Secure multi-party quantum summation based on quantum Fourier transform
- URL: http://arxiv.org/abs/2205.06123v1
- Date: Thu, 12 May 2022 14:36:18 GMT
- Title: Secure multi-party quantum summation based on quantum Fourier transform
- Authors: Hui-Yi Yang, Tian-Yu Ye
- Abstract summary: The proposed protocol can resist both the outside attacks and the participant attacks.
One party cannot obtain other parties' private integer strings; and it is secure for the colluding attack performed by at most n-2 parties, where n is the number of parties.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this paper, we propose a novel secure multi-party quantum summation
protocol based on quantum Fourier transform, where the traveling particles are
transmitted in a tree-type mode. The party who prepares the initial quantum
states is assumed to be semi-honest, which means that she may misbehave on her
own but will not conspire with anyone. The proposed protocol can resist both
the outside attacks and the participant attacks. Especially, one party cannot
obtain other parties' private integer strings; and it is secure for the
colluding attack performed by at most n-2 parties, where n is the number of
parties. In addition, the proposed protocol calculates the addition of modulo d
and implements the calculation of addition in a secret-by-secret way rather
than a bit-by-bit way.
Related papers
- Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Probabilistic versions of Quantum Private Queries [0.7252027234425332]
We define two non-deterministic versions of Quantum Private Queries, a protocol addressing the Symmetric-Private Information Retrieval problem.
We show that the strongest variant of such scheme is formally equivalent to Quantum Bit Commitment, Quantum Oblivious Transfer and One-Sided Two Party Computation protocols.
arXiv Detail & Related papers (2024-01-11T09:04:13Z) - Gaussian conversion protocol for heralded generation of qunaught states [66.81715281131143]
bosonic codes map qubit-type quantum information onto the larger bosonic Hilbert space.
We convert between two instances of these codes GKP qunaught states and four-foldsymmetric binomial states corresponding to a zero-logical encoded qubit.
We obtain GKP qunaught states with a fidelity of over 98% and a probability of approximately 3.14%.
arXiv Detail & Related papers (2023-01-24T14:17:07Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Two-party secure semiquantum summation against the collective-dephasing
noise [3.312385039704987]
The term'semi-honest' implies that TP cannot conspire with others but is able to implement all kinds oof attacks.
This protocol employs logical qubits as traveling particles to overcome the negative influence of collective-dephasing noise.
The security analysis turns out that this protocol can effectively prevent the outside attacks from Eve and the participant attacks from TP.
arXiv Detail & Related papers (2022-05-15T01:10:20Z) - Circular multi-party quantum private comparison with n-level
single-particle states [0.0]
MQPC protocol can overcome both the outside attack and the participant attack.
Each party's secret can be kept unknown to other parties and the third party.
arXiv Detail & Related papers (2022-05-13T23:43:21Z) - A novel two-party semiquantum key distribution protocol based on
GHZ-like states [0.0]
The proposed SQKD protocol can create a private key shared between one quantum party with unlimited quantum abilities and one classical party with limited quantum abilities without the existence of a third party.
Detailed security analysis turns out that the proposed SQKD protocol can resist various famous attacks from an outside eavesdropper.
arXiv Detail & Related papers (2022-04-21T13:25:53Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - Quantum Secure Multi-party Summation Based on entanglement swapping [16.298896422265297]
We present a quantum secure multi-party summation protocol, which allows multiple mutually distrustful parties to compute the summation of their secret data.
In the presented protocol, a semitrusted third party is introduced to help multiple parties to achieve this secure task.
At last, its security against some common attacks is analyzed, which shows that the presented protocol is secure in theory.
arXiv Detail & Related papers (2021-03-23T02:41:11Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Genuine Network Multipartite Entanglement [62.997667081978825]
We argue that a source capable of distributing bipartite entanglement can, by itself, generate genuine $k$-partite entangled states for any $k$.
We provide analytic and numerical witnesses of genuine network entanglement, and we reinterpret many past quantum experiments as demonstrations of this feature.
arXiv Detail & Related papers (2020-02-07T13:26:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.