This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

\history

Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. 10.1109/ACCESS.2017.DOI

\tfootnote

This paragraph of the first footnote will contain support information, including sponsor and financial support acknowledgment. For example, “This work was supported in part by the U.S. Department of Commerce under Grant BS123456.”

\corresp

Corresponding author: Song Lin (e-mail: [email protected]). .

Quantum Secure Multi-party Summation Based on Entanglement Swapping

HONG CHANG 1,2       YITING WU1,2, GONGDE GUO1,2,3, AND SONG LIN, JR.1,2,3    National Institute of Standards and Technology, Boulder, CO 80305 USA (e-mail: [email protected]) Department of Physics, Colorado State University, Fort Collins, CO 80523 USA (e-mail: [email protected]) Electrical Engineering Department, University of Colorado, Boulder, CO 80309 USA
Abstract

In this paper, we present a quantum secure multi-party summation protocol, which allows multiple mutually distrustful parties to securely compute the summation of their secret data. In the presented protocol, a semitrusted third party is introduced to help multiple parties to achieve this secure task. Besides, the entanglement swapping of dd-level cat states and Bell states is employed to securely transmit message between each party and the semitrusted third party. At last, its security against some common attacks is analyzed, which shows that the presented protocol is secure in theory.

Index Terms:
Bell states, Cat states, Entanglement swapping, Quantum secure multi-party summation
\titlepgskip

=-15pt

I Introduction

Secure multi-party computing (SMC)[1, 2], which enables n(n2)n(n\geq 2) parties to jointly compute functions based on their private inputs while maintaining the confidentiality of privacy inputs. It is a major branch of modern cryptography, which is widely used in private auctions, secret ballot elections, e-commerce and data mining, and so on. The security of classical SMC is based on the assumption of computational complexity. However, it is increasingly vulnerable with the proposing of quantum algorithms, e.g., Grover search algorithm[3, 5]and Shor search algorithm[4, 6]. In the meanwhile, Bennett and Brassard proposed a theoretically unconditional secure key distribution protocol (BB84)[7] in 1984, which aroused people’s interest in extending classical SMC to the field of quantum mechanics. Recently, various quantum secure multiparty computing protocols have been proposed, such as quantum private query[8, 9, 10, 11], quantum private comparison[12, 13, 14, 15], quantum secure multiparty summation[19, 20].

Secure multi-party summation is a common secure task in real life, which can be described as follows. There are nn participants, and each participant has a secret data. They want to correctly calculate the summation of these inputs without revealing any information about the secret inputs. In 2007, Vaccaro etet alal first proposed a quantum secure multi-party summation protocol[21], which was used to implement the secure task of anonymous voting and survey. In this protocol, participants sent secret message to a trusted tallyman, who calculated and published the summation result. After that, Du etet alal. designed a quantum secret summation protocol [22]based on non-orthogonal single particles, which allows participants to accumulate their private data to an unknown number in a serial manner, so as to achieve the goal of secure multi-party summation. This protocol can resist the collusion attack of n1n-1 participants and achieve asymptotic security.

We propose a quantum secure multi-party summation (QSMMS) protocol. Multiple parties that do not trust each other can securely compute the summation of their secret data, while keeping their data private. To achieve this task, these particles of Bell states and cat states are transmitted between participants as signal particles. Eavesdropping detection ensures the security of the transmission of these particles. The secret data of participants are encrypted by entanglement swapping. Finally, a third party is introduced to help all participants obtain the calculation. Here, we require the third party to be semitrusted, that is, she is allowed to conduct herself improperly, but not to collude with either party.

The rest of this paper is organized as follows. Some preliminaries are introduced in Sect. 2. We devote Sect. 3 to present the proposed QSMMS protocol. The security of the proposed protocol is analyzed in Sect. 4. Finally, a short conclusion is provided in Sect. 5.

