| Literature DB >> 32499534 |
Abstract
The summation and multiplication are two basic operations for secure multiparty quantum computation. The existing secure multiparty quantum summation and multiplication protocols have (n, n) threshold approach and their computation type is bit-by-bit, where n is total number of players. In this paper, we propose two hybrid (t, n) threshold quantum protocols for secure multiparty summation and multiplication based on the Shamir's secret sharing, SUM gate, quantum fourier transform, and generalized Pauli operator, where t is a threshold number of players that can perform the summation and multiplication. Their computation type is secret-by-secret with modulo d, where d, n ≤ d ≤ 2n, is a prime. The proposed protocols can resist the intercept-resend, entangle-measure, collusion, collective, and coherent quantum attacks. They have better computation as well as communication costs and no player can get other player's private input.Entities:
Year: 2020 PMID: 32499534 PMCID: PMC7272455 DOI: 10.1038/s41598-020-65871-8
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Share Computation for Summation and Multiplication.
| Players | ||||||||
|---|---|---|---|---|---|---|---|---|
| Shares | 9 | 9 | 4 | 5 | 1 | 3 | 0 | |
| 6 | 1 | 9 | 8 | 9 | 1 | 6 | ||
| 4 | 10 | 2 | 2 | 10 | 4 | 6 | ||
| 10 | 9 | 3 | 7 | 9 | 3 | 0 | ||
| Polynomials: | 10 + | 9 + 3 | 3 + 2 | 7 + 2 | 9 + 5 | 3 + 2 | 0 + | |
| Shares | 2 | 9 | 9 | 2 | 10 | 0 | 5 | |
| 2 | 8 | 5 | 4 | 5 | 8 | 2 | ||
| 7 | 4 | 5 | 10 | 8 | 10 | 5 | ||
| 1 | 1 | 7 | 8 | 4 | 6 | 3 | ||
| 4 | 1 | 0 | 1 | 4 | 9 | 5 | ||
| 8 | 8 | 3 | 4 | 0 | 2 | 10 | ||
| 6 | 0 | 4 | 7 | 9 | 10 | 10 | ||
| 7 | 9 | 3 | 0 | 0 | 3 | 9 | ||
Comparison in terms of Cost, Universality, and Attack.
| Protocols | Du[ | Chen[ | Zhang[ | Zhang[ | Shi[ | Shi[ | Zhang[ | Liu[ | Yang[ | Jiao[ | Proposed | ||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Operation | Summ. | Summ. | Summ. | Summ. | Summ. | Multi. | Summ. | Summ. | Summ. | Summ. | Summ. | Multi. | Summ. | Multi. | |||
| Performance Parameters | Costs | Comt. | — | — | — | — | 1 | 1 | — | — | — | — | — | 1 | 1 | ||
| — | — | — | — | 1 | 1 | — | — | — | — | — | — | — | — | ||||
| Unitary Operation | — | 1 | 1 | — | — | — | — | — | |||||||||
| Measure Operation | — | — | — | — | 2 | 2 | — | ||||||||||
| Com. | Message Particle | — | — | — | — | — | — | — | — | — | — | — | — | ||||
| Decoy Particle | — | — | — | — | — | — | — | — | |||||||||
| Univ. | Model | ( | ( | ( | ( | ( | ( | ( | ( | ( | ( | ( | ( | ( | ( | ||
| Modulo | 2 | 2 | 2 | — | 2 | 2 | |||||||||||
| Qubits | — | — | — | — | — | 2 | — | — | — | — | — | ||||||
| Type of Computation | b-by-b | b-by-b | b-by-b | b-by-b | s-by-s | s-by-s | b-by-b | b-by-b | b-by-b | s-by-s | b-by-b | b-by-b | s-by-s | s-by-s | |||
| Attacks | IR | — | — | ||||||||||||||
| Collusion | — | — | — | — | — | — | — | ||||||||||
| EM | — | — | — | — | — | ||||||||||||
| Collective | — | — | — | — | — | — | — | — | — | — | — | — | |||||
| Coherent | — | — | — | — | — | — | — | — | — | — | — | — | |||||