2022
DOI: 10.1109/tqe.2022.3148664
|View full text |Cite
|
Sign up to set email alerts
|

A Feasible Quantum Sealed-Bid Auction Scheme Without an Auctioneer

Abstract: We first define a primitive problem of secure multiparty computations, i.e., Secure Multiparty Disjunction (SMD), and present a novel quantum protocol for SMD, which can ensure the information-theoretical security, i.e., the unconditional security. Furthermore, based on the quantum SMD protocol, we design a quantum sealed-bid auction (QSA) scheme without an auctioneer. In the proposed QSA scheme, all bidders can jointly find the winning bidder without the help of an auctioneer, while it can perfectly protect t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 39 publications
0
5
0
Order By: Relevance
“…Most existing voting protocols can meet the requirements of general voting scenarios with the assistance of a trusted third party, but it is difficult to have a trusted third party in reality. In order to decentralize, some scholars consider the cryptographic tasks of specific application scenarios [20][21][22][23] (e.g., electronic voting) as secure multiparty computing without the trusted third party. In 2016, Wang [20] et al proposed an anonymous secure multiparty computing protocol, the core of which is to open the information anonymously after rearrangement.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Most existing voting protocols can meet the requirements of general voting scenarios with the assistance of a trusted third party, but it is difficult to have a trusted third party in reality. In order to decentralize, some scholars consider the cryptographic tasks of specific application scenarios [20][21][22][23] (e.g., electronic voting) as secure multiparty computing without the trusted third party. In 2016, Wang [20] et al proposed an anonymous secure multiparty computing protocol, the core of which is to open the information anonymously after rearrangement.…”
Section: Introductionmentioning
confidence: 99%
“…However, this protocol needs high-dimensional entangled states as the quantum resources, which it is difficult to realize under the existing quantum technology. In 2022, Shi [23] et al first defined a quantum secure multiparty disjunction protocol based on Bell states entanglement swapping to realize decentralized quantum sealed-bid auction scheme. Compared with GHZ states utilized by Wang et al, Bell states are more feasible as a quantum resource.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…So, the security of classical cryptography is challenged by the quantum computers or fast quantum algorithms. In order to resist the attack of quantum computers, a new research field-quantum cryptography [5,6] has attracted extensive attention of scholars. At present, many research results based on quantum cryptography have been proposed, such as QKD (Quantum Key Distribution) [7], quantum public-key encryption [8,9] and QV (Quantum Voting) [10].…”
Section: Introductionmentioning
confidence: 99%
“…Many experts and scholars have been devoted to studying post-confirmation mechanisms to resist collusion attacks. Even now, the post-confirmation mechanism has been researched and modified by several academics [19][20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%