A lightweight three-user secure quantum summation protocol without a third party based on single-particle states

被引:16
作者
Ye, Tian-Yu [1 ]
Xu, Tian-Jie [1 ]
机构
[1] Zhejiang Gongshang Univ, Coll Informat & Elect Engn, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum summation; Single-particle state; Outside attack; Participant attack; SPATIAL-MODE DEGREES; COMMUNICATION; ENTANGLEMENT; POLARIZATION; PHOTONS;
D O I
10.1007/s11128-022-03652-0
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, a lightweight three-user secure quantum summation protocol is put forward by using single-particle states, which can accomplish the goal that three users cooperate together to calculate the modulo 2 addition of their private messages without the help of a third party. This protocol only requires single-particle states rather than quantum entangled states as the initial quantum resource and only needs single-particle measurements and Bell basis measurements. This protocol needs none of quantum entanglement swapping, the Pauli operations, the controlled-not (CNOT) operation, the Hadamard gate or a pre-shared private key sequence. Security analysis proves that this protocol is secure against both the outside attacks and the participant attacks. Compared with the existing two-dimensional three-user quantum summation protocols, this protocol more or less takes advantage over them on the aspects of the initial quantum resource, users' quantum measurement, the usage of quantum entanglement swapping, the usage of Pauli operations, the usage of CNOT operation or the usage of Hadamard gate.
引用
收藏
页数:15
相关论文
共 41 条
[1]   CNOT and Bell-state analysis in the weak-coupling cavity QED regime [J].
Bonato, Cristian ;
Haupt, Florian ;
Oemrawsingh, Sumant S. R. ;
Gudat, Jan ;
Ding, Dapeng ;
van Exter, Martin P. ;
Bouwmeester, Dirk .
PHYSICAL REVIEW LETTERS, 2010, 104 (16)
[2]   Quantum key distribution in the Holevo limit [J].
Cabello, A .
PHYSICAL REVIEW LETTERS, 2000, 85 (26) :5635-5638
[3]   Eavesdropping on the two-way quantum communication protocols with invisible photons [J].
Cai, QY .
PHYSICS LETTERS A, 2006, 351 (1-2) :23-25
[4]   An Efficient Protocol for the Secure Multi-party Quantum Summation [J].
Chen, Xiu-Bo ;
Xu, Gang ;
Yang, Yi-Xian ;
Wen, Qiao-Yan .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2010, 49 (11) :2793-2804
[5]  
Deng FG, 2005, Arxiv, DOI arXiv:quant-ph/0508168
[6]   Secure multiparty quantum summation [J].
Du Jian-Zhong ;
Chen Xiu-Bo ;
Wen Qiao-Yan ;
Zhu Fu-Chen .
ACTA PHYSICA SINICA, 2007, 56 (11) :6214-6219
[7]   Improvement of Quantum Protocols for Secure Multi-Party Summation [J].
Gan, Zhi-Gang .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (10) :3086-3092
[8]  
Gao F, 2007, QUANTUM INF COMPUT, V7, P329
[9]   Quantum cryptography [J].
Gisin, N ;
Ribordy, GG ;
Tittel, W ;
Zbinden, H .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :145-195
[10]   Robust quantum secure direct communication with a quantum one-time pad over a collective-noise channel [J].
Gu Bin ;
Zhang ChengYi ;
Cheng GuoSheng ;
Huang YuGai .
SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2011, 54 (05) :942-947