Measurement-device-independent quantum secure multiparty summation based on entanglement swapping

被引:0
作者
Sun, Xiao-Feng [1 ]
Fan, Ling [1 ,2 ]
Cao, Cong [1 ,2 ,3 ]
Yu, Wen-Sheng [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing Key Lab Space Ground Interconnect & Conver, Beijing 100876, Peoples R China
[3] Beijing Univ Posts & Telecommun, State Key Lab Informat Photon & Opt Commun, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
measurement device independent; secure multiparty summation; entanglement swapping; PROTOCOL; SCHEME; COMMUNICATION;
D O I
10.1088/1612-202X/ad053f
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this paper, we propose a measurement-device-independent (MDI) quantum secure multiparty summation protocol based on entanglement swapping. The protocol is capable of providing a secure modulo-2 summation method for n parties. Our protocol uses Bell states as the information vehicle and establishes encryption through entanglement swapping, and each party encodes the information orderly to complete the summation process through the simple single-qubit operation. In contrast to previous protocols, there is no pre-shared private key sequence and key storage process in our protocol, which helps to reduce the possibility of information leakage in transmission. Our protocol supports multiple summations by n participants, which improves quantum resource utilization. The protocol can be implemented with linear-optical devices. Furthermore, it can resist multiple attack modes including the intercept-resend attack, entangle-and-measure attack, dishonest third-party attack, and parties' attack. Most significantly, the protocol enables to eliminate all side-channel attacks against detectors based on the MDI principle. Therefore, the protocol has advantages of high security, high efficiency, and good feasibility.
引用
收藏
页数:11
相关论文
共 60 条
[1]   Experimental realization of an entanglement access network and secure multi-party computation [J].
Chang, X. -Y. ;
Deng, D. -L. ;
Yuan, X. -X. ;
Hou, P. -Y. ;
Huang, Y. -Y. ;
Duan, L. -M. .
SCIENTIFIC REPORTS, 2016, 6
[2]   Quantum key agreement protocol based on BB84 [J].
Chong, Song-Kong ;
Hwang, Tzonelih .
OPTICS COMMUNICATIONS, 2010, 283 (06) :1192-1195
[3]   Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting [J].
Costa, Bruno ;
Branco, Pedro ;
Goulao, Manuel ;
Lemus, Mariano ;
Mateus, Paulo .
ENTROPY, 2021, 23 (08)
[4]   Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block [J].
Deng, FG ;
Long, GL ;
Liu, XS .
PHYSICAL REVIEW A, 2003, 68 (04) :6
[5]   Circular quantum secret sharing [J].
Deng, Fu-Guo ;
Zhou, Hong-Yu ;
Long, Gui Lu .
JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 2006, 39 (45) :14089-14099
[6]   Rational protocol of quantum secure multi-party computation [J].
Dou, Zhao ;
Xu, Gang ;
Chen, Xiu-Bo ;
Niu, Xin-Xin ;
Yang, Yi-Xian .
QUANTUM INFORMATION PROCESSING, 2018, 17 (08)
[7]   A synchronous quantum blind signature scheme with entanglement swapping [J].
Fan, Ling ;
Cao, Cong .
INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2019, 17 (01)
[8]   Long-distance measurement-device-independent quantum secure direct communication [J].
Gao, Zikai ;
Li, Tao ;
Li, Zhenhua .
EPL, 2019, 125 (04)
[9]  
Gu J, 2019, Arxiv, DOI arXiv:1907.02656
[10]   Quantum summation with an application to integration [J].
Heinrich, S .
JOURNAL OF COMPLEXITY, 2002, 18 (01) :1-50