Secure multiparty computation with a dishonest majority via quantum means

被引:23
作者
Loukopoulos, Klearchos [1 ]
Browne, Daniel E. [2 ]
机构
[1] Univ Oxford, Dept Mat, Oxford OX1 4PH, England
[2] UCL, Dept Phys & Astron, London WC1E 6BT, England
来源
PHYSICAL REVIEW A | 2010年 / 81卷 / 06期
基金
英国工程与自然科学研究理事会; 新加坡国家研究基金会;
关键词
BIT COMMITMENT; SHARE;
D O I
10.1103/PhysRevA.81.062336
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We introduce a scheme for secure multiparty computation utilizing the quantum correlations of entangled states. First we present a scheme for two-party computation, exploiting the correlations of a Greenberger-Horne-Zeilinger state to provide, with the help of a third party, a near-private computation scheme. We then present a variation of this scheme which is passively secure with threshold t = 2, in other words, remaining secure when pairs of players conspire together provided they faithfully follow the protocol. Furthermore, we show that the passively secure variant can be modified to be secure when cheating parties are allowed to deviate from the protocol. We show that this can be generalized to computations of n-party polynomials of degree 2 with a threshold of n - 1. The threshold achieved is significantly higher than the best known classical threshold, which satisfies the bound t < n/2. Our schemes, each complying with a different definition of security, shed light on which physical assumptions are necessary in order to achieve quantum secure multiparty computation.
引用
收藏
页数:9
相关论文
共 48 条
[1]   Computational Power of Correlations [J].
Anders, Janet ;
Browne, Dan E. .
PHYSICAL REVIEW LETTERS, 2009, 102 (05)
[2]  
[Anonymous], J AM I ELEC ENG
[3]  
[Anonymous], 1989, Bell's Theorem, Quantum Theory, and Conceptions of the Universe
[4]  
BEAVER D, 1990, LECT NOTES COMPUT SC, V435, P560
[5]  
Beerliová-Trubíniová Z, 2006, LECT NOTES COMPUT SC, V3876, P305
[6]  
Beimel A, 2004, LECT NOTES COMPUT SC, V2951, P238
[7]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[8]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[9]  
BOGETOFT P, 2009, LECT NOTES COMPUTER, V5628
[10]  
BROADBENT A, ARXIV08061931V1