Font Size: a A A

Research On Quantum Secure Multiparty Computation Protocol

Posted on:2024-06-22Degree:MasterType:Thesis
Country:ChinaCandidate:J X XieFull Text:PDF
GTID:2530306920491654Subject:Mathematics
Abstract/Summary:PDF Full Text Request
Quantum secure multiparty computation,as a significant part of quantum cryptography,is a new field produced by the combination of quantum theory and classical secure multiparty computation.Compared with classical secure multiparty computation,quantum secure multiparty computation has higher security.With the development of quantum secure multiparty computation,there have been numerous research branches.In this thesis,we focus on the study of two of these branches: the quantum anonymous ranking and the quantum secure multiparty private set intersection cardinality and union cardinality,then constructs two protocols as follows.1.A quantum anonymous ranking protocol.With the help of a semi-honest third party,each party in the protocol participates in secure computation by manipulating its own particles,in order to obtain the ranking of private data while keeping its own private data safe.The protocol only uses the 2-dimensional single-particle states to transmit information,and uses single-qubit gates instead of complex multi-qubit gates during the protocol,which reduces the communication and computation cost of the protocol to a certain extent.The security of the protocol is verified through a variety of attack analysis.2.A quantum secure protocol for multiparty private set intersection cardinality and union cardinality.In the protocol,with the aid of a semi-honest third party,all participants cooperate to calculate the private set intersection cardinality and union cardinality simultaneously,and they don’t have to disclose their private data.The protocol uses the Bell state as the channel,and only requires single-qubit gates and Bell measurement,which improves the operability of the protocol.Through a variety of security analysis,it is proved that the protocol can resist common quantum attacks.
Keywords/Search Tags:Quantum cryptography, Quantum secure multiparty computation, Quantum anonymous ranking, Set intersection cardinality and union cardinality
PDF Full Text Request
Related items