Introduction

In 1979, the concept of secret sharing was firstly introduced by Shamir1 and Blakely2 independently, which allowed just authorized sets can recover the dealer’s secret, but unauthorized sets can learn no information on it. As a building block, secret sharing was often used to construct robust key management, secure multiparty computation, threshold digital signature and so on, which can function securely and reliably even when misfortunes destroy most of the shares and security breaches expose all but one of the remaining shares3,4,5.

In quantum cryptographic domain, Hillery et al introduced the concept of quantum secret sharing (QSS) and gave the first QSS protocol based on Greenberger-Horne-Zeilinger entangled states in 19996. In contrast to classical secret sharing, QSS is secure even against the opponents with powerful computing resources. Accordingly, QSS has attracted much attention and many proposals were reported one after another7,8,9,10,11,12,13,14,15,16. However, quantum resources and capabilities are not readily available to ordinary people in reality. In order to make QSS more practical, Li et al presented a semi-quantum secret sharing protocol using entangled states, which requires only quantum users to have full quantum capability, while the other participants are classical participants with limited quantum capability17. In 2012, a semi-quantum secret sharing protocol based on two-particle entangled state was proposed by wang et al, in which quantum Alice shares a secret key with two classical participants Bob and Charlie18. Instead of entangled states, Li et al proposed a new semi-quantum secret sharing protocol based on two-particle product states19. At the same time, a new construction of semi-quantum secret sharing was given, in which only 2nm qubits are required to produce an n-bit secret key in the (\(m+1\))-party protocol20. Subsequently, semi-quantum secret sharing continued to be concerned21,22,23,24. Especially, a controlled semi-quantum secret sharing protocol (named HHH-protocol hereafter) with entangled states was proposed recently, which achieves a lower cost by reducing returning qubits and entangled state measurement25.

In this work, we analyzed the HHH-protocol’s security and propose two new attacks (participant attack and denial-of-service attack). Using the first attack, the controller can recover the secret with just one participant’s cooperation. Using the second attack, an external opponent can make participants fail to recover the secret correctly. Therefore, the HHH-protocol does not satisfy the security requirement for secret sharing. In the end, we discuss how to resist these attacks.

Results

The HHH-protocol

Before presenting the cryptanalysis, let us firstly give a brief description of HHH-protocol. For simplicity, we take participants to share one-bit message as an example. Assume that quantum user Alice wants to share a secret bit \(m_{A}\) with n classical users \(\hbox {Bob}_{{1}}\), \(\hbox {Bob}_{{2}}\), ..., \(\hbox {Bob}_{{n}}\), where \(\hbox {Bob}_{{1}}\) has limited quantum capabilities and the other \(n-1\) classical users can only perform Z-basis measurement. This protocol can be described as follows25.

Table 1 The corresponding measurement results.
  1. (1)

    Alice prepares L entangled states, each of which is denoted as

    $$\begin{aligned}&|\varphi \rangle _{a_{1}a_{2}b_{1}\cdots b_{n}}=\frac{1}{2}[|000\rangle |0\rangle ^{\otimes n-1}+|010\rangle |1\rangle ^{\otimes n-1}\nonumber \\&+|101\rangle |0\rangle ^{\otimes n-1}+|111\rangle |1\rangle ^{\otimes n-1}]_{a_{1}a_{2}b_{1}\cdots b_{n}} \end{aligned}$$
    (1)

    where \(a_{1},a_{2},b_{1},\cdots ,b_{n}\) denotes \(n+2\) particles of the entangled state \(|\varphi \rangle _{a_{1}a_{2}b_{1}\cdots b_{n}}\), respectively. The particles of L entangled states are defined as \([P_{a_{1}a_{2}b_{1}\cdots b_{n}}^{1},P_{a_{1}a_{2}b_{1}\cdots b_{n}} ^{2},\cdots ,P_{a_{1}a_{2}b_{1}\cdots b_{n}}^{L}]\). Then she divides these particles into \(n+1\) sequences \(S_{A},S_{B_{1}},S_{B_{2}},\cdots ,S_{B_{n}}\), here \(S_{A}\) contains all the first two particles \(a_{1}a_{2}\) of L entangled states and \(S_{B_{i}}\) constitutes of all the particles \(b_{i}\) of L entangled states for \(i=1,2,\dots ,n\), i.e.,

    $$\begin{aligned}&S_{A}=&(P_{a_{1}}^{1}P_{a_{2}}^{1},P_{a_{1}}^{2}P_{a_{2}}^{2},\cdots ,P_{a_{1}}^{L}P_{a_{2}}^{L})\\&S_{B_{1}}=&(P_{b_{1}}^{1},P_{b_{1}}^{2},\cdots ,P_{b_{1}}^{L})\\&S_{B_{2}}=&(P_{b_{2}}^{1},P_{b_{2}}^{2},\cdots ,P_{b_{2}}^{L})\\&\vdots \\&S_{B_{n}}=&(P_{b_{n}}^{1},P_{b_{n}}^{2},\cdots ,P_{b_{n}}^{L}) \end{aligned}$$

