Improvements on "Multi-Party Quantum Summation without a Third Party
based on $d$-Dimensional Bell States"
- URL: http://arxiv.org/abs/2307.10908v2
- Date: Thu, 31 Aug 2023 03:30:16 GMT
- Title: Improvements on "Multi-Party Quantum Summation without a Third Party
based on $d$-Dimensional Bell States"
- Authors: Xiaobing Li, Jiale Hou, Haozhen Situ, Cai Zhang
- Abstract summary: Wu et al. presented a multi-party quantum summation scheme exploiting the entanglement properties of d-dimensional Bell states.
It is claimed that their protocol is secure against outside and participants' attacks.
However, this work points out that Wu's protocol has a loophole, i.e., two or more dishonest participants who meet a specific location relationship can conspire to obtain the private inputs of some honest participants without being detected.
- Score: 2.4578723416255754
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In 2021, Wu et al. presented a multi-party quantum summation scheme
exploiting the entanglement properties of d-dimensional Bell states (Wu et al.
in Quantum Inf Process 20:200, 2021). In particular, the authors proposed a
three-party quantum summation protocol and then extended their work to a
multi-party case. It is claimed that their protocol is secure against outside
and participants' attacks. However, this work points out that Wu's protocol has
a loophole, i.e., two or more dishonest participants who meet a specific
location relationship can conspire to obtain the private inputs of some honest
participants without being detected. Accordingly, improvements are proposed to
address these issues.
Related papers
- Enhanced quantum state transfer: Circumventing quantum chaotic behavior [35.74056021340496]
We show how to transfer few-particle quantum states in a two-dimensional quantum network.
Our approach paves the way to short-distance quantum communication for connecting distributed quantum processors or registers.
arXiv Detail & Related papers (2024-02-01T19:00:03Z) - Quantum Private Membership Aggregation [35.16231062731263]
We consider the problem of private set membership aggregation of $N$ parties by using an entangled quantum state.
We propose an encoding algorithm that maps the classical information into distinguishable quantum states, along with a decoding algorithm that exploits the distinguishability of the mapped states.
arXiv Detail & Related papers (2024-01-29T18:32:19Z) - Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - Coherence requirements for quantum communication from hybrid circuit
dynamics [29.004178992441336]
coherent superposition of quantum states is an important resource for quantum information processing.
We determine the coherence requirements to communicate quantum information in a broad setting encompassing monitored quantum dynamics and quantum error correction codes.
arXiv Detail & Related papers (2022-10-20T19:28:32Z) - Secure multi-party quantum summation based on quantum Fourier transform [0.0]
The proposed protocol can resist both the outside attacks and the participant attacks.
One party cannot obtain other parties' private integer strings; and it is secure for the colluding attack performed by at most n-2 parties, where n is the number of parties.
arXiv Detail & Related papers (2022-05-12T14:36:18Z) - Multi-party Quantum Private Comparison Protocol Based on Entanglement
Swapping of Bell Entangled States [0.0]
In this paper, we put forward a three-party quantum private comparison protocol based on entanglement swapping of Bell entangled state.
We generalize the three-party protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among users within one execution.
arXiv Detail & Related papers (2022-05-09T02:28:13Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - Heterogeneous Multipartite Entanglement Purification for
Size-Constrained Quantum Devices [68.8204255655161]
Purifying entanglement resources after their imperfect generation is an indispensable step towards using them in quantum architectures.
Here we depart from the typical purification paradigm for multipartite states explored in the last twenty years.
We find that smaller sacrificial' states, like Bell pairs, can be more useful in the purification of multipartite states than additional copies of these same states.
arXiv Detail & Related papers (2020-11-23T19:00:00Z) - Collusion attack and counterattack on the quantum key agreement via
non-maximally entangled cluster states [0.20767168898581634]
Li et al. proposed a multiparty quantum key agreement protocol via non-maximally entangled cluster states.
This study points out a loophole that makes Li et al.'s protocol suffer from a collusion attack.
arXiv Detail & Related papers (2020-10-20T04:21:01Z) - Two attacks and counterattacks on the mutual semi-quantum key agreement
protocol using Bell states [0.20767168898581634]
The proposed protocol tries to help a quantum participant share a key with a classical participant who just has limited quantum capacities.
This study points out that the classical participant can manipulate the final shared key by himself/herself without being detected.
arXiv Detail & Related papers (2020-10-07T07:44:50Z) - Permutation attack and counterattack on the two-party quantum key
agreement over a collective noisy channel [0.20767168898581634]
This study shows that the participant who announces the permutation operation can manipulate the final shared key by himself/herself without being detected by the other.
To avoid this loophole, an improvement is proposed here.
arXiv Detail & Related papers (2020-09-15T05:27:39Z) - Genuine Network Multipartite Entanglement [62.997667081978825]
We argue that a source capable of distributing bipartite entanglement can, by itself, generate genuine $k$-partite entangled states for any $k$.
We provide analytic and numerical witnesses of genuine network entanglement, and we reinterpret many past quantum experiments as demonstrations of this feature.
arXiv Detail & Related papers (2020-02-07T13:26:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.