Skip to main content
Top
Published in: Quantum Information Processing 3/2021

01-03-2021

Quantum-based anonymity and secure veto

Authors: Qingle Wang, Yuancheng Li, Chaohang Yu, Runhua Shi, Zhichao Zhang

Published in: Quantum Information Processing | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Remarkable theoretical and experimental achievements of quantum technology have convincingly shown that a flourishing quantum age is coming. The threat of quantum attacks posed to the classical cryptographic protocols, whose security lies on the computational complexity of difficult problems, is ever more severe. As a particular voting and typical daily activity, the anonymous veto has already been further studied in classical cryptography. In this paper, a novel quantum anonymous veto protocol with information-theoretic security is proposed. Benefited from the entanglement of GHZ states and quantum nonlocality, our protocol satisfies some desirable properties of reliability, privacy, verifiability, tracelessness, and fairness. Compared to the properties of classical protocols, tracelessness is a unique property in quantum anonymous veto protocol. Using the online analog quantum computer of IBM Corporation placed on the cloud, we make an experimental test of anonymous veto for four voters. Any harmful attempt of cheating from the semi-honest certificate authority center, malicious voters, and external eavesdroppers will be detected by honest participants based on the fantastic quantum world. This work to voting theory helps elucidate how quantum mechanics can be harnessed for secure strategic advantage.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Boneh, D., Golle, P.: Almost entirely correct mixing with applications to voting. In: Proceedings of 9th ACM Conference. Computer Communications Security, p. 6877, Washington (2002) Boneh, D., Golle, P.: Almost entirely correct mixing with applications to voting. In: Proceedings of 9th ACM Conference. Computer Communications Security, p. 6877, Washington (2002)
2.
go back to reference Clarkson, M.R., Chong, S., Myers, A.C.: Toward a secure voting system. In: Proceedings of 2008 IEEE Symposium on Security and Privacy, p. 354368, Oakland (2008) Clarkson, M.R., Chong, S., Myers, A.C.: Toward a secure voting system. In: Proceedings of 2008 IEEE Symposium on Security and Privacy, p. 354368, Oakland (2008)
3.
go back to reference Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)CrossRefADS Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)CrossRefADS
5.
go back to reference Wang, Q.L., Yu, C.H., Gao, F., Qi, H.Y., Wen, Q.Y.: Self-tallying quantum anonymous voting. Phys. Rev. A 94(2), 022333 (2016)CrossRefADS Wang, Q.L., Yu, C.H., Gao, F., Qi, H.Y., Wen, Q.Y.: Self-tallying quantum anonymous voting. Phys. Rev. A 94(2), 022333 (2016)CrossRefADS
6.
go back to reference Bradlyn, B., Elcoro, L., Cano, J., Vergniory, M.G., Wang, Z.J., Felser, C., Aroyo, M.I., Bernevig, B.A.: Topological quantum chemistry. Nature 547, 298305 (2017)CrossRef Bradlyn, B., Elcoro, L., Cano, J., Vergniory, M.G., Wang, Z.J., Felser, C., Aroyo, M.I., Bernevig, B.A.: Topological quantum chemistry. Nature 547, 298305 (2017)CrossRef
7.
go back to reference Lambert, N., Chen, Y., Cheng, Y., Li, C.M., Chen, G.Y., Nori, F.: Quantum biology. Nat. Phys. 9, 1018 (2013)CrossRef Lambert, N., Chen, Y., Cheng, Y., Li, C.M., Chen, G.Y., Nori, F.: Quantum biology. Nat. Phys. 9, 1018 (2013)CrossRef
8.