    For each entangled state, Alice holds the first and second qubits in her hands and randomly performs two unitary operations (H or I) on every particles of the randomly selected groups that are used to check the security of the quantum channels. Finally, Alice sends \(S_{B_{i}}\) to \(\hbox {Bob}_{{i}}\) for \(i=1,2,\dots ,n\).

  2. (2)

    When all users have reported that they have received the sequences \(S_{B_{1}},S_{B_{2}},\cdots ,S_{B_{n}}\), Alice announces the order of the particles. According to Alice’s announcement, \(\hbox {Bob}_{{i}}\) chooses these particles, and then \(\hbox {Bob}_{{2}}\), \(\hbox {Bob}_{{3}}\), \(\cdots\) , \(\hbox {Bob}_{{n}}\) measures them with Z-basis, and \(\hbox {Bob}_{{1}}\) randomly chooses either to measure the particle with Z-basis or to return it to Alice without any modification. When Alice receives the particle from \(\hbox {Bob}_{{1}}\), she measures it that depends on her choice. She uses the Z-basis to measure her particle and the received particle if she performs an I-operation on the particle in the preparation phase; otherwise, she uses the X-basis. The measurement outcomes should be correlated according to the Table 1 in25. If the error rate exceeds a predefined threshold, the protocol is aborted; otherwise, it continues.

  3. (3)

    Alice determines her specific information and measures the two particles \(a_{1}a_{2}\) held by her. Based on her measurements, she asks \(\hbox {Bob}_{{1}}\) to act as a controller and performs an appropriate unitary-operation on his particle according to the Table 2 in25.

Table 2 Relation between the secret, measurement results and \(\hbox {Bob}_{{1}}\)’s operation.
  1. (4)

    All users \(\hbox {Bob}_{{1}}\), \(\hbox {Bob}_{{2}}\), ..., \(\hbox {Bob}_{{n}}\) respectively measure their own particles, and then recover Alice’s secret by performing an OR operation on the results \(r_{B_{1}}, r_{B_{2}}, \dots , r_{B_{n}}\) if they cooperate with each other, i.e.,

    $$\begin{aligned} m_{A}=r_{B_{1}}\oplus r_{B_{2}}\oplus \cdots \oplus r_{B_{n}}. \end{aligned}$$
    (2)

Cryptanalysis of HHH-protocol

As we know, cryptanalysis is opposite but accelerative to cryptographic design, and therefore it is also indispensable to the development of cryptography. This is also the case for quantum cryptography26,27,28. However, it is not easy to analyze the security of multiparty quantum cryptographic protocols especially for QSS. This is because multiple participants are involved and some may cheat. Furthermore, the security of QSS requires that only authorized sets of agents can recover the secret distributed by the dealer, but unauthorized sets can get no information on it29,30,31,32. However, here we show that the HHH-protocol does not satisfy this requirement. Furthermore, an external opponent can make participants fail to recover the real secret without being detected.

As claimed in the HHH-protocol25, the secret can only be recovered by the cooperation of all classical users \(\hbox {Bob}_{{1}}\), \(\hbox {Bob}_{{2}}\), \(\cdots\) , \(\hbox {Bob}_{{n}}\), which means that the HHH-protocol is actually a (nn) threshold QSS protocol. Therefore, the HHH-protocol has just one authorized set, i.e., {\(\hbox {Bob}_{{1}}\), \(\hbox {Bob}_{{2}}\), \(\cdots\) , \(\hbox {Bob}_{{n}}\)}, who can recover the secret \(m_{A}\) if and only all of them cooperate with each other in Step 4. In the semi-quantum HHH-protocol, \(\hbox {Bob}_{{2}}\), \(\hbox {Bob}_{{3}}\), \(\cdots\) , \(\hbox {Bob}_{{n}}\) are classical and \(\hbox {Bob}_{{1}}\) is required to have only limited quantum capabilities, which makes it more practical, but it also gives a good chance for opponents to launch attacks, which can be shown in Theorems 1 and 2.

