Skip to main content

An Dynamic Protocol for the Quantum Secure Multi-party Summation Based On Commutative Encryption

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11632))

Included in the following conference series:

Abstract

A dynamic protocol for the quantum secure multi-party summation based on commutative encryption is proposed. Without using the entangled character, joint measurement, n parties can encrypt their private information and privately get the summation of their private information using commutative encryption. Any m parties can dynamically participate and drop out the proposed protocol. Correctness analysis shows that the proposed protocol can be used to get the summation of their private information correctly. Security analysis shows that the proposed protocol can resist the general active attacks from an outside eavesdropper. And it can overcomes the problem of information leakage. In theory, our protocol can be used to build complex secure protocols for other multiparty computations and also lots of other important applications in distributed networks.

Supported by the National Natural Science Foundation of China (Grant No.61502437,Grant No.61773352); The China Scholarship Council(No.201707055033); The Fundamental Research Funds for the Central Universities (Grant No.2018CUCTJ017); The Science and Technology Program of Guizhou Province (No.QianKeHeJiChu[2016]1115); The Science and Technology Platform and Talent Team Project of Guizhou Province (No. QianKeHePingTaiRenCai [2017]5501; QianKeHePingTaiRenCai [2016]5609); The Youth Science and Technology Talent Program of Department of Education of Guizhou Province (No. QianJiaoHeKYZi[2016]220).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175–179 (1984)

    Google Scholar 

  2. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991)

    Article  MathSciNet  Google Scholar 

  3. Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 67, 557–559 (1992)

    Article  MathSciNet  Google Scholar 

  4. Deng, F.G., Long, G.L.: Controlled order rearrangement encryption for quantum key distribution. Phys. Rev. A 68, 042315 (2003)

    Article  Google Scholar 

  5. Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Quantum key distribution without alternative measurements and rotations. Phys. Lett. A 349, 53–58 (2006)

    Article  Google Scholar 

  6. Guo, F.Z., Gao, F., Wen, Q.Y., Zhu, F.C.: A two-step channel-encrypting quantum key distribution protocol. Int. J. Quantum Inf. 8, 1013–1022 (2010)

    Article  Google Scholar 

  7. Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Quantum key distribution by constructiong nonorthogonal states with Bell states. Int. J. Mod. Phys. B 24, 4611–4618 (2010)

    Article  Google Scholar 

  8. Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 052307 (1999)

    Article  Google Scholar 

  9. Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 162–168 (2004)

    Article  Google Scholar 

  10. Deng, F.G., Zhou, H.Y., Long, G.L.: Bidirectional quantum secret sharing and secret splitting with polarized single photons. Phys. Lett. A 337, 329–334 (2005)

    Article  Google Scholar 

  11. Sun, Y., Wen, Q.Y., Gao, F., Chen, X.B., Zhu, F.C.: Multiparty quantum secret sharing based on Bell measurement. Opt. Commun. 282, 3647–3651 (2009)

    Article  Google Scholar 

  12. Qu, Z., Zhu, T., Wang, J., Wang, X.: A novel quantum stegonagraphy based on brown states. CMC Comput. Mater. Continua 56(1), 47–59 (2018)

    Google Scholar 

  13. Liu, W., Chen, Z., Liu, J., Su, Z., Chi, L.: Full-blind delegating private quantum computation. CMC Comput. Mater. Continua 56(2), 211–223 (2018)

    Google Scholar 

  14. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, p. 218. ACM, New York (1987)

    Google Scholar 

  15. Hillery, M., Ziman, M., Buek, V., Bielikov, M.: Phys. Lett. A 349(1–4), 75 (2006)

    Article  Google Scholar 

  16. Du, J.Z., Chen, X.B., Wen, Q.X., Zhu, F.C.: Secure multiparty quantum summation. Acta Phys. Sin-Ch. Ed. 56, 6214–6219 (2007)

    MathSciNet  Google Scholar 

  17. Chen, X.B., Xu, G., Yang, Y.X., Wen, Q.Y.: An efficient protocol for the secure multi-party quantum summation. Int. J. Theor. Phys. 49, 2793–2804 (2010)

    Article  MathSciNet  Google Scholar 

  18. Zhang, C., Sun, Z.-W., Huang, X.: Three-party quantum summation without a trusted third party. Int. J. Quantum Inf. 13(2), 1550011 (2015)

    Article  MathSciNet  Google Scholar 

  19. Zhang, C., Sun, Z., Huang, Y.: High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 53(3), 933–941 (2014)

    Article  Google Scholar 

  20. Shi, R., Yi, M., Zhong, H., Cui, J., Zhang, S.: Secure multiparty quantum computation for summation and multiplication. Sci. Rep. 6, 19655 (2016)

    Article  Google Scholar 

  21. Jakobi, M., et al.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83(2), 022301 (2011)

    Article  Google Scholar 

  22. Kanamori, Y.: Quantum encryption and authentication protocols. Ph.D thesis, University of Alabama in Huntsville (2006)

    Google Scholar 

  23. Sun, Z., Huang, J., Wang, P.: Efficient multiparty quantum key agreement protocol based on commutative encryption. Quantum Inf. Process. 15, 2101 (2016)

    Article  MathSciNet  Google Scholar 

  24. Gao, F., Qin, S.J., Wen, Q.Y., et al.: A simple participant attack on the Bradler-Dusek protocol. Quantum Inf. Comput. 7, 329 (2007)

    MathSciNet  MATH  Google Scholar 

  25. Qin, S.J., Gao, F., Wen, Q.Y., et al.: Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secretsharing protocol. Phys. Rev. A 76, 062324 (2007)

    Article  Google Scholar 

  26. Lin, S., Gao, F., Guo, F.Z., et al.: Comment on multiparty quantum secret sharing of classical messages based on entanglement swapping. Phys. Rev. A 76, 036301 (2007)

    Article  MathSciNet  Google Scholar 

  27. Lin, S., Wen, Q.Y., Gao, F., et al.: Improving the security of multiparty quantum secret sharing based on the improved Bostrom-Felbinger protocol. Opt. Commun. 281, 4553 (2008)

    Article  Google Scholar 

  28. Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Comment on experimental demonstration of a quantum protocol for Byzantine agreement and liar detection. Phys. Rev. Lett. 101, 208901 (2008)

    Article  Google Scholar 

  29. Song, T.T., Zhang, J., Gao, F., et al.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18, 1333 (2009)

    Article  Google Scholar 

  30. Guo, F.Z., Qin, S.J., Gao, F., et al.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D 56, 445 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, W., Ma, MY. (2019). An Dynamic Protocol for the Quantum Secure Multi-party Summation Based On Commutative Encryption. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11632. Springer, Cham. https://doi.org/10.1007/978-3-030-24274-9_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24274-9_49

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24273-2

  • Online ISBN: 978-3-030-24274-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics