Yuan Tian, Nanyijia Zhang, Chongqiang Ye, Genqing Bian, Jian Li
{"title":"无需测量的不同安全半量子求和模型","authors":"Yuan Tian, Nanyijia Zhang, Chongqiang Ye, Genqing Bian, Jian Li","doi":"10.1140/epjqt/s40507-024-00247-9","DOIUrl":null,"url":null,"abstract":"<div><p>Secure semi-quantum summation entails the collective computation of the sum of private secrets by multi-untrustworthy and resource-limited participants, facilitated by a quantum third-party. This paper introduces three semi-quantum summation protocols based on single photons, where eliminating the need for classical users to possess measurement capabilities. Two-party protocol 1 and protocol 2 are structured upon different models: star and ring, respectively. The security analysis extensively evaluates the protocols’ resilience against outside and inside attacks, demonstrating protocols are asymptotically secure. Protocol 3 extends two-party protocol 1 to multi-party scenarios, broadening its applicability. Comparison reveals a reduction in the workload for classical users compared to previous similar protocols, and the protocols’ correctness are visually validated through simulation by Qiskit.</p></div>","PeriodicalId":547,"journal":{"name":"EPJ Quantum Technology","volume":"11 1","pages":""},"PeriodicalIF":5.8000,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-024-00247-9","citationCount":"0","resultStr":"{\"title\":\"Different secure semi-quantum summation models without measurement\",\"authors\":\"Yuan Tian, Nanyijia Zhang, Chongqiang Ye, Genqing Bian, Jian Li\",\"doi\":\"10.1140/epjqt/s40507-024-00247-9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Secure semi-quantum summation entails the collective computation of the sum of private secrets by multi-untrustworthy and resource-limited participants, facilitated by a quantum third-party. This paper introduces three semi-quantum summation protocols based on single photons, where eliminating the need for classical users to possess measurement capabilities. Two-party protocol 1 and protocol 2 are structured upon different models: star and ring, respectively. The security analysis extensively evaluates the protocols’ resilience against outside and inside attacks, demonstrating protocols are asymptotically secure. Protocol 3 extends two-party protocol 1 to multi-party scenarios, broadening its applicability. Comparison reveals a reduction in the workload for classical users compared to previous similar protocols, and the protocols’ correctness are visually validated through simulation by Qiskit.</p></div>\",\"PeriodicalId\":547,\"journal\":{\"name\":\"EPJ Quantum Technology\",\"volume\":\"11 1\",\"pages\":\"\"},\"PeriodicalIF\":5.8000,\"publicationDate\":\"2024-05-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-024-00247-9\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"EPJ Quantum Technology\",\"FirstCategoryId\":\"101\",\"ListUrlMain\":\"https://link.springer.com/article/10.1140/epjqt/s40507-024-00247-9\",\"RegionNum\":2,\"RegionCategory\":\"物理与天体物理\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"OPTICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"EPJ Quantum Technology","FirstCategoryId":"101","ListUrlMain":"https://link.springer.com/article/10.1140/epjqt/s40507-024-00247-9","RegionNum":2,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"OPTICS","Score":null,"Total":0}
Different secure semi-quantum summation models without measurement
Secure semi-quantum summation entails the collective computation of the sum of private secrets by multi-untrustworthy and resource-limited participants, facilitated by a quantum third-party. This paper introduces three semi-quantum summation protocols based on single photons, where eliminating the need for classical users to possess measurement capabilities. Two-party protocol 1 and protocol 2 are structured upon different models: star and ring, respectively. The security analysis extensively evaluates the protocols’ resilience against outside and inside attacks, demonstrating protocols are asymptotically secure. Protocol 3 extends two-party protocol 1 to multi-party scenarios, broadening its applicability. Comparison reveals a reduction in the workload for classical users compared to previous similar protocols, and the protocols’ correctness are visually validated through simulation by Qiskit.
期刊介绍:
Driven by advances in technology and experimental capability, the last decade has seen the emergence of quantum technology: a new praxis for controlling the quantum world. It is now possible to engineer complex, multi-component systems that merge the once distinct fields of quantum optics and condensed matter physics.
EPJ Quantum Technology covers theoretical and experimental advances in subjects including but not limited to the following:
Quantum measurement, metrology and lithography
Quantum complex systems, networks and cellular automata
Quantum electromechanical systems
Quantum optomechanical systems
Quantum machines, engineering and nanorobotics
Quantum control theory
Quantum information, communication and computation
Quantum thermodynamics
Quantum metamaterials
The effect of Casimir forces on micro- and nano-electromechanical systems
Quantum biology
Quantum sensing
Hybrid quantum systems
Quantum simulations.