Abstract
In this paper, a new and efficient quantum protocol which allows a group of mutually distrustful players to perform the summation computation is proposed. Different from previous protocols, we utilize the multi-particle entangled states as the information carriers. A third party, i.e. TP, is assumed semi-honest in the two-party quantum summation protocol. All various kinds of outside attacks and participant attacks are discussed in detail. In addition, we code all players’ Bell-basis measurement outcomes into one classical bit (cbit). Not only the cost of classical information in the public communication network is decreased, but also the security of the protocol is improved. The protocol is also generalized into multi-party quantum summation. It is secure for the collusive attack performed by at most n−2 players.
Similar content being viewed by others
References
Lo, H.K.: Phys. Rev. A 56, 1154 (1997)
Crepeau, C., Gottesman, D., Smith, A.: Secure Multi-Party Quantum Computation. ACM, New York (2002)
Ben-Or, M., Crepeau, C., Gottesman, D., Hassidim, A., Smith, A.: Secure multiparty quantum computation with (only) a strict honest majority. In: (FOCS 2006). Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (2006)
Chau, H.F.: Phys. Rev. A 61, 032308 (2000)
Smith, A.: arXiv:quant-ph/0111030 (2001)
Heinrich, S.: J. Complex. 18, 1 (2002)
Heinrich, S., Novak, E.: J. Complex. 19, 1 (2003)
Heinrich, S., Kwas, M., Wozniakowski, H.: arXiv:quant-ph/0311036 (2003)
Du, J.Z., Chen, X.B., Wen, Q.Y., Zhu, F.C.: Acta Phys. Sin. 56, 6214 (2007)
Yang, Y.G., Wen, Q.Y.: J. Phys. A, Math. Theor. 42, 055305 (2009)
Hillery, M., Ziman, M., Buzek, V., Bielikova, M.: Phys. Lett. A 349, 75 (2006)
Lu, C.Y., Zhou, X.Q., Guhne, O., Gao, W.B., Zhang, J., Yuan, Z.S., Goebel, A., Yang, T., Pan, J.W.: Nat. Phys. 3, 91 (2007)
Lo, H.K.: Phys. Rev. A 62, 012313 (2000)
Chen, X.B., Wen, Q.Y., Guo, F.Z., Sun, Y., Xu, G., Zhu, F.C.: Int. J. Quant. Inform. 6, 899 (2008)
Gao, T., Yan, F.L., Wang, Z.X.: J. Phys. A, Math. Gen. 38, 5761 (2005)
Gao, T.: Z. Naturforschung A, J. Phys. Sci. 59, 597 (2004)
Buhrman, H., Cleve, R., van Dam, W.: arXiv:quant-ph/9705033 (1997)
Xia, Y., Song, J., Song, H.S.: J. Phys. B 40, 3719 (2007)
Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, p. 175. IEEE, New York/Bangalore (1984)
Shor, P.W., Preskill, J.: Phys. Rev. Lett. 85, 441 (2000)
Wang, T.Y., Wen, Q.Y., Chen, X.B., Guo, F.Z., Zhu, F.C.: Opt. Commun. 281, 6130 (2008)
Li, X.H., Deng, F.G., Zhou, H.Y.: Phys. Rev. A 74, 054302 (2006)
Bennett, C.H., DiVincenzo, D.P., Smolin, J.A., Wootters, W.K.: Phys. Rev. A 54, 3824 (1996)
Briegel, H.J., Dur, W., Cirac, J.I., Zoller, P.: Phys. Rev. Lett. 81, 5932 (1998)
Dur, W., Briegel, H.J., Cirac, J.I., Zoller, P.: Phys. Rev. A 59, 169 (1999)
Xia, Y., Song, H.S.: Phys. Lett. A 364, 117 (2007)
Boudot, F., Schoenmakers, B., Traore, J.: Discrete Appl. Math. 111, 23 (2001)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chen, XB., Xu, G., Yang, YX. et al. An Efficient Protocol for the Secure Multi-party Quantum Summation. Int J Theor Phys 49, 2793–2804 (2010). https://doi.org/10.1007/s10773-010-0472-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-010-0472-5