II Preliminaries

In a dd-level quantum system, the quantum Fourier transform[23] is a common tool, which can be described as follows,

F=1dj,k=0d1ξkj|jk|,F=\frac{1}{\sqrt{d}}\sum_{j,k=0}^{d-1}\xi^{kj}|j\rangle\langle k|, (1)

where ξ=e2πid\xi=e^{\frac{2\pi{\rm i}}{d}} and i=1{\rm i}=\sqrt{-1}. So, we can construct two common mutually unbiased bases, B1={|j,jD={0,1,,d1}}B_{1}=\{|j\rangle,j\in D=\{0,1,\cdots,d-1\}\} and B2={F|j,jD}B_{2}=\{F|j\rangle,j\in D\}, directly. Besides FF, XX and ZZ are other common operators,

X=1dj=0d1|j1j|,Z=1dj=0d1ξj|jj|,X=\frac{1}{\sqrt{d}}\sum_{j=0}^{d-1}|j\oplus 1\rangle\langle j|,\ Z=\frac{1}{\sqrt{d}}\sum_{j=0}^{d-1}\xi^{j}|j\rangle\langle j|, (2)

where sign \oplus represents the addition module dd. The dd-level Bell state is a generalization form of EPR pairs in dd-level system (qudits), which can be expressed as

|Φ(r,w)=1dj=0d1ξjr|j|jw,|\Phi(r,w)\rangle=\frac{1}{\sqrt{d}}\sum_{j=0}^{d-1}\xi^{jr}|j\rangle|j\oplus w\rangle, (3)

where r,wDr,w\in D. The state |Φ(r,w)|\Phi(r,w)\rangle can be generated through operations XX and ZZ on particles of |Φ(0,0)=1dj=0d1|j|j|\Phi(0,0)\rangle=\frac{1}{\sqrt{d}}\sum_{j=0}^{d-1}|j\rangle|j\rangle,

(IXwZr)|Φ(0,0)=1dj=0d1ξjr|j|jw=|Φ(r,w),(I\otimes X_{w}Z_{r})|\Phi(0,0)\rangle=\frac{1}{\sqrt{d}}\sum_{j=0}^{d-1}\xi^{jr}|j\rangle|j\oplus w\rangle=|\Phi(r,w)\rangle, (4)

where Zr=(Z)rZ_{r}=(Z)^{r}, Xw=(X)wX_{w}=(X)^{w}, and (X)0=(Z)0=I=|00|+|11|(X)^{0}=(Z)^{0}=I=|0\rangle\langle 0|+|1\rangle\langle 1|. Similarly, the dd-level cat states can be obtained, which can be described as follows,

|Ψ(u1,u2,,un)=1dj=0d1ξju1|j,ju2,ju3,,jun.|\Psi(u_{1},u_{2},\cdots,u_{n})\rangle=\frac{1}{\sqrt{d}}\sum_{j=0}^{d-1}\xi^{ju_{1}}|j,j\oplus u_{2},j\oplus u_{3},\cdots,j\oplus u_{n}\rangle. (5)

In the proposed protocol, the dd-level Bell states and the dd-level cat states are used as information carriers.

Entanglement swapping is an important tool in quantum information field. In this paper, we use entanglement swapping between a nn-particle cat state |Ψ(v,u,,u)|\Psi(v,u,\cdots,u)\rangle and nn Bell states |Φ(ri,wi)(i=1,2,,n)|\Phi(r_{i},w_{i})\rangle(i=1,2,\cdots,n). When we make a Bell state measurement on the cat state particle and one particle of each Bell state, the remaining particles collapse into an entangled state. Specifically, it can be expressed by the following formula.

|Ψ(v,u,,u)|Φ(r1,w1)|Φ(r2,w2)\displaystyle|\Psi(v,u,\cdots,u)\rangle\otimes|\Phi(r_{1},w_{1})\rangle\otimes|\Phi(r_{2},w_{2})\rangle\otimes\cdots
|Φ(rn,wn)=1dk,lξkl|Ψ(v~,u~1,u~2,,u~n)\displaystyle\otimes|\Phi(r_{n},w_{n})\rangle=\frac{1}{\sqrt{d}}\sum_{k,l}\xi^{-kl}|\Psi(\widetilde{v},\widetilde{u}_{1},\widetilde{u}_{2},\cdots,\widetilde{u}_{n})\rangle
|Φ(r~1,w~1)|Φ(r~n,w~n),\displaystyle\otimes|\Phi(\widetilde{r}_{1},\widetilde{w}_{1})\rangle\otimes\cdots\otimes|\Phi(\widetilde{r}_{n},\widetilde{w}_{n})\rangle, (6)

