Multi-party quantum summation without a trusted third party based on single particles

被引:49
作者
Zhang, Cai [1 ]
Situ, Haozhen [1 ]
Huang, Qiong [1 ]
Yang, Pingle [2 ]
机构
[1] South China Agr Univ, Coll Mat & Informat, Guangzhou 510642, Peoples R China
[2] Jiangsu Univ Sci & Technol, Dept Basic Courses, Zhangjiagang 215600, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum information; quantum cryptography; multi-party quantum summation; KEY DISTRIBUTION; SECURITY;
D O I
10.1142/S0219749917500101
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose multi-party quantum summation protocols based on single particles, in which participants are allowed to compute the summation of their inputs without the help of a trusted third party and preserve the privacy of their inputs. Only one participant who generates the source particles needs to perform unitary operations and only single particles are needed in the beginning of the protocols.
引用
收藏
页数:10
相关论文
共 27 条
[1]  
Ben-Or M, 2006, ANN IEEE SYMP FOUND, P249
[2]  
Bennett C H, 1984, P IEEE INT C COMP SY, V175, P175
[3]   Complete Insecurity of Quantum Protocols for Classical Two-Party Computation [J].
Buhrman, Harry ;
Christandl, Matthias ;
Schaffner, Christian .
PHYSICAL REVIEW LETTERS, 2012, 109 (16)
[4]   Quantum key distribution in the Holevo limit [J].
Cabello, A .
PHYSICAL REVIEW LETTERS, 2000, 85 (26) :5635-5638
[5]   An Efficient Protocol for the Secure Multi-party Quantum Summation [J].
Chen, Xiu-Bo ;
Xu, Gang ;
Yang, Yi-Xian ;
Wen, Qiao-Yan .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2010, 49 (11) :2793-2804
[6]  
Crepeau Claude, 2002, P THIRY 4 ANN ACM S, P643, DOI DOI 10.1145/509907.510000
[7]   Improving the security of multiparty quantum secret sharing against Trojan horse attack [J].
Deng, FG ;
Li, XH ;
Zhou, HY ;
Zhang, ZJ .
PHYSICAL REVIEW A, 2005, 72 (04)
[8]   Secure multiparty quantum summation [J].
Du Jian-Zhong ;
Chen Xiu-Bo ;
Wen Qiao-Yan ;
Zhu Fu-Chen .
ACTA PHYSICA SINICA, 2007, 56 (11) :6214-6219
[9]   Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks [J].
Furrer, F. ;
Franz, T. ;
Berta, M. ;
Leverrier, A. ;
Scholz, V. B. ;
Tomamichel, M. ;
Werner, R. F. .
PHYSICAL REVIEW LETTERS, 2012, 109 (10)
[10]   Trojan-horse attacks on quantum-key-distribution systems [J].
Gisin, N ;
Fasel, S ;
Kraus, B ;
Zbinden, H ;
Ribordy, G .
PHYSICAL REVIEW A, 2006, 73 (02)