Skip to main content
Log in

Quantum summation using d-level entanglement swapping

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

In this paper, we propose a secure multi-party quantum modulo-d summation protocol using d-level entanglement swapping, where a malicious but non-collusive third party (TP) who plays a role of entanglement distribution between the participants is involved. TP is assumed to be malicious but non-collusive, which means TP can launch various attacks within boundaries of quantum mechanics except the collusion with any dishonest participant. Our protocol is congenitally free from Trojan horse attacks because there is no need to relay encoded states. In addition, only d-level Bell measurement is required for the users except TP, which makes our protocol’s implementation more feasible. We show that the presented protocol is secure against outside as well as participant attacks. Second, we give a detailed comparison of different quantum modulo-d summation protocols, in terms of qudit cost, quantum resources, and quantum operations. In the end, we discuss how to replace cat states with d-level Bell states in Je et al.’s protocols (Quantum Inf Process 18(6):168, 2019) for easier implementation with current quantum technology.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Heinrich, S.: Quantum summation with an application to integration. J. Complex. 18(1), 1 (2002)

    Article  MathSciNet  Google Scholar 

  2. Heinrich, S., Novak, E.: On a problem in quantum summation. J. Complex. 19(1), 1 (2003)

    Article  MathSciNet  Google Scholar 

  3. Heinrich, S., Kwas, H., Wozniakowski, M.: Quantum Boolean Summation with Repetitions in the Worst-Average Setting (2003). arXiv:quant-ph/0311036

  4. Du, J.Z., Chen, X.B., Wen, Q.Y., Zhu, F.C.: Secure multiparty quantum summation. Acta Phys. Sin. 56(11), 6214 (2007)

    MathSciNet  Google Scholar 

  5. Chen, X.B., Xu, G., Yang, Y.X., Wen, Q.Y.: An efficient protocol for the secure multi-party quantum summation. Int. J. Theor. Phys. 49(11), 2793 (2010)

    Article  MathSciNet  Google Scholar 

  6. Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56, 1154 (1997)

    Article  ADS  Google Scholar 

  7. Crépeau, C., Gottesman, D., Smith, A.: Secure multi-party quantum computation. In: Proceedings of the Thirty-Fourth Annual ACM Symposium on Theory of Computing, pp. 643–652. ACM (2002)

  8. Chau, H.F.: Quantum-classical complexity–security tradeoff in secure multiparty computations. Phys. Rev. A 61, 032308 (2000)

    Article  ADS  Google Scholar 

  9. Ben-Or, M., Crepeau, C., Gottesman, D., Hassidim, A., Smith, A.: Secure multiparty quantum computation with (only) a strict honest majority. In: 47th Annual IEEE Symposium on Foundations of Computer Science, 2006. FOCS’06, pp. 249–260. IEEE (2006)

  10. Smith, A.: Multi-party Quantum Computation (2010). arXiv:quant-ph/0111030

  11. Hillery, M., Ziman, M., Bužek, V., Bieliková, M.: Towards quantum-based privacy and voting. Phys. Lett. A 349(1–4), 75 (2006)

    Article  ADS  Google Scholar 

  12. Li, Y., Zeng, G.: Quantum anonymous voting systems based on entangled state. Opt. Rev. 15(5), 219 (2008)

    Article  Google Scholar 

  13. Wang, Q., Yu, C., Gao, F., Qi, H., Wen, Q.: Self-tallying quantum anonymous voting. Phys. Rev. A 94(2), 022333 (2016)

    Article  ADS  Google Scholar 

  14. Xue, P., Zhang, X.: A simple quantum voting scheme with multi-qubit entanglement. Sci. Rep. 7(1), 7586 (2017)

    Article  ADS  Google Scholar 

  15. Bao, N., Halpern, N.Y.: Quantum voting and violation of Arrow’s impossibility theorem. Phys. Rev. A 95(6), 062306 (2017)

  16. Huang, W., Wen, Q.Y., Liu, B., Su, Q., Qin, S.J., Gao, F.: Quantum anonymous ranking. Phys. Rev. A 89(3), 032325 (2014)

    Article  ADS  Google Scholar 

  17. Sun, Z., Yu, J., Wang, P., Xu, L., Wu, C.: Quantum private comparison with a malicious third party. Quantum Inf. Process. 14(6), 2125 (2015)

