• Chinese Journal of Quantum Electronics
  • Vol. 38, Issue 6, 830 (2021)
Hong CHANG1、*, Yiting WU1, and Song LIN2、3
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461. 2021.06.011 Cite this Article
    CHANG Hong, WU Yiting, LIN Song. Quantum secure multiparty summation based on Bell states[J]. Chinese Journal of Quantum Electronics, 2021, 38(6): 830 Copy Citation Text show less
    References

    [1] Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography [J]. Reviews of Modern Physics, 2002, 74(1): 145-195.

    [2] Wang S, He D Y, Yin Z Q, et al. Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system [J]. Physical Review X, 2019, 9: 021046.

    [3] Qian Y J, He D Y, Wang S, et al. Robust countermeasure against detector control attack in a practical quantum key distribution system [J]. Optica, 2019, (9): 1178-1184.

    [4] Wang S, Yin Z Q, Chen W, et al. Experimental demonstration of a quantum key distribution without signal disturbance monitoring [J]. Nature Photonics, 2015, 9(12): 832-836.

    [5] Wang S, Chen W, Yin Z Q, et al. Practical gigahertz quantum key distribution robust against channel disturbance [J]. Optics Letters, 2018, 43(9): 2030-2033.

    [6] An X B, Zhang H, Zhang C M, et al. Practical quantum digital signature with a gigahertz BB84 quantum key distribution system [J]. Optics Letters, 2019, 44: 139.

    [7] Owari M, Kato G, Hayashi M. Single-shot secure quantum network coding on butterfly network with free public communication [J]. Quantum Science and Technology, 2018, 3(1): 014001.

    [8] Yao A C. Protocols for secure computations [C]. rd Annual Symposium on Foundations of Computer Science, 1982: 160-164.

    [9] Yang Y G, Wen Q Y. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement [J]. Journal of Physics A: Mathematical and Theoretical, 2009, 42(5): 055305.

    [10] Lin S, Sun Y, Liu X F, et al. Quantum private comparison protocol with d-dimensional Bell states [J]. Quantum Information Processing, 2013, 12(1): 559-568.

    [11] Xu L, Zhao Z W. Quantum private comparison protocol based on the entanglement swapping between χ+ state and W-Class state [J]. Quantum Information Processing, 2017, 1(12): 302.

    [12] Lin P H, Hwang T, Tsai C W. Efficient semi-quantum private comparison using single photons [J]. Quantum Information Processing, 2019, 18(7): 207.

    [13] Ji Z X, Fan P R, Zhang H G, et al. Several two-party protocols for quantum private comparison using entanglement and dense coding [J]. Optics Communications, 2020, 459: 124911.

    [14] Jakobi M, Simon C, Gisin N, et al. Practical private database queries based on a quantum-key-distribution protocol [J]. Physical Review A, 2011, 83(2): 022301.

    [15] Liu B, Gao F, Huang W, et al. QKD-based quantum private query without a failure probability [J]. Science China Physics, Mechanics & Astronomy, 2015, 58(10): 100301.

    [16] Gao F, Qin S J, Huang W, Wen Q Y. Quantum private query: A new kind of practical quantum cryptographic protocol [J]. Science China Physics, Mechanics & Astronomy, 2019, 62(7): 070301.

    [17] Wei C Y, Cai X Q, Wang T Y, et al. Error tolerance bound in QKD-based quantum private query [J]. IEEE Journal on Selected Areas in Communications, 2020, 38(3): 517-527.

    [18] Vaccaro J A, Spring J, Chefles A. Quantum protocols for anonymous voting and surveying [J]. Physical Review A, 2007, 75: 012333.

    [19] Du J Z, Chen X B, Wen Q Y, et al. Secure multiparty quantum summation [J]. Acta Physica Sinica, 2007, 5(11): 6214-6219.

    [20] Liu W, Wang Y B, Fan W Q. An novel protocol for the quantum secure multi-party summation based on two-particle Bell states [J]. International Journal of Theoretical Physics, 2017, 5(9): 2783-2791.

    [21] Yang H Y, Ye T Y. Secure multi-party quantum summation based on quantum Fourier transform [J]. Quantum Information Processing, 2018, 17(6): 129.

    [22] Zhang C, Razavi M, Sun Z W, et al. Multi-party quantum summation based on quantum teleportation [J]. Entropy, 2019, 21(7): 719.

    [23] Ji Z X, Zhang H G, Wang H Z, et al. Quantum protocols for secure multi-party summation [J]. Quantum Information Processing, 2019, 18(6): 168.

    [24] Weng P F, Chen H, Cai X X. Quantum secure direct communication scheme based on d dimensional Bell entangled state [J]. Chinese Journal of Quantum Electronics, 2017, 34(5): 603-607.

    [25] Lou X P, Tang W S, Ma H. A dual weak blind signature based on quantum entanglement swapping [J]. Chinese Journal of Quantum Electronics, 2019, 3(2): 174-181.

    [26] Deng F G, Li X H, Zhou H Y, et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack [J]. Physical Review A, 2005, 72: 044302.

    [27] Li X H, Deng F G, Zhou H Y. Improving the security of secure direct communication based on the secret transmitting order of particles [J]. Physical Review A, 2006, 74(5): 054302.

    CHANG Hong, WU Yiting, LIN Song. Quantum secure multiparty summation based on Bell states[J]. Chinese Journal of Quantum Electronics, 2021, 38(6): 830
    Download Citation