2023
DOI: 10.1088/1402-4896/acf00f
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized quantum anonymous veto voting scheme based on measurement-device-independence

Xiaotong Xu,
Run-hua Shi,
Weiyang Ke

Abstract: To remove any trusted third party from the voting scheme, a new primitive quantum secure multiparty exclusive OR protocol based on Measurement-Device-Independence (MDI) is presented by utilizing entanglement swapping of Bell states. Based on this primitive protocol of quantum secure multiparty protocol, a novel quantum anonymous veto voting scheme is constructed, which can meet complete security attributes. Especially, this scheme does not need any third party to count the votes, while all voters can tally the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…Encouragingly, quantum protocols provide unconditional security in theory. Many researchers have designed various SMC schemes based on quantum mechanical principles, including quantum secret sharing (QSS) [10][11][12][13], quantum private query (QPQ) [14][15][16], quantum anonymous multi-party ranking (QAMR) [17][18][19][20], quantum secure multi-party summation (QSMS) [21,22], and among others [23][24][25][26][27][28]. In QAMR, each participant can obtain the ranking of his private data in ascending or descending order at the end of the protocol without revealing their private data.…”
Section: Introductionmentioning
confidence: 99%
“…Encouragingly, quantum protocols provide unconditional security in theory. Many researchers have designed various SMC schemes based on quantum mechanical principles, including quantum secret sharing (QSS) [10][11][12][13], quantum private query (QPQ) [14][15][16], quantum anonymous multi-party ranking (QAMR) [17][18][19][20], quantum secure multi-party summation (QSMS) [21,22], and among others [23][24][25][26][27][28]. In QAMR, each participant can obtain the ranking of his private data in ascending or descending order at the end of the protocol without revealing their private data.…”
Section: Introductionmentioning
confidence: 99%
“…Anonymous entanglement is the core of QASS, achieved by performing local operations at nodes in the network to create entanglement links between senders and anonymous receivers. It also plays a crucial role in protecting user identity anonymity in quantum cryptography, with many protocols proposed for various tasks such as anonymous ranking, 15 , 16 , 17 voting, 18 , 19 , 20 and communication. 21 , 22 , 23 Among these, GHZ states are the most commonly used anonymous entanglement resource.…”
Section: Introductionmentioning
confidence: 99%