2010
DOI: 10.1007/s10773-010-0472-5
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Protocol for the Secure Multi-party Quantum Summation

Abstract: In this paper, a new and efficient quantum protocol which allows a group of mutually distrustful players to perform the summation computation is proposed. Different from previous protocols, we utilize the multi-particle entangled states as the information carriers. A third party, i.e. TP, is assumed semi-honest in the two-party quantum summation protocol. All various kinds of outside attacks and participant attacks are discussed in detail. In addition, we code all players' Bell-basis measurement outcomes into … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
49
0
7

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 85 publications
(56 citation statements)
references
References 22 publications
(20 reference statements)
0
49
0
7
Order By: Relevance
“…Such cooperative recovery can be achieved by introducing the secure two-party sum computation [34], where the secrets l 1 and l 2 serve as the input and l 1 + l 2 as the output.…”
Section: Figmentioning
confidence: 99%
See 1 more Smart Citation
“…Such cooperative recovery can be achieved by introducing the secure two-party sum computation [34], where the secrets l 1 and l 2 serve as the input and l 1 + l 2 as the output.…”
Section: Figmentioning
confidence: 99%
“…As for key backup, each of the two managers keeps parts of the key l 1 or l 2 securely. Finally, the secret key can be easily recovered by secure computation [34].…”
Section: Figmentioning
confidence: 99%
“…Now, secure multi-party computation (SMC) has been discussed in the quantum cryptographic field. Many special SMC problems have been solved in quantum setting, for instance, secure multiparty quantum summation [20,21], quantum protocol for anonymous voting and surveying [22,23], quantum protocol for millionaire problem [24], etc.…”
Section: Introductionmentioning
confidence: 99%
“…Comparing with QKD, DSQC can be used to obtain deterministic information, not a randomly binary string. So far, DSQC has been actively pursued by some groups [27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42]. For example, in 2002, Beige et al [28] first proposed a DSQC scheme based on single-photon two-qubit states.…”
Section: Introductionmentioning
confidence: 99%
“…In 2010, Zhou et al [40] proposed two DSQC protocols by utilizing Bell states and GHZ states respectively. Recently, Chen et al [41] proposed a new efficient DSQC scheme which allows a group of mutually distrustful players to perform the summation computation.…”
Section: Introductionmentioning
confidence: 99%