states on which players can quantumly perform secret sharing secure against dishonest players as well as eavesdropper. We here call them the genuine secret-sharing states. In addition, we show that if players share an -party genuine secret-sharing state, then arbitrary players out of the total players can share an -party genuine secret-sharing state by means of local operations and classical communication on the state. We also define the distillable rate with respect to the genuine secret-sharing state, and explain the connection between the distillable rate and the relative entropy of entanglement.
I Introduction
Secret sharing Blakley (1979); Shamir (1979) is a way of allocating a secret among players, and a sufficient number of players must cooperate to restore the secret. To be more specific, in a -threshold secret sharing scheme, a dealer distributes a secret to players, and or more players can reconstruct the secret if they collaborate, but fewer than players cannot do so, where . Because of this feature, secret sharing can be used to deal with important and sensitive information.
We remark that quantum mechanics can provide us with unconditionally secure secret sharing. For example, there is a quantum protocol Hillery et al. (1999) based on the Greenberger-Horne-Zeilinger (GHZ) state Greenberger et al. (1989) in which each player can obtain a classical bit for -threshold secret sharing. More precisely, if players including a dealer share an -qubit GHZ state, then they can carry out an -threshold secret sharing through the protocol. As a matter of fact, this secret-sharing protocol can be considered as an natural generalization of the Bell-state based quantum key distribution (QKD) protocol Ekert (1991).
Even though two players can securely share a secret key through the Bell state, there is a specific class of states on which perfectly secure QKD can be performed. The states in the class are called the private states Horodecki et al. (2005, 2009). In a similar way to the private states in QKD, we can naturally ask the following question, what kinds of quantum states are required to accomplish a secure -threshold secret sharing? In Ref. Chi et al. (2008), this question has already been considered, and the quantum states, called the secret-sharing states, have been suggested as an answer to the question. It has been shown that if players share a secret-sharing state, then each player can have a classical bit for secret sharing, which is secure against any external eavesdropper. However, dishonest players, who have a fatal impact on the security of secret sharing, were not sufficiently considered in Ref. Chi et al. (2008). In particular, we can find secret-sharing states that provide each legitimate player with a secret bit, which is insecure against dishonest players, as we will see below. In other words, secret sharing is not in general guaranteed on the secret-sharing states.
To see this, we first look at the secret-sharing conditions presented in Ref. Chi et al. (2008): (i) The probability distributions of the players’ secret bits must be unbiased, and perfectly correlated, that is, if we let be the probability that the players get the random bit string , then for with even parity and for with odd parity. (ii) Any eavesdropper cannot obtain any information about the players’ secret bits. For , let be the player ’s qubit system, and be the ’s another system with arbitrary dimension. Then it has been shown Chi et al. (2008) that is a quantum state for secret sharing, that is, a secret-sharing state, where and if and only if it is of the form
where is an arbitrary state, and the ’s are unitary operators on the system . Here, and are called the secret part and the shield part of the state, respectively.
Suppose that three players share the following secret-sharing state,
(1) |
Then we can readily see that if is a dishonest player, then he/she can perfectly know the other players’ secret information by measuring his/her own secret part and shield part in the computational basis.
There also exists a secret-sharing state on which each legitimate player has an insecure secret bit against dishonest players, even when dishonest players do not handle their shield parts. It can be easily seen from the following secret-sharing state,
In this case, and can totally know the other players’ measurement outcomes by measuring their secret parts in the Bell basis, and they can also deceive legitimate players as if they measure their secret parts in the computational basis.
These problems are caused by the lack of sufficient consideration on dishonest players in the secret-sharing conditions. Hence, in this work, we modify the secret-sharing conditions to fully cover -threshold secret sharing scenarios, and introduce a class of quantum states on which each player can obtain a classical information for secret sharing secure against not only eavesdropper but also dishonest players. We call them the genuine secret-sharing (GSS) states. In addition, we show that if players share an -party GSS state, local operations and classical communication (LOCC) enables any players out of the players to share an -party GSS state. It can be an important property in a quantum network connected by repeaters, since if the network consists of a GSS state then players can share their own GSS state with properly smaller size without providing any information to the repeaters.