    Article  ADS  Google Scholar 

  18. Hung, S.M., Hwang, S.L., Hwang, T., Kao, S.H.: Multiparty quantum private comparison with almost dishonest third parties for strangers. Quantum Inf. Process. 16(2), 36 (2017)

    Article  ADS  MathSciNet  Google Scholar 

  19. He, G.P.: Quantum private comparison protocol without a third party. Int. J. Quantum Inf. 15(02), 1750014 (2017)

    Article  MathSciNet  Google Scholar 

  20. Zhang, C., Sun, Z., Huang, Y., Long, D.: High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 53(3), 933 (2014)

    Article  Google Scholar 

  21. Zhang, C., Sun, Z.W., Huang, X., Long, D.Y.: Three-party quantum summation without a trusted third party. Int. J. Quantum Inf. 13(02), 1550011 (2015)

    Article  MathSciNet  Google Scholar 

  22. Shi, R.H., Mu, Y., Zhong, H., Cui, J., Zhang, S.: Secure multiparty quantum computation for summation and multiplication. Sci. Rep. 6, 19655 (2016)

    Article  ADS  Google Scholar 

  23. Shi, R.H., Zhang, S.: Quantum solution to a class of two-party private summation problems. Quantum Inf. Process. 16(9), 225 (2017)

    Article  ADS  MathSciNet  Google Scholar 

  24. Zhang, C., Situ, H., Huang, Q., Yang, P.: Multi-party quantum summation without a trusted third party based on single particles. Int. J. Quantum Inf. 15, 1750010 (2017)

    Article  MathSciNet  Google Scholar 

  25. Liu, W., Wang, Y.B., Fan, W.Q.: An novel protocol for the quantum secure multi-party summation based on two-particle bell states. Int. J. Theor. Phys. 56(9), 2783 (2017)

    Article  MathSciNet  Google Scholar 

  26. Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)

    Article  ADS  Google Scholar 

  27. Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)

    Article  ADS  Google Scholar 

  28. Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74, 054302 (2006)

    Article  ADS  Google Scholar 

  29. Zhang, C., Razavi, M., Sun, Z., Huang, Q., Situ, H.: Multi-party quantum summation based on quantum teleportation. Entropy 21(7), 719 (2019)

    Article  ADS  MathSciNet  Google Scholar 

  30. Ji, Z., Zhang, H., Wang, H., Wu, F., Jia, J., Wu, W.: Quantum protocols for secure multi-party summation. Quantum Inf. Process. 18(6), 168 (2019)

    Article  ADS  MathSciNet  Google Scholar 

  31. Karimipour, V., Bahraminasab, A., Bagherinezhad, S.: Entanglement swapping of generalized cat states and secret sharing. Phys. Rev. A 65(4), 042320 (2002)

    Article  ADS  Google Scholar 

  32. Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 4 (2005)

    Google Scholar 

  33. Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73(02), 022320 (2006)

    Article  ADS  Google Scholar 

  34. Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer, System and Signal, pp. 175–179 (1984)

  35. Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)

    Article  ADS  Google Scholar 

  36. Yang, H.Y., Ye, T.Y.: Secure multi-party quantum summation based on quantum Fourier transform. Quantum Inf. Process. 17(6), 129 (2018)

    Article  ADS  MathSciNet  Google Scholar 

  37. Zhang, C., Situ, H., Huang, Q., Sun, Z., Huang, Z.: Multi-party quantum summation based on quantum teleportation. Int. J. Quantum Inf. 17, 1950027 (2019)

    Article  MathSciNet  Google Scholar 

  38. Gan, Z.G.: Improvement of quantum protocols for secure multi-party summation. Int. J. Theor. Phys. 59, 3086 (2020)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61902132, 11647140, and U1736113), the Guangdong Basic and Applied Basic Research Foundation (Grant No. 2021A1515011985), and the Natural Science Foundation of Guangdong Province of China (Grant No. 2018A030310147).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cai Zhang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, C., Long, Y. & Li, Q. Quantum summation using d-level entanglement swapping. Quantum Inf Process 20, 137 (2021). https://doi.org/10.1007/s11128-021-03072-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-021-03072-6

Keywords

Navigation