go back to reference Liu, J., Zhang, X.L., Hu, B., Lu, Q., Liu, D.J., Dong, C.Q., Yang, Y.P.: Formation mechanism of HCN and NH3 during indole pyrolysis: a theoretical DFT study. J. Energy Inst. 93(2), 649–657 (2020)CrossRef Liu, J., Zhang, X.L., Hu, B., Lu, Q., Liu, D.J., Dong, C.Q., Yang, Y.P.: Formation mechanism of HCN and NH3 during indole pyrolysis: a theoretical DFT study. J. Energy Inst. 93(2), 649–657 (2020)CrossRef
9.
go back to reference Zrazhevskiy, P., Gao, X.: Multifunctional quantum dots for personalized medicine. Nano Today 4(5), 414–428 (2009)CrossRef Zrazhevskiy, P., Gao, X.: Multifunctional quantum dots for personalized medicine. Nano Today 4(5), 414–428 (2009)CrossRef
10.
go back to reference Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer, System Signal Process, p. 175179, Bangalore (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer, System Signal Process, p. 175179, Bangalore (1984)
11.
go back to reference Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 20502056 (1999)CrossRef Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 20502056 (1999)CrossRef
12.
go back to reference Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441444 (2000)CrossRefADS Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441444 (2000)CrossRefADS
13.
go back to reference Lucamarini, M., Dynes, J.F., Frohlich, B., Yuan, Z.L., Shields, A.J.: Security bounds for efficient decoy-state quantum key distribution. IEEE J. Set. Top. Quant. 21(3), 6601468 (2015) Lucamarini, M., Dynes, J.F., Frohlich, B., Yuan, Z.L., Shields, A.J.: Security bounds for efficient decoy-state quantum key distribution. IEEE J. Set. Top. Quant. 21(3), 6601468 (2015)
15.
go back to reference Yang, Y.G., Wen, Q.Y., Zhang, X.: Multiparty simultaneous quantum identity authentication with secret sharing. Sci. China G Phys. Mech. Astron. 51(3), 321327 (2008)MATH Yang, Y.G., Wen, Q.Y., Zhang, X.: Multiparty simultaneous quantum identity authentication with secret sharing. Sci. China G Phys. Mech. Astron. 51(3), 321327 (2008)MATH
16.
17.
go back to reference Christandl, M., Wehner, S.: Quantum Anonymous Transmissions. In Advances in Cryptology: ASIACRYPT 2005, pp. 217–235, Berlin, Heidelberg (2005) Christandl, M., Wehner, S.: Quantum Anonymous Transmissions. In Advances in Cryptology: ASIACRYPT 2005, pp. 217–235, Berlin, Heidelberg (2005)
18.
go back to reference Menicucci, N.C., Baragiola, B.Q., Demarie, T.F., Brennen, G.K.: Anonymous broadcasting of classical information with a continuous-variable topological quantum code. Phys. Rev. A 97(3), 032345 (2018)CrossRefADS Menicucci, N.C., Baragiola, B.Q., Demarie, T.F., Brennen, G.K.: Anonymous broadcasting of classical information with a continuous-variable topological quantum code. Phys. Rev. A 97(3), 032345 (2018)CrossRefADS
19.
go back to reference Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocols. Sci. China G Phys. Mech. Astron. 62(7), 070301 (2019)CrossRef Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocols. Sci. China G Phys. Mech. Astron. 62(7), 070301 (2019)CrossRef
20.
go back to reference Wei, C.Y., Cai, X.Q., Liu, B., Wang, T.Y., Gao, F.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67(1), 2–8 (2018)MathSciNetCrossRef Wei, C.Y., Cai, X.Q., Liu, B., Wang, T.Y., Gao, F.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67(1), 2–8 (2018)MathSciNetCrossRef
22.
go back to reference Wang, Q.L., Sun, H.X., Huang, W.: Multi-party quantum private comparison protocol with \(n\)-level entangled statesg. Quantum Inf. Proc. 13(11), 23752389 (2014)CrossRef Wang, Q.L., Sun, H.X., Huang, W.: Multi-party quantum private comparison protocol with \(n\)-level entangled statesg. Quantum Inf. Proc. 13(11), 23752389 (2014)CrossRef