Furthermore, we define the distillable rate with respect to the GSS state, and also show that the distillable rate is upper bounded by the relative entropy of entanglement Vedral et al. (1997); Vedral and Plenio (1998) between any bipartition of the total players. By using this property, we discuss the irreducible GSS state, which players cannot have additional information for secret sharing from the shield part of the state via LOCC.
II Genuine secret-sharing state and its properties
To perfectly deal with -threshold secret sharing scenarios, we should also regard dishonest players as internal eavesdroppers who may conspire with an external one. Thus we modify the secret-sharing conditions in Ref. Chi et al. (2008) as follows.
-
(i)
The probability distributions of all players’ secret information must be unbiased and perfectly correlated.
-
(ii′)
Any eavesdropper and dishonest players cannot get any information about the legitimate players’ secret information.
Since the modified conditions include the previous ones, the quantum states on which players can have secret information that satisfies the modified conditions also have the form of the secret-sharing states, but they must be different from the states. The difference can be seen in the following theorem. From now on, we let be the qudit system for all to handle more general situations.
Theorem 1.
is a quantum state on which players can obtain secret information that obeys the modified secret-sharing conditions by measuring their secret parts in the computational basis if and only if for any bipartite split of the players with , the given state can be written as
(2) |
where
and are the secret part and the shield part of , respectively, is an arbitrary state, and the and are unitary operators on the system and , respectively. We call the state the GSS state.
Proof.
We first give a proof of the forward direction. Suppose that is a purification of , that is,
(3) |
where is the reference system for the purification, which can be considered as the system of the external eavesdropper. From the condition (i), we have for and for .
For a dealer , the worst case is that the other players except one player are dishonest. In this case, by changing the order of the systems, we can rewrite the state as follows:
where is the secret part of the dishonest players and
Let be ’s measurement outcome, then the quantum state of dishonest players and eavesdropper after the measurement becomes
where is the shield part of the dishonest players. Since the eavesdropper and dishonest players cannot get any information about the ’s outcome, for any . We note that is written as
Hence, implies that if and satisfy , then
It follows from Hughston-Jozsa-Wooters theorem Hughston et al. (1993) that for , if , there is a unitary operator on the system such that
(4) |
for all .
Let us now divide the players into two parties, and , where . Then Eq. (3) can be rewritten as
(5) |
Here, all possible cases of secret sharing, including the case where is the party of the dishonest players, should be considered. Thus, by symmetry and the Eq. (4), it can be shown that there are unitary operators and such that
for and , where . For instance, if , then
(6) |
where and . Therefore, if we let be its spectral decomposition, we have
where forms an orthonormal set for the system , and thus has the form in Eq. (1).
Conversely, we now assume that for any bipartite split of the players with , the given state is of the form in Eq. (1). Then it can be readily checked that players have secret information that satisfies the condition (i) by measuring their secret parts in the computational basis. It remains to show that the secret information satisfies the condition (ii′).
Suppose that and are parties of legitimate players and dishonest players, respectively. Let be a spectral decomposition of , and
where is an orthonormal set for the system . Then we can see that the state of the form in Eq. (5) is a purification of .
Let be the legitimate players’ measurement outcome after measuring their secret parts, then the eavesdropper and dishonest players’ state after the measurement becomes
for and for . Since this state does not depend on the unitary operator , for any . This means that the legitimate players’ secret information is secure against dishonest players and eavesdropper. ∎
As seen in Eq. (6), unitary operators on the shield part of the GSS state can be expressed as the product of unitary operators acting on two players’ shield parts.
Corollary 2.
For any rearranged order , the GSS state can be written as
(7) |
where for some unitary operators with .