where

{v~=vi=1nkiu~i=wilir~i=rikiw~i=uli.\left\{\begin{array}[]{lr}\widetilde{v}=v\oplus\sum_{i=1}^{n}k_{i}&\\ \widetilde{u}_{i}=w_{i}\oplus l_{i}&\\ \widetilde{r}_{i}=r_{i}\ominus k_{i}&\\ \widetilde{w}_{i}=u\ominus l_{i}.\end{array}\right. (7)

where, sign \ominus represents the subtraction module dd. Eavesdroppers are unable to extract any useful information from the particles before and after the entanglement. Thus, we can secretly embed private data for encryption operations. In addition, cat state particles and Bell state particles have the following deterministic relationships.
Theorem 1:

An (n+1)(n+1)-qudit state is in the form of the state |Ψ(v,u,,u)|\Psi(v,u,\cdots,u)\rangle, when and only when it satisfies both the following two conditions:

(c1)when each of its qudits is measured in B1B_{1} basis, n+1n+1 measurement results satisfy k0u=k1=k2==knk_{0}\oplus u=k_{1}=k_{2}=\cdots=k_{n};

(c2)when each of its qudits is measured in B2B_{2} basis, n+1n+1 measurement results satisfy k0k1k2knv=0k_{0}\oplus k_{1}\oplus k_{2}\oplus\cdots\oplus k_{n}\oplus v=0. Theorem 1 is proved as follows:

Simple calculation shows that when n+1n+1 qudit is in state |Ψ|\Psi\rangle, each particle is measured with B1B_{1} or B2B_{2} basis, and the measurement results meet condition (c1) and (c2).

Now, let’s prove that if the state |Ω|\Omega\rangle satisfies condition (c1) and (c2), then |Ω=Ψ(v,u,,u)|\Omega\rangle=\Psi(v,u,\cdots,u)\rangle. From condition (c1), we can assume |Ω=1dj=0d1ξjv|j|ju|ju|\Omega\rangle=\frac{1}{\sqrt{d}}\sum_{j=0}^{d-1}\xi^{jv}|j\rangle|j\oplus u\rangle\cdots|j\oplus u\rangle, then

|Ω=XuIn|Ω\displaystyle|\Omega^{\prime}\rangle=X_{u}\otimes I^{n}|\Omega\rangle
=1dj=0d1λjXu|j|ju|ju\displaystyle=\frac{1}{\sqrt{d}}\sum_{j=0}^{d-1}\lambda_{j}X_{u}|j\rangle|j\oplus u\rangle\cdots|j\oplus u\rangle
=1dj=0d1λj|j|j|j\displaystyle=\frac{1}{\sqrt{d}}\sum_{j=0}^{d-1}\lambda_{j}|j\rangle|j\rangle\cdots|j\rangle (8)
\Figure

[t!](topskip=0pt, botskip=0pt, midskip=0pt)[width=4.7 in]2.png The graphical description of entanglement swapping between a dd-level nn-particle cat state and nn dd-level Bell states.

|Ω′′=F(n+1)|Ω1djλj(1dk0ξk0j|k0)\displaystyle|\Omega^{\prime\prime}\rangle=F^{\otimes(n+1)}|\Omega^{\prime}\rangle\frac{1}{\sqrt{d}}\sum_{j}\lambda_{j}(\frac{1}{\sqrt{d}}\sum_{k_{0}}\xi^{k_{0}j}|k_{0}\rangle)\otimes\cdots
(1dknξknj|kn)=1dn+22k0kn(jλjξ(k0+kn)j\displaystyle\otimes(\frac{1}{\sqrt{d}}\sum_{k_{n}}\xi^{k_{n}j}|k_{n}\rangle)=\frac{1}{d^{\frac{n+2}{2}}}\sum_{k_{0}\cdots k_{n}}(\sum_{j}\lambda_{j}\xi^{(k_{0}\oplus\cdots+k_{n})j}
|k0|kn.\displaystyle|k_{0}\rangle\cdots|k_{n}\rangle. (9)

