Anonymous multi-party quantum computation with a third party
- URL: http://arxiv.org/abs/2110.13648v1
- Date: Sat, 23 Oct 2021 14:27:12 GMT
- Title: Anonymous multi-party quantum computation with a third party
- Authors: Zhaoxu Ji, Peiru Fan, Atta Ur Rahman, Huanguo Zhang
- Abstract summary: We show that the protocol is an anonymous multi-party quantum addition protocol rather than a secure multi-party quantum addition protocol.
We propose a new anonymous multiparty quantum protocol based on our original protocol.
- Score: 0.8356765961526955
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We reconsider and modify the second secure multi-party quantum addition
protocol proposed in our original work. We show that the protocol is an
anonymous multi-party quantum addition protocol rather than a secure
multi-party quantum addition protocol. Through small changes, we develop the
protocol to propose, for the first time, anonymous multiparty quantum
computation with a third party, who faithfully executes protocol processes, but
is interested in the identity of the data owners. Further, we propose a new
anonymous multiparty quantum protocol based on our original protocol. We
calculate the success probability of the proposed protocols, which is also a
modification of the success probability of the original protocols.
Related papers
- Quantum Two-Way Communication Protocol Beyond Superdense Coding [36.25599253958745]
We introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs.
The proposed protocol gives a 50% increase in both data rate and energy efficiency compared to the classical protocol.
arXiv Detail & Related papers (2023-09-06T08:48:07Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Multi-User Entanglement Distribution in Quantum Networks Using Multipath
Routing [55.2480439325792]
We propose three protocols that increase the entanglement rate of multi-user applications by leveraging multipath routing.
The protocols are evaluated on quantum networks with NISQ constraints, including limited quantum memories and probabilistic entanglement generation.
arXiv Detail & Related papers (2023-03-06T18:06:00Z) - Oblivious Quantum Computation and Delegated Multiparty Quantum
Computation [61.12008553173672]
We propose a new concept, oblivious computation quantum computation, where secrecy of the input qubits and the program to identify the quantum gates are required.
Exploiting quantum teleportation, we propose a two-server protocol for this task.
Also, we discuss delegated multiparty quantum computation, in which, several users ask multiparty quantum computation to server(s) only using classical communications.
arXiv Detail & Related papers (2022-11-02T09:01:33Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Scalable Mediated Semi-quantum Key Distribution [5.548873288570182]
Mediated semi-quantum key distribution (M-SQKD) permits two limited "semi-quantum" or "classical" users to establish a secret key with the help of a third party (TP)
Several protocols have been studied recently for two-party scenarios, but no one has considered M-SQKD for multi-party scenarios.
arXiv Detail & Related papers (2022-05-13T09:21:12Z) - Multi-party Semi-quantum Secret Sharing Protocol based on Measure-flip and Reflect Operations [0.0]
Semi-quantum secret sharing (SQSS) protocols serve as fundamental frameworks in quantum secure multi-party computations.
This paper proposes a novel SQSS protocol based on multi-particle GHZ states.
arXiv Detail & Related papers (2021-09-03T08:52:17Z) - Unbalanced-basis-misalignment tolerant measurement-device-independent
quantum key distribution [22.419105320267523]
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side.
Some protocols release part of the assumptions in the encoding system to keep the practical security, but the performance would be dramatically reduced.
We present a MDIQKD protocol that requires less knowledge of encoding system to combat the troublesome modulation errors and fluctuations.
arXiv Detail & Related papers (2021-08-27T02:16:20Z) - Anonymous communication protocol over quantum networks [5.61186040823947]
We propose a W state-based protocol for anonymously transmitting quantum messages in a quantum network.
We develop three sub-protocols using the W state, including the quantum collision detection protocol and the quantum notification protocol.
arXiv Detail & Related papers (2021-07-17T02:51:15Z) - Secure and practical multiparty quantum digital signatures [9.075243529793083]
Quantum digital signatures (QDSs) promise information-theoretic security against repudiation and forgery of messages.
Multiparty protocols have unique advantages in the practical case of more than two receivers when sending a mass message.
Our work compensates for the absence of practical multiparty protocols, which paves the way for future QDS networks.
arXiv Detail & Related papers (2021-04-25T04:47:24Z) - Client-Server Identification Protocols with Quantum PUF [1.4174475093445233]
We propose two identification protocols based on the emerging hardware secure solutions, the quantum Physical Unclonable Functions (qPUFs)
The first protocol allows a low-resource party to prove its identity to a high-resource party and in the second protocol, it is vice-versa.
Unlike existing identification protocols based on Quantum Read-out PUFs which rely on the security against a specific family of attacks, our protocols provide provable exponential security against any Quantum Polynomial-Time adversary with resource-efficient parties.
arXiv Detail & Related papers (2020-06-08T12:35:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.