2019
DOI: 10.3390/e21070719
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Party Quantum Summation Based on Quantum Teleportation

Abstract: We present a secure multi-party quantum summation protocol based on quantum teleportation, in which a malicious, but non-collusive, third party (TP) helps compute the summation. In our protocol, TP is in charge of entanglement distribution and Bell states are shared between participants. Users encode the qubits in their hand according to their private bits and perform Bell-state measurements. After obtaining participants' measurement results, TP can figure out the summation. The participants do not need to sen… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 45 publications
(67 reference statements)
0
6
0
Order By: Relevance
“…Using quantum systems, the references [9], [10], [11], [12] proposed a protocol to securely calculate modulo summation, which is essentially equivalent to the generation of secure modulo zero-sum randomness. However, they did not propose a method to verify the secrecy and the correctness of their computation.…”
Section: A Other Quantum Methods For Secure Modulo Summationmentioning
confidence: 99%
See 2 more Smart Citations
“…Using quantum systems, the references [9], [10], [11], [12] proposed a protocol to securely calculate modulo summation, which is essentially equivalent to the generation of secure modulo zero-sum randomness. However, they did not propose a method to verify the secrecy and the correctness of their computation.…”
Section: A Other Quantum Methods For Secure Modulo Summationmentioning
confidence: 99%
“…[Note that the significance level is the maximum passing probability when malicious Bob sends incorrect states so that the resultant state α does not satisfy Eqs. ( 11) and (12).] Proof of Theorem 3: Assume that S 1 is composed of j 1 , .…”
Section: Quantum Protocol For Secure Modulo Zero-sum Randomnessmentioning
confidence: 99%
See 1 more Smart Citation
“…Then Liu et al [11] presented a quantum summation protocol using Pauli matrices operations to encode information for extracting information, and a quantum summation protocol based on the commutative encryption [12] was proposed. In 2017, Zhang et al [13] put forward a multi-party quantum summation protocol based on single particles without a trusted third party.…”
Section: Introductionmentioning
confidence: 99%
“…Ji et al [20] have discussed how to implement these applications by using quantum summation protocols. A considerable number of quantum summation protocols have thus been proposed by using various quantum states, including single photons in two degrees of freedom [21], Bell states [22,23], Greenberger-Horne-Zeilinger (GHZ) states [24], genuinely maximally entangled six-qubit states [25], and multi-partite high-dimensional entangled states [16,20,26,27,28].…”
Section: Introductionmentioning
confidence: 99%