Summary: | 碩士 === 國立暨南國際大學 === 資訊工程學系 === 99 === In the times of fast developed technology, to processing tremendous amount of computing data, the ability of computing has always been developed rapidly. According to Moore’s Law, with the growing of the complexity of integrated circuit day by day, the density of circuit is getting higher and higher. And this has made the components in each circuit smaller and smaller. Therefore, there have been some problems when the classical bits cannot be achieved ever since. To solve the computation that traditional computers are not able to process, and the obstacle to break through the limitation of the size of hardware of traditional computers, scientists started to focus on the discussion of qubits in attempts to conclude the methods to replace the classical bits. Meanwhile, scientists also brought out a lot of algorithm for quantum and quantum information security protocols to let quantum computing processes the information more precisely, safer and more efficiency.
In modern times, there are amount of text and audio-visual materials have been transformed into digital files and communicated on the internet since the computers and the internet fast progressed. It proves that the security of transmitting information and on the internet is becoming a quite important issue in the field of information security. So, the information security on the internet had been attracted and researched. Moreover, the researches in the field of information security are attracted. In all researches of information security, secret sharing is a remarkable example.
The concept of secret sharing is as follows: When dealer Alice wants to send the secret messages to her agents Bob and Charlie. Alice is worried about there is a dishonor, she does not want agent knows whole messages directly by oneself. So, she splits the secret message into two pieces and makes encryption on two pieces. Once Bob and Charlie collaborate, they can decode the message from Alice. Nevertheless, it is easy to intercepts and copies the secret message by eavesdropper Eve by using classical bits. Eve steals message from Alice, then copies a same classical and sends to Bob without detecting. Therefore, there are some defects in the classical secret sharing by utilizing classical bits.
The Quantum Secret Sharing protocol (QSS) is a communication protocol of combining quantum mechanics and classical secret sharing. Different from the classical secret sharing, quantum mechanics and quantum non-cloning theorem are used in QSS. Once a qubit is measured, it collapses into one particular quantum state. If there is an eavesdropper stealing, the state of qubit will be changed such that Eve will be detected. Consequently, quantum secret sharing can prevent Eve from eavesdropping.
In order to improve the defects of classical secret sharing, quantum secret sharing are proposed. In this paper, we will present a new method of quantum secret sharing by using quantum entanglement. Moreover, different from former protocols using code table to assist decoding, we present a quantum secret sharing without code table in our scheme to improve the security of the secret messages.
|