Let us now investigate the properties of the GSS state. We remark that if players share the -party GHZ state, then any players among the total players can share the -party GHZ state by all players’ LOCC. We can see from the following theorem that the GSS state has the similar property.
Theorem 3.
Suppose that players share a GSS state . Then for any bipartite split of the players with , can share a GSS state by means of LOCC.
Proof.
Let us divide into legitimate players’ party and dishonest players’ party with . By rearranging the order, let , , and . Since is a GSS state, it follows from the Corollary 2 that is written as in Eq. (7).
Assume that players in measure their secret parts in the computational basis, and have the measurement outcome . Then , , and the post-measurement state becomes as follows:
where
and
By tracing out the ’s system, we can see that ’s state is written as
for some state . Hence, after one of players in applies unitary operator on his/her secret part, their state becomes a GSS state. ∎
Since quantum networks in general require repeaters connecting players because of the distance limitation of quantum communication, and players want to get a secure information without providing their information to repeaters, this property can play an important role in quantum networks. Hence, in quantum networks, sharing a GSS state can be a goal for secure multipartite quantum communication.
The next property is about a relation between the GSS state and the Holevo information Holevo (1973), which is one of the important quantities in security analysis. Suppose that Alice and Bob share a state , and Alice measures her system. For each Alice’s measurement outcome , let and be its probability and Bob’s resulting state after her measurement, respectively. The Holevo information between Alice’s measurement outcomes and Bob’s state is given by
where is the von Neumann entropy and . Zero Holevo information between Alice’s measurement outcomes and Bob’s state, that is, means that Bob cannot have any information about Alice’s measurement outcomes. Thus, the modified condition (ii′) can be replaced as follows: For a given quantum state , for any party of dishonest players and eavesdropper, where is the the legitimate player ’s secret information. In other words, the Holevo information is zero if and only if the state satisfying the condition (i) for secret sharing is a GSS state. For example, since in Eq. (I), where is the ’s measurement outcome when he/she measures his/her secret part in the computational basis, the secret-sharing state in Eq. (I) is not a GSS state.
Theorem 4.
Let be a quantum state and be the probability that players’ measurement outcome is when they measure the system in the computational basis. Suppose that for and for . Then is a GSS state if and only if for any with , the Holevo information equals zero, where is the measurement outcome of the ’s secret part and .
Proof.
We show that ’s are identical for all if for any with , , where is the measurement outcome of . If it is true, then Theorem 1 completes the proof. Without loss of generality, we may assume that , and for . Note that the following state is a purification of the given state:
where is the secret part of and
When ’s measurement outcome is , the state of and eavesdropper can be described as
where . Since the Holevo information equals zero, for any ’s measurement outcomes and . Similarly, since , we also have for any ’s measurement outcomes and , where
with . Thus, if ,
for . In particular, since
for and , we obtain
for any , that is, ’s are all equal. Hence, if , then for all . By symmetry, it follows that ’s are identical for all . ∎
Theorem 4 shows that players’ secret information must be unbiased in order to be secure against dishonest players and eavesdropper. Therefore, the condition (ii′) of the modified secret-sharing conditions includes unbiasedness of the players’ secret information, and so the unbiasedness can be omitted in the condition (i) of the modified conditions.
III GSS Distillable Rate
In this section, we discuss the distillable rate with respect to the GSS state. Before defining the distillable rate, we need to consider one issue arising from the presence of dishonest players. For instance, let us look at the secret-sharing state in Eq. (I) once more. For with , if we let and , the state can be written as
Hence, for any ’s measurement basis , player can get the other players’ secret information by properly measuring his/her system. However, since this is a secret-sharing state, it is GHZ distillable Chi et al. (2008), that is, the GHZ state can be asymptotically distilled from the state by LOCC. Thus, if we define the distillable rate as how many copies of the given state are required to asymptotically distill a GSS state through LOCC, the completely insecure quantum state may have a strictly positive rate.
