From Auditable Quantum Authentication to Best-of-Both-Worlds Multiparty
Quantum Computation with Public Verifiable Identifiable Abort
- URL: http://arxiv.org/abs/2211.01665v2
- Date: Fri, 4 Nov 2022 01:21:46 GMT
- Title: From Auditable Quantum Authentication to Best-of-Both-Worlds Multiparty
Quantum Computation with Public Verifiable Identifiable Abort
- Authors: Mi-Ying Huang, Er-Cheng Tang
- Abstract summary: We construct the first secure multiparty quantum computation with public verifiable identifiable abort (MPQC-PVIA) protocol.
MPQC is the first quantum setting to provide Best-of-Both-Worlds (BoBW) security, which attains full security with an honest majority.
- Score: 0.5076419064097734
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We construct the first secure multiparty quantum computation with public
verifiable identifiable abort (MPQC-PVIA) protocol, where PVIA security enables
outside observers with only classical computational power to agree on the
identity of a malicious party in case of an abort. Moreover, our MPQC is the
first quantum setting to provide Best-of-Both-Worlds (BoBW) security, which
attains full security with an honest majority and is secure with abort if the
majority is dishonest. At the heart of our construction is a generic
transformation called Auditable Quantum Authentication (AQA) that publicly
identifies the malicious sender with overwhelming probability. Our approach
comes with several advantages over the traditional way of building MPQC
protocols. First, instead of following the Clifford code paradigm, our protocol
can be based on a variety of authentication codes. Second, the online phase of
our MPQC requires only classical communications. Third, our construction can
achieve distributed computation via a carefully crafted protocol design, which
can be adjusted to an MPQC that conditionally guarantees output delivery.
Related papers
- Experimental coherent-state quantum secret sharing with finite pulses [15.261941167557849]
Quantum secret sharing (QSS) plays a significant role in quantum communication.
We propose a three-user QSS protocol based on phase-encoding technology.
Our protocol achieves secure key rates ranging from 432 to 192 bps.
arXiv Detail & Related papers (2024-10-08T09:01:06Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - A Feasible Semi-quantum Private Comparison Based on Entanglement
Swapping of Bell States [5.548873288570182]
We propose a feasible semi-quantum private comparison protocol based on entanglement swapping of Bell states.
Security analysis shows that our protocol is resilient to both external and internal attacks.
Our proposed approach showcases the potential applications of entanglement swapping in the field of semi-quantum cryptography.
arXiv Detail & Related papers (2023-05-12T13:28:44Z) - Asymmetric Quantum Secure Multi-Party Computation With Weak Clients
Against Dishonest Majority [0.0]
We introduce a protocol that lifts classical SMPC to quantum SMPC in a composably and statistically secure way.
Unlike previous quantum SMPC protocols, our proposal only requires very limited quantum resources from all but one party.
arXiv Detail & Related papers (2023-03-15T18:33:18Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Delegating Multi-Party Quantum Computations vs. Dishonest Majority in
Two Quantum Rounds [0.0]
Multi-Party Quantum Computation (MPQC) has attracted a lot of attention as a potential killer-app for quantum networks.
We present a composable protocol achieving blindness and verifiability even in the case of a single honest client.
arXiv Detail & Related papers (2021-02-25T15:58:09Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Security Limitations of Classical-Client Delegated Quantum Computing [54.28005879611532]
A client remotely prepares a quantum state using a classical channel.
Privacy loss incurred by employing $RSP_CC$ as a sub-module is unclear.
We show that a specific $RSP_CC$ protocol can replace the quantum channel at least in some contexts.
arXiv Detail & Related papers (2020-07-03T13:15:13Z) - Client-Server Identification Protocols with Quantum PUF [1.4174475093445233]
We propose two identification protocols based on the emerging hardware secure solutions, the quantum Physical Unclonable Functions (qPUFs)
The first protocol allows a low-resource party to prove its identity to a high-resource party and in the second protocol, it is vice-versa.
Unlike existing identification protocols based on Quantum Read-out PUFs which rely on the security against a specific family of attacks, our protocols provide provable exponential security against any Quantum Polynomial-Time adversary with resource-efficient parties.
arXiv Detail & Related papers (2020-06-08T12:35:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.