2021
DOI: 10.1038/s41598-021-81799-z
|View full text |Cite
|
Sign up to set email alerts
|

An efficient simulation for quantum secure multiparty computation

Abstract: The quantum secure multiparty computation is one of the important properties of secure quantum communication. In this paper, we propose a quantum secure multiparty summation (QSMS) protocol based on (t, n) threshold approach, which can be used in many complex quantum operations. To make this protocol secure and realistic, we combine both the classical and quantum phenomena. The existing protocols have some security and efficiency issues because they use (n, n) threshold approach, where all the honest players n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 59 publications
(79 reference statements)
0
14
0
Order By: Relevance
“…In addition, we also compare the quantum (t, n) threshold part of our scheme with the existing (t, n) threshold scheme 090308-7 based on quantum Fourier transform. [18][19][20] In the scheme proposed by Song et al, [18] the dealer uses polynomials to distribute classical secret shares and the secret reconstructors can perform CNOT operation and QFT −1 operation to recover the secret, but they need to obtain information from other participants. The scheme of Mashhadi [19] uses MSP instead of polynomials, and the reconstructor generates entangled states through SUM operation and QFT, and then recovers secrets through QFT and the generalized Pauli operator.…”
Section: Performance Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, we also compare the quantum (t, n) threshold part of our scheme with the existing (t, n) threshold scheme 090308-7 based on quantum Fourier transform. [18][19][20] In the scheme proposed by Song et al, [18] the dealer uses polynomials to distribute classical secret shares and the secret reconstructors can perform CNOT operation and QFT −1 operation to recover the secret, but they need to obtain information from other participants. The scheme of Mashhadi [19] uses MSP instead of polynomials, and the reconstructor generates entangled states through SUM operation and QFT, and then recovers secrets through QFT and the generalized Pauli operator.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…The scheme of Mashhadi [19] uses MSP instead of polynomials, and the reconstructor generates entangled states through SUM operation and QFT, and then recovers secrets through QFT and the generalized Pauli operator. The scheme proposed by Sutardhar [20] is an improvement of Song et al's scheme, and requires each participant to perform the QFT −1 operation on his own particle during the secret recovery phase.…”
Section: Performance Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…For details on secret sharing schemes we refer to Gopalakrishnan and Stinson, 4 Beimel 5 Koukouvinos et al 6 Changyuan, 7 Cramer et al 8 Huaixi et al 9 and Stinson and Wei, 10 among others. The proposed protocol can also be used to build the quantum protocols, see Sutradhar and Om 11‐19 …”
Section: Introductionmentioning
confidence: 99%
“…In our protocol, each player knows only his share, even the reconstructor knows only his share. In this protocol, we use some basic operations i.e., protocol-I of Shi et al [51], CN OT gate [37], secure communication [72,6,55,50,61,46,38,75,21,73,64,63,65], entangle state [71,53,54,7,45,52,59,58,57,49,47,42,48,56], Quantum Fourier Transform (QF T ) [19] and Inverse Quantum Fourier Transform (QF T −1 ) [19], to transform the particles. We use a quantum approach in classical secret sharing to combine the benefits of both classical and quantum secret sharing, preventing attacks such as Intercept-Resend (IR), Intercept, Entangle-Measure (EM), Forgery, Collision, and Collusion.…”
Section: Introductionmentioning
confidence: 99%