Quantum verifiable protocol for secure modulo zero-sum randomness

被引:7
作者
Hayashi, Masahito [1 ,2 ,3 ,4 ]
Koshiba, Takeshi [5 ,6 ]
机构
[1] Southern Univ Sci & Technol, Shenzhen Inst Quantum Sci & Engn, Shenzhen 518055, Guangdong, Peoples R China
[2] Int Quantum Acad SIQA, Shenzhen 518048, Guangdong, Peoples R China
[3] Southern Univ Sci & Technol, Guangdong Prov Key Lab Quantum Sci & Engn, Shenzhen 518055, Guangdong, Peoples R China
[4] Nagoya Univ, Grad Sch Math, Chikusa Ku, Nagoya, Aichi 4648602, Japan
[5] Waseda Univ, Fac Educ & Integrated Arts & Sci, Tokyo 1698050, Japan
[6] Keio Univ, Quantum Comp Ctr, Yokohama, Kanagawa 2238522, Japan
基金
中国国家自然科学基金;
关键词
Secure multiparty computation; Modulo summation; Quantum verification; Collusion resistance; Self-testing; MESSAGE TRANSMISSION; RESILIENT; COMMUNICATION; CRYPTOGRAPHY; PRIVACY;
D O I
10.1007/s11128-022-03639-x
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We propose a new cryptographic resource, secure modulo zero-sum randomness, as a resource to implement a task of secure modulo summation, and its quantum protocol. Secure modulo summation is the calculation of modulo summation Y-1 +( )... + Y-m when m players have their individual variables Y-1 ,..., Y-m with keeping the secrecy of the individual variables. Secure modulo zero-sum randomness is a set of m variables X-1, ..., X-m held by m players that satisfy the zero sum condition X-1 + ... + X-m = 0 with a certain security condition. This paper explains the relation between these two concepts and proposes a quantum verifiable protocol for secure modulo summation. The advantage for quantum protocol is the verifiability based on self-testing, which does not need to trust measurement devices and can be realized by using a statistical concept, significance level, while any classical method needs to trust several components of the protocol. Then, we propose various cryptographic applications for secure modulo zero-sum randomness. We also compare our quantum verifiable protocol with the conventional method for secure modulo summation.
引用
收藏
页数:42
相关论文
共 69 条
[1]   Device-independent security of quantum cryptography against collective attacks [J].
Acin, Antonio ;
Brunner, Nicolas ;
Gisin, Nicolas ;
Massar, Serge ;
Pironio, Stefano ;
Scarani, Valerio .
PHYSICAL REVIEW LETTERS, 2007, 98 (23)
[2]   Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters [J].
Adhikari, Avishek ;
Morozov, Kirill ;
Obana, Satoshi ;
Roy, Partha Sarathi ;
Sakurai, Kouichi ;
Xu, Rui .
INFORMATION THEORETIC SECURITY, ICITS 2016, 2016, 10015 :3-23
[3]  
Agarwal S, 2006, LECT NOTES COMPUT SC, V4117, P394
[4]  
[Anonymous], 1987, P ACM S THEOR COMP, DOI DOI 10.1145/28395.28420
[5]  
Bancal JD, 2021, Arxiv, DOI arXiv:1812.09117
[6]  
Barz S, 2013, NAT PHYS, V9, P727, DOI [10.1038/NPHYS2763, 10.1038/nphys2763]
[7]   Demonstration of Blind Quantum Computing [J].
Barz, Stefanie ;
Kashefi, Elham ;
Broadbent, Anne ;
Fitzsimons, Joseph F. ;
Zeilinger, Anton ;
Walther, Philip .
SCIENCE, 2012, 335 (6066) :303-308
[8]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[9]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[10]   Universal Blind Quantum Computation [J].
Broadbent, Anne ;
Fitzsimons, Joseph ;
Kashefi, Elham .
2009 50TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE: FOCS 2009, PROCEEDINGS, 2009, :517-526