In order to avoid such an issue, we employ the Devetak-Winter rate Devetak and Winter (2005); Kogias et al. (2017). Let be a given state. We say that has positive Devetak-Winter rate if there is a set of measurement operations such that for any with , , where is the mutual information between and , , is the ’s measurement outcome, and is the sum of the measurement outcomes of players except . If we define the distillable rate only for quantum states with positive Devetak-Winter rate, then we can rule out quantum states that are completely insecure.
Definition 1.
For given state with positive Devetak-Winter rate, let be a sequence of LOCC operations such that . We call a GSS distillation protocol of the state if , where is a GSS state that has a secret part with dimension . For given protocol , its rate is defined as
and the GSS distillable rate of the state is given by
We note that when players are divided into two parties, and , they can have a private state between two parties if they share a GSS state. Thus, we have
where is the distillable key rate between and , which is defined by protocols to distill private states Horodecki et al. (2009). In addition, since the relative entropy of entanglement (REE) is an upper bound of the distillable key rate Horodecki et al. (2009), we obtain
(8) |
where is REE between and , that is,
Here, is the relative entropy, and is the set of bipartite separable states of the system .
Using the GSS distillable rate, one can define irreducible GSS state, as irreducible private state is defined in Ref. Horodecki et al. (2009). For any GSS state whose secret part is of dimension , the state is said to be irreducible if . Then the following theorem provides a way to check that a given GSS state is irreducible.
Theorem 5.
Let be a GSS state and denote the party of players except . If is written as
where is a state on the system , and and are the secret part and the shield part of , respectively, then
(9) |
Proof.
Let us consider the unitary operator
Since the REE is invariant under local unitary operation, . Note that
where
Hence, we can regard as a private state. By Theorem 3 in Ref. Horodecki et al. (2009), we can prove this theorem. ∎
IV Examples
Example 1.
Let us consider a quantum network consisting of only private states. In order for each player to get a secret bit for secret sharing in the network, all players should be connected via private states. More precisely, assume that Alice and Bob, Bob and Charlie, and Charlie and Alice share the following private states:
where , , and are arbitrary states, and , , and are unitary operators on the system , , and , respectively. If and are measurement outcomes when they measure their key parts 1 and 2 in the computational basis, respectively, then can be used as a secret bit for secret sharing.
This secret bit can also be obtained from the process where each player takes the unitary on his/her key parts, and measures the first key part in the computational basis. After taking the unitary operators on their key parts, the state becomes
where ,
and , and are identity operators. This is to prepare the GSS state so as to obtain a secret bit for secret sharing.
One may think that sharing private states is enough for players to carry out secret sharing. However, as we can see above, it can be seen as a process of preparing a GSS state from private states which share in advance between every pair of the total players, and hence it can be spatially inefficient because the second key parts of the private states are not used in obtaining a secret bit. Therefore, if it is possible to directly share a GSS state, it can be more efficient and more productive than sharing private states when players want to perform secret sharing.
Example 2.
As in Refs. Chi et al. (2008); Horodecki et al. (2009), it can be an interesting task to find a GSS state with low distillable entanglement. To this end, let us first consider the following state:
where , , , , and , , and have orthogonal supports on the system , , and , respectively. Then we can find unitary operators , , and that satisfy , , and . Using these operators, it can be shown that is a GSS state.
We now consider the state
where and are symmetric and antisymmetric Werner states Werner (1989)
with identity operator on the system and the flip operator . It follows from tedious but straightforward calculations that
where is the trace norm. Since the distillable entanglement is upper bounded by the log negativity Vidal and Werner (2002) , we can construct the GSS state that has arbitrarily low bipartite distillable entanglement between Alice and the rest of players by increasing .
