| Literature DB >> 33267433 |
Cai Zhang1,2, Mohsen Razavi2, Zhiwei Sun3,4, Qiong Huang1, Haozhen Situ1.
Abstract
We present a secure multi-party quantum summation protocol based on quantum teleportation, in which a malicious, but non-collusive, third party (TP) helps compute the summation. In our protocol, TP is in charge of entanglement distribution and Bell states are shared between participants. Users encode the qubits in their hand according to their private bits and perform Bell-state measurements. After obtaining participants' measurement results, TP can figure out the summation. The participants do not need to send their encoded states to others, and the protocol is therefore congenitally free from Trojan horse attacks. In addition, our protocol can be made secure against loss errors, because the entanglement distribution occurs only once at the beginning of our protocol. We show that our protocol is secure against attacks by the participants as well as the outsiders.Entities:
Keywords: Bell states; participant attacks; quantum cryptography; quantum information; quantum summation; quantum teleportation
Year: 2019 PMID: 33267433 PMCID: PMC7515234 DOI: 10.3390/e21070719
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
A comparison between different quantum summation (QS) protocols in terms of their required resources and operations, as well as their efficiency.
| QS Protocols | Efficiency | Quantum Resource | Quantum Operations |
|---|---|---|---|
| Shi et al.’s [ |
| Quantum Fourier operator, CNOT operator, and oracle operator | |
| Zhang et al.’s [ |
| CNOT operator and Hadamard operator | |
| Liu et al.’s [ | Pauli operators and Hadamard operators | ||
| Yang et al.’s [ |
| Quantum Fourier operator and Pauli operators | |
| This work |
| Bell states | Pauli operators and Bell measurement |
Figure 1A simple example of our protocol in the two-party scenario. (a) Step 1: third party (TP) shares entangled states among users to create a chain of entangled links back to herself. In this example, we assume state is shared over all links. In general, different Bell states can be shared over different links, and only TP knows which state has been shared. (b) Step 2: users with private bit 1 apply operator U to thier first qubit. Here, only must do this. (c) Step 3: all players perform a Bell-state measurements (BSM) on their two qubits and let TP know of the results. In our example, we have assumed has been obtained in all cases. (d) Step 4: TP measures qubit 5 in the same basis as her originally chosen basis for qubit T. By comparing the result with the original state of T, TP can calcualte .
Figure 2Entanglement distribution by . Each player has a qubit which is entangled with another qubit held by the next user in the chain. At the start of the protocol, TP shares Bell states over each link, where R of which (randomly chosen) is used for detecting malicious activities.
Figure 3Entanglement swapping attack by through sharing entangled states in a dishonest way.