Multi-party quantum summation without a trusted third party based on single particles

We propose multi-party quantum summation protocols based on single particles, in which participants are allowed to compute the summation of their inputs without the help of a trusted third party and preserve the privacy of their inputs. Only one participant who generates the source particles needs to perform unitary operations and only single particles are needed in the beginning of the protocols.

[1]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[2]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[3]  G. He Quantum key distribution based on orthogonal states allows secure quantum bit commitment , 2011, 1101.4587.

[4]  Qiaoyan Wen,et al.  An Efficient Protocol for the Secure Multi-party Quantum Summation , 2010 .

[5]  M. Żukowski,et al.  Secret sharing with a single d -level quantum system , 2015 .

[6]  Harry Buhrman,et al.  Complete insecurity of quantum protocols for classical two-party computation Buhrman, , 2012 .

[7]  Henryk Wozniakowski,et al.  Quantum Boolean Summation with Repetitions in the Worst-Average Setting , 2004 .

[8]  Fuguo Deng,et al.  Improving the security of secure direct communication based on the secret transmitting order of particles , 2006, quant-ph/0612016.

[9]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[10]  Erich Novak,et al.  On a problem in quantum summation , 2003, J. Complex..

[11]  Stefan Heinrich Quantum Summation with an Application to Integration , 2002, J. Complex..

[12]  Yi Mu,et al.  Secure Multiparty Quantum Computation for Summation and Multiplication , 2016, Scientific Reports.

[13]  Mario Berta,et al.  Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2012 .

[14]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[15]  Zhi-Wei Sun,et al.  Three-party quantum summation without a trusted third party , 2015 .

[16]  V. Karimipour,et al.  Quantum secret sharing and random hopping: Using single states instead of entanglement , 2015, 1506.02966.

[17]  Christian Kurtsiefer,et al.  Experimental single qubit quantum secret sharing. , 2005, Physical review letters.

[18]  A Cabello Quantum key distribution in the Holevo limit. , 2000, Physical review letters.

[19]  Hoi-Kwong Lo,et al.  Insecurity of Quantum Secure Computations , 1996, ArXiv.

[20]  V. Buzek,et al.  Towards quantum-based privacy and voting , 2005, quant-ph/0505041.

[21]  Dongyang Long,et al.  High-Capacity Quantum Summation with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom , 2014 .

[22]  N. Gisin,et al.  Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.