Skip to main content
Log in

Quantum protocols for secure multi-party summation

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Quantum secure multi-party summation is a kind of privacy-preserving summation whereby multiple mutually distrustful parties can securely compute the summation of their secret data, which can be utilized to execute many tasks of quantum secure multi-party computation, such as quantum anonymous surveying. In this paper, we present two quantum secure multi-party summation protocols, both of which allow multiple mutually distrustful parties to securely compute the summation of their secret data, where the dataset of the summation is supposed to be a set of nonnegative integers. Our protocols have two main common features. One is the assumption of a semi-honest third party who helps multiple parties to perform the summation computations and announces the results, at the same time he is allowed to misbehave on his own, but cannot conspire with any party. Another is the use of the entanglement swapping of d-level cat states and Bell states to maintain privacy, and pass information between each party and the semi-honest third party. We analyze the success probability of our two protocols, respectively. In addition, we generalize the use of our second protocol to execute the tasks of quantum anonymous ranking and quantum anonymous voting. What’s more, we show that our protocols can resist various attacks from both outside attackers and inside participants.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Zhang, H.G., Han, W.B., Lai, X.J., et al.: Survey on cyberspace security. Sci. China Inf. Sci. 58(11), 1–43 (2015)

    MathSciNet  Google Scholar 

  2. Yao, A.C.: Protocols for secure computations. Foundations of Computer Science. In: SFCS’08. 23rd Annual Symposium on. IEEE 1982, 160–164 (1982)

  3. Wu, W.Q., Zhang, H.G.: Quantum algorithm to solve function inversion with timespace trade-off. Quantum Inf. Process. 16(7), 171 (2017)

    Article  ADS  Google Scholar 

  4. Wu, W.Q., Zhang, H.G., Mao, S.W., Wang, H.Z.: Quantum algorithm to find invariant linear structure of MD hash functions. Quantum Inf. Process. 14(3), 813–829 (2015)

    Article  ADS  MathSciNet  Google Scholar 

  5. Wu, W.Q., Zhang, H.G., Wang, H.Z., Mao, S.W.: Polynomial-time quantum algorithms for finding the linear structures of Boolean function. Quantum Inf. Process. 14(4), 1215–1226 (2015)

    Article  ADS  MathSciNet  Google Scholar 

  6. Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceeding of the IEEE International Conference on Computers, Systems and Signal, pp. 175179. Bangalore, India (1984)

  7. Hillery, M., Bu\(\check{z}\)ek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. 59(3), 1829 (1999)

    Article  ADS  MathSciNet  Google Scholar 

  8. Karimipour, V., Bahraminasab, A., Bagherinezhad, S.: Entanglement swapping of generalized cat states and secret sharing. Physical Review A 65, 042320 (2002)

    Article  ADS  Google Scholar 

  9. Bagherinezhad, S., Karimipour, V.: Quantum secret sharing based on reusable Greenberger–Horne–Zeilinger states as secure carriers. Phys. Rev. A 67(4), 044302 (2003)

    Article  ADS  Google Scholar 

  10. Huang, W., Wen, Q.Y., Liu, B., et al.: Quantum anonymous ranking. Phys. Rev. A 89(3), 032325 (2014)

    Article  ADS  Google Scholar 

  11. Lin, S., Guo, G.D., Huang, F., et al.: Quantum anonymous ranking based on the Chinese remainder theorem. Phys. Rev. A 93(1), 012318 (2016)

    Article  ADS  Google Scholar 

  12. Clifton, C., Kantarcioglu, M., Vaidya, J., et al.: Tools for privacy preserving distributed data mining. ACM Sigkdd Explor. Newsl. 4(2), 28–34 (2002)

    Article  Google Scholar 

  13. Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: a review and open problems. In: Proceedings of the 2001 Workshop on New Security Paradigms. ACM, 13–22 (2001)

  14. Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)

    Article  ADS  Google Scholar 

  15. Hillery, M., Ziman, M., Bužek, V., et al.: Towards quantum-based privacy and voting. Physics Letters A 349(1), 75–81 (2006)

    Article  ADS  Google Scholar 

  16. Bonanome, M., Bužek, V., Hillery, M., et al.: Toward protocols for quantum-ensured privacy and secure voting. Phys. Rev. A 84(2), 022331 (2011)

    Article  ADS  Google Scholar 

  17. Ji, Z.X., Ye, T.Y.: Multi-party quantum private comparison based on the entanglement swapping of d-level cat states and d-level Bell states. Quantum Inf. Process. 16(7), 177 (2017)

    Article  ADS  MathSciNet  Google Scholar 

  18. Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)

    MATH  Google Scholar 

  19. Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)

    Article  ADS  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers for their important discussions. This work is partially supported by the State Key Program of National Natural Science of China No. 61332019, the Major State Basic Research Development Program of China (973 Program) No. 2014CB340601, the National Science Foundation of China No. 61202386, 61402339, the National Cryptography Development Fund No. MMJJ201701304, the Science and Technology Research Project of Hebei higher education No. QN2017020.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to HouZhen Wang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ji, Z., Zhang, H., Wang, H. et al. Quantum protocols for secure multi-party summation. Quantum Inf Process 18, 168 (2019). https://doi.org/10.1007/s11128-018-2141-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-018-2141-1

Keywords

Navigation