Theorem 1

An unauthorized set {\(\hbox {Bob}_{{1}}\), \(\hbox {Bob}_{{i}}\)} can recover the secret \(m_{A}\) in the HHH-protocol, where \(1<i\le n\).

Proof.

From Eq. (2), it can be seen that all the n sub-secrets \(r_{B_{1}}, r_{B_{2}}\), ..., \(r_{B_{n}}\) are essential to recover the secret \(m_{A}\). Nevertheless, we can find that the measurement results of \(\hbox {Bob}_{{2}}\), \(\hbox {Bob}_{{3}}\), \(\cdots\) , and \(\hbox {Bob}_{{n}}\) are always the same in the Table 2, i.e.,

$$\begin{aligned} r_{B_{2}}=r_{B_{3}}=\cdots =r_{B_{n}}, \end{aligned}$$
(3)

which means that any user \(\hbox {Bob}_{{i}}\) can deduce the other \(n-2\) users’ measurement results by virtue of his own. Therefore, if \(\hbox {Bob}_{{1}}\) cooperates with \(\hbox {Bob}_{{i}}\), they can recover the secret \(m_{A}\) by computing

$$\begin{aligned} m_{A}=r_{B_{1}}\oplus (n-1)r_{B_{i}}. \end{aligned}$$
(4)

The proof of Theorem 1 is completed.

Theorem 2

An external opponent Eve can make the users fail to recover the real secret \(m_{A}\) without being detected in the HHH-protocol.

Proof.

Without loss of generality, we take two users’ case as an example, i.e., there are three players Alice, \(\hbox {Bob}_{{1}}\), \(\hbox {Bob}_{{2}}\) in the HHH-protocol. In Step (1), when Alice sends the particle sequence \(S_{B_{2}}\) to \(\hbox {Bob}_{{2}}\), Eve intercepts it. For each particle \(P_{b_{2}}^{j}\) \((j=1,2,\dots ,L)\) of the sequence \(S_{B_{2}}\), Eve performs a CNOT operation on \(P_{b_{2}}^{j}\) and an auxiliary particle \(|0\rangle _{e}^{j}\) prepared in advance, where the particle \(P_{b_{2}}^{j}\) is control qubit and the auxiliary particle \(|0\rangle _{e}^{j}\) is target qubit, and

$$\begin{aligned} \texttt {CNOT}= \begin{pmatrix} 1 & 0 & 0 & 0\\ 0 & 1 & 0 & 0 \\ 0 & 0 & 0 & 1\\ 0 & 0 & 1 & 0 \\ \end{pmatrix} \end{aligned}$$

i.e., \(\texttt {CNOT}|00\rangle =|00\rangle\), \(\texttt {CNOT}|01\rangle =|01\rangle\), \(\texttt {CNOT}|10\rangle =|11\rangle\), \(\texttt {CNOT}|11\rangle =|10\rangle\). After this operation, the jth entangled state \(|\varphi \rangle ^{j}_{a_{1}a_{2}b_{1}b_{2}}\) and the auxiliary particle \(|0\rangle _{e}^{j}\) evolve in the state

$$\begin{aligned}&|\varphi \rangle _{a_{1}a_{2}b_{1}b_{2}e}=\frac{1}{2}[|000\rangle |0\rangle ^{\otimes 2}+|010\rangle |1\rangle ^{\otimes 2}\nonumber \\&+|101\rangle |0\rangle ^{\otimes 2}+|111\rangle |1\rangle ^{\otimes 2}]_{a_{1}a_{2}b_{1}b_{2}e}. \end{aligned}$$
(5)

From Eqs.(1) and (5), we can find that the state \(|\varphi \rangle _{a_{1}a_{2}b_{1}b_{2}e}\) is the same as that in the three users’ case, that is to say, Eve is equivalent to a new legal user. Furthermore, the auxiliary particle \(|0\rangle _{e}^{j}\) does not change the correlation among the four particles \(P_{a_{1}}^{j},P_{a_{2}}^{j},P_{b_{1}}^{j},P_{b_{2}}^{j}\) under the original operation and measurement, which means that the measurement results of the four particles \(P_{a_{1}}^{j},P_{a_{2}}^{j},P_{b_{1}}^{j},P_{b_{2}}^{j}\) also satisfy the 12 correlations in the Table 1. For example, the original measurement results of the four particles \(P_{a_{1}}^{j},P_{a_{2}}^{j},P_{b_{1}}^{j},P_{b_{2}}^{j}\) with Z-basis will be \(|0000\rangle _{a_{1}a_{2}b_{1}b_{2}},|0101\rangle _{a_{1}a_{2}b_{1}b_{2}},|1010\rangle _{a_{1}a_{2}b_{1}b_{2}},|1111\rangle _{a_{1}a_{2}b_{1}b_{2}}\) without Eve, but the measurement results of the four particles \(P_{a_{1}}^{j},P_{a_{2}}^{j},P_{b_{1}}^{j},P_{b_{2}}^{j}\) with Z-basis will also be \(|0000\rangle _{a_{1}a_{2}b_{1}b_{2}},|0101\rangle _{a_{1}a_{2}b_{1}b_{2}},|1010\rangle _{a_{1}a_{2}b_{1}b_{2}},|1111\rangle _{a_{1}a_{2}b_{1}b_{2}}\) when Eve entangles an auxiliary particle \(|0\rangle _{e}^{j}\). Therefore, Eve’s intercept-resend attack will introduce no error and hence can avoid the security check in Step (2). More importantly, when the security check is completed, she immediately measures the remaining auxiliary particles with X-basis.

Because

$$\begin{aligned} & |\varphi \rangle _{a_{1}a_{2}b_{1}b_{2}e}\nonumber \\= & \frac{1}{2}[|000\rangle |0\rangle ^{\otimes 2}+|010\rangle |1\rangle ^{\otimes 2}+|101\rangle |0\rangle ^{\otimes 2}+|111\rangle |1\rangle ^{\otimes 2}]\nonumber \\= & \frac{1}{2\sqrt{2}}[|+++++\rangle +|+++--\rangle +|+-++-\rangle \nonumber \\ & +|+-+-+\rangle +|-+-++\rangle +|-+---\rangle \nonumber \\ & +|---+-\rangle +|----+\rangle ]_{a_{1}a_{2}b_{1}b_{2}e}, \end{aligned}$$
(6)

the four particles \(P_{a_{1}}^{j},P_{a_{2}}^{j},P_{b_{1}}^{j},P_{b_{2}}^{j}\) will collapse to one of the eight states \(|++++\rangle ,|+++-\rangle ,|+-++\rangle ,|+-+-\rangle ,|-+-+\rangle ,|-+--\rangle ,|-+-+\rangle ,|----\rangle\) according to Eve’s measurement result. When \(\hbox {Bob}_{{1}}\) and \(\hbox {Bob}_{{2}}\) measure their particles \(P_{b_{1}}^{j},P_{b_{2}}^{j}\) with Z-basis in Step (4), they will get a random result \(|0\rangle\) or \(|1\rangle\), which cannot satisfy the correlation in the Table 2 any longer. As a result, the users will recover a random bit, which is equal to \(m_{A}\) with the probability 50%. The proof of Theorem 2 is completed.

Obviously, the denial-of-service attack can also be performed by any participant \(\hbox {Bob}_{{j}}\) for \(j=1,2,\dots ,n\) and easily generalized to multiparty (\(n\ge 3\)) case. Furthermore, the above two attacks are also valid to the extension version of HHH-protocol with just simple repetitive operations.

Discussion

From the above cryptanalysis, it can be seen that the success of the first attacks is for the entangled state \(|\varphi \rangle\) has a special characteristic, which makes the \(n-1\) agents (\(\hbox {Bob}_{{2}}\), \(\hbox {Bob}_{{3}}\), \(\cdots\) , and \(\hbox {Bob}_{{n}}\)) have the same function to recover the dealer’s secret \(m_{A}\). The success of the second attacks is mainly for Eve’s deception can escape the security check of quantum channel. In order to deal with the security problems under the current model, a special entangled state instead of the state \(|\varphi \rangle\) should be introduced, which must guarantee any agent’s measurement result can not be deduced by the others. Furthermore, the security check of quantum channel should be strengthened, which can be solved by the way of inserting decoy states in7.

Conclusion

To sum up, we give a simple description of the HHH-protocol and then analyze its security. The security analysis shows that it is not secure in the sense that an unauthorized set can recover the secret. Furthermore, an external opponent can make participants recover a false secret without being detected by a special denial-of-service attack. Finally, we discuss how to improve the HHH-protocol’s security. We hope this work shed some lights on the development of quantum cryptography.