24.
go back to reference Xu, F.H., Curty, M., Qi, B., Lo, H.K.: Measurement-device-independent quantum cryptography. IEEE J. Set. Top. Quantum 21(3), 6601111 (2015) Xu, F.H., Curty, M., Qi, B., Lo, H.K.: Measurement-device-independent quantum cryptography. IEEE J. Set. Top. Quantum 21(3), 6601111 (2015)
25.
go back to reference Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65(6), 052326 (2002)CrossRefADS Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65(6), 052326 (2002)CrossRefADS
26.
go back to reference Hillery, M., Ziman, M., Buzek, V., Bieliková, M.: Towards quantum-based privacy and voting. Phys. Lett. A 349(1), 75–81 (2006)CrossRefADS Hillery, M., Ziman, M., Buzek, V., Bieliková, M.: Towards quantum-based privacy and voting. Phys. Lett. A 349(1), 75–81 (2006)CrossRefADS
27.
go back to reference Bonanome, M., Buzek, V., Hillery, M., Ziman, M.: Toward protocols for quantum-ensured privacy and secure voting. Phys. Rev. A 84(2), 022331 (2011)CrossRefADS Bonanome, M., Buzek, V., Hillery, M., Ziman, M.: Toward protocols for quantum-ensured privacy and secure voting. Phys. Rev. A 84(2), 022331 (2011)CrossRefADS
28.
go back to reference Jiang, L., He, G.Q., Nie, D., Xiong, J., Zeng, G.H.: Quantum anonymous voting for continuous variables. Phys. Rev. A 85(4), 042309 (2012)CrossRefADS Jiang, L., He, G.Q., Nie, D., Xiong, J., Zeng, G.H.: Quantum anonymous voting for continuous variables. Phys. Rev. A 85(4), 042309 (2012)CrossRefADS
29.
go back to reference Xue, P., Zhang, X.: A simple quantum voting scheme with multi-qubit entanglement. Sci. Rep. 7(1), 7586 (2017)CrossRefADS Xue, P., Zhang, X.: A simple quantum voting scheme with multi-qubit entanglement. Sci. Rep. 7(1), 7586 (2017)CrossRefADS
30.
go back to reference Wang, S.L., Zhang, S., Wang, Q., Shi, R.H.: Fault-tolerant quantum anonymous voting protocol. Int. J. Theor. Phys. 58(3), 1008–1016 (2019)CrossRef Wang, S.L., Zhang, S., Wang, Q., Shi, R.H.: Fault-tolerant quantum anonymous voting protocol. Int. J. Theor. Phys. 58(3), 1008–1016 (2019)CrossRef
31.
go back to reference The IBM Quantum Experience. http://www.research.ibm.com/quantum The IBM Quantum Experience. http://​www.​research.​ibm.​com/​quantum
32.
go back to reference Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)CrossRefADS Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)CrossRefADS
33.
go back to reference Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the brádler-dušek protocol. Phys. Rev. A 7(4), 329–334 (2007)MATH Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the brádler-dušek protocol. Phys. Rev. A 7(4), 329–334 (2007)MATH
34.
go back to reference Lin, S., Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “multiparty quantum secret sharing of classical messages based on entanglement swapping”. Phys. Rev. A 76(3), 036301 (2007)MathSciNetCrossRefADS Lin, S., Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “multiparty quantum secret sharing of classical messages based on entanglement swapping”. Phys. Rev. A 76(3), 036301 (2007)MathSciNetCrossRefADS
Metadata
Title
Quantum-based anonymity and secure veto
Authors
Qingle Wang
Yuancheng Li
Chaohang Yu
Runhua Shi
Zhichao Zhang
Publication date
01-03-2021
Publisher
Springer US
Published in
Quantum Information Processing / Issue 3/2021
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-021-03022-2

Other articles of this Issue 3/2021

Quantum Information Processing 3/2021 Go to the issue