Two-party secure semiquantum summation against the collective-dephasing
noise
- URL: http://arxiv.org/abs/2205.08318v1
- Date: Sun, 15 May 2022 01:10:20 GMT
- Title: Two-party secure semiquantum summation against the collective-dephasing
noise
- Authors: Tian-Yu Ye, Tian-Jie Xu, Mao-Jie Geng, Ying Chen
- Abstract summary: The term'semi-honest' implies that TP cannot conspire with others but is able to implement all kinds oof attacks.
This protocol employs logical qubits as traveling particles to overcome the negative influence of collective-dephasing noise.
The security analysis turns out that this protocol can effectively prevent the outside attacks from Eve and the participant attacks from TP.
- Score: 3.312385039704987
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this paper, we propose a two-party semiquantum summation protocol, where
two classical users can accomplish the summation of their private binary
sequences with the assistance of a quantum semi-honest third party (TP). The
term 'semi-honest' implies that TP cannot conspire with others but is able to
implement all kinds oof attacks. This protocol employs logical qubits as
traveling particles to overcome the negative influence of collective-dephasing
noise and needn't make any two parties pre-share a random secret key. The
security analysis turns out that this protocol can effectively prevent the
outside attacks from Eve and the participant attacks from TP. Moreover, TP has
no knowledge about the summation results.
Related papers
- Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - A novel multi-party semiquantum private comparison protocol of size
relationship with d-dimensional single-particle states [0.0]
This protocol requires the help of one quantum third party (TP) and one classical TP.
Neither quantum entanglement swapping nor unitary operations are necessary for implementing this protocol.
arXiv Detail & Related papers (2022-08-30T16:35:55Z) - Measure-resend semi-quantum private comparison without entanglement [0.0]
Our protocol allows two classical users to compare the equality of their private secrets under the help of a quantum third party.
The quantum TP is semi-honest in the sense that he is allowed to misbehave on his own but cannot conspire with either of users.
arXiv Detail & Related papers (2022-05-13T00:43:05Z) - Secure multi-party quantum summation based on quantum Fourier transform [0.0]
The proposed protocol can resist both the outside attacks and the participant attacks.
One party cannot obtain other parties' private integer strings; and it is secure for the colluding attack performed by at most n-2 parties, where n is the number of parties.
arXiv Detail & Related papers (2022-05-12T14:36:18Z) - Semiquantum private comparison based on Bell states without quantum measurements from the classical user [4.4053348026380235]
We propose a novel semiquantum private comparison protocol based on Bell states.
TP is assumed to be semi-honest in the sense that she may take all possible attacks to steal users' private inputs except conspiring with anyone.
Our protocol can take advantage over previous SQPC protocols based on Bell states in qubit efficiency.
arXiv Detail & Related papers (2022-05-10T14:32:53Z) - Multi-party Quantum Private Comparison Based on the Entanglement
Swapping of d-level Cat States and d-level Bell states [0.0]
In our protocol, n parties employ unitary operations to encode their private secrets and can compare the equality of their private secrets within one time execution of the protocol.
One party cannot obtain other parties' secrets except for the case that their secrets are identical.
The semi-honest TP cannot learn any information about these parties' secrets except the end comparison result on whether all private secrets from n parties are equal.
arXiv Detail & Related papers (2022-05-10T02:14:18Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - MPC-enabled Privacy-Preserving Neural Network Training against Malicious
Attack [44.50542274828587]
We propose an approach for constructing efficient $n$-party protocols for secure neural network training.
Our actively secure neural network training incurs affordable efficiency overheads of around 2X and 2.7X in LAN and WAN settings.
Besides, we propose a scheme to allow additive shares defined over an integer ring $mathbbZ_N$ to be securely converted to additive shares over a finite field $mathbbZ_Q$.
arXiv Detail & Related papers (2020-07-24T15:03:51Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.