V Conclusion
In this work, we have presented the GSS state, and explored its properties. The GSS state provides a classical information for -threshold secret sharing, which is secure against dishonest players and eavesdropper. Furthermore, if players share an -party GSS state, LOCC enables arbitrary players out of the total players to share an -party GSS state. We have also defined the GSS distillable rate, and it has been shown that the REE between any bipartition of the total players is an upper bound on the GSS distillable rate.
The GSS state can be regarded as a generalization of the private state with respect to secret sharing. In addition, when players share a GSS state, any two players among them can share a private state by all players’ LOCC. Thus, by applying various research results related to the private state, the results can also be used to investigate multipartite communication.
In a quantum network, if players share a GSS state, any arbitrary parties of players can perform QKD or quantum secret sharing. We can naturally have the following question: Is the GSS state the only quantum state on which players can do them? If we answer this question, we can have a more in-depth discussion of the secure quantum network.
There are interesting future works related to the GSS state. First, we can think about a bound entangled state with positive GSS distillable rate. If we find such a state, it can help us to study the relationship between distillable multipartite entanglement and the GSS distillable rate in detail. Second, it can be an intriguing task to find a way to share a GSS state between players and repeaters in quantum networks. If there exists such a way, we can construct a quantum network that ensures secure multipartite communication among players. Therefore the GSS state could be considered as a new resource in multipartite quantum communication.
Acknowledgements.
This research was supported by the Basic Science Research Program through the National Research Foundation of Korea funded by the Ministry of Science and ICT (Grant No.NRF-2019R1A2C1006337) and the Ministry of Science and ICT, Korea, under the Information Technology Research Center support program (Grant No. IITP-2020-2018-0-01402) supervised by the Institute for Information and Communications Technology Promotion. S.L. acknowledges support from Research Leave Program of Kyung Hee University in 2018.References
- Blakley (1979) G. R. Blakley, Proc. of the National Computer Conf. 48, 313 (1979).
- Shamir (1979) A. Shamir, Commun. ACM 22, 612 (1979).
- Hillery et al. (1999) M. Hillery, V. Bužek, and A. Berthiaume, Phys. Rev. A 59, 1829 (1999).
- Greenberger et al. (1989) D. M. Greenberger, M. A. Horne, and A. Zeilinger, Bell’s Theorem, Quantum Theory, and Conceptions of the Universe ed M Kafatos (Dordrecht: Kluwer) p. 69 (1989).
- Ekert (1991) A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991).
- Horodecki et al. (2005) K. Horodecki, M. Horodecki, P. Horodecki, and J. Oppenheim, Phys. Rev. Lett. 94, 160502 (2005).
- Horodecki et al. (2009) K. Horodecki, M. Horodecki, P. Horodecki, and J. Oppenheim, IEEE Trans. Inf. Theory 55, 1898 (2009).
- Chi et al. (2008) D. P. Chi, J. W. Choi, J. S. Kim, T. Kim, and S. Lee, Phys. Rev. A 78, 012351 (2008).
- Vedral et al. (1997) V. Vedral, M. B. Plenio, M. A. Rippin, and P. L. Knight, Phys. Rev. Lett. 78, 2275 (1997).
- Vedral and Plenio (1998) V. Vedral and M. B. Plenio, Phys. Rev. A 57, 1619 (1998).
- Hughston et al. (1993) L. P. Hughston, R. Jozsa, and W. K. Wootters, Phys. Lett. A 183, 14 (1993).
- Holevo (1973) A. S. Holevo, Probl. Peredachi Inf. 9, 3 (1973).
- Devetak and Winter (2005) I. Devetak and A. Winter, Proc. R. Soc. A 461, 207 (2005).
- Kogias et al. (2017) I. Kogias, Y. Xiang, Q. He, and G. Adesso, Phys. Rev. A 95, 012315 (2017).
- Werner (1989) R. F. Werner, Phys. Rev. A 40, 4277–4281 (1989).
- Vidal and Werner (2002) G. Vidal and R. F. Werner, Phys. Rev. A 65, 032314 (2002).