where F=1dj,kξjk|jk|,Zt=1dj=0d1ξjt|jl|,Xt=1dj=0d1ξjt|jtj|F=\frac{1}{\sqrt{d}}\sum_{j,k}\xi^{jk}|j\rangle\langle k|,Z_{t}=\frac{1}{\sqrt{d}}\sum_{j=0}^{d-1}\xi^{jt}|j\rangle\langle l|,X_{t}=\frac{1}{\sqrt{d}}\sum_{j=0}^{d-1}\xi^{jt}|j\oplus t\rangle\langle j|. Because FXt=ZtFFX_{t}=Z_{t}F,

F(n+1)XuIn|Ω=ZuInF(n+1)|Ω.F^{\otimes(n+1)}X_{u}\otimes I^{n}|\Omega\rangle=Z_{u}\otimes I^{n}F^{\otimes(n+1)}|\Omega\rangle. (10)

Since ZuZ_{u} only changes the relative phase and does not change the measurement results of the calculation basis, then the measured results of of the state |Ω′′|\Omega^{\prime\prime}\rangle in the calculation basis must satisfy condition (c2), which can be obtained j=0d1λjξ(k0k1kn)j=0\sum_{j=0}^{d-1}\lambda_{j}\xi^{(k_{0}\oplus k_{1}\oplus\cdots\oplus k_{n})j}=0 when k0knv0k_{0}\oplus\cdots\oplus k_{n}\oplus v\neq 0; j=0d1λjξvj2=1d\sum_{j=0}^{d-1}\mid\lambda_{j}\xi^{-vj}\mid^{2}=\frac{1}{d} when k0knv=0k_{0}\oplus\cdots\oplus k_{n}\oplus v=0. Thus, we may get λj=1dξvj\lambda_{j}=\frac{1}{\sqrt{d}}\xi^{vj}. Now we have proved that

|Ω=1dj=0d1ξjv|j|ju|ju|Ψ(v,u,,u).\displaystyle|\Omega\rangle=\frac{1}{\sqrt{d}}\sum_{j=0}^{d-1}\xi^{jv}|j\rangle|j\oplus u\rangle\cdots|j\oplus u\rangle|\Psi(v,u,\cdots,u)\rangle. (11)

According to theorem 1, the particle can be guaranteed to be in state |Ψ(v,u,,u)|\Psi(v,u,\cdots,u)\rangle through condition (c1) and (c2). Since the Bell state is a special case of cat state, we can get a similar conclusion for the Bell state.
Corollary 1:

An 2-qudit state is in the form of the state |Φ(r,w)|\Phi(r,w)\rangle, when and only when is satisfies both the following two conditions:

(c1’)when each of its qudits is measured in B1B_{1} basis, n+1n+1 measurement results should satisfy a0=aia_{0}=a_{i};

(c2’)when each of its qudits is measured in B2B_{2} basis, the summation of the n+1n+1 measurement results should satisfy a0ai=0a_{0}\oplus a_{i}=0.

III The Proposed Protocol

In the proposed protocol, there are nn mutually distrustful parties labeled P1,P2,,PnP_{1},P_{2},\cdots,P_{n}. Each party Pi(i=1,2,,n)P_{i}(i=1,2,\cdots,n) has a secret dataset Di={xi1,xi2,,xim}D_{i}=\{x^{1}_{i},x^{2}_{i},\cdots,x^{m}_{i}\}. We set S={xij|xijN,0xijd1,i=1,2,,n,j=1,2,,m}S=\{x^{j}_{i}|x^{j}_{i}\in N,0\leq x^{j}_{i}\leq d-1,i=1,2,\cdots,n,j=1,2,\cdots,m\}, and then we have dd ¿ sup{S}. P1,P2,,PnP_{1},P_{2},\cdots,P_{n} want to jointly compute the summation i=1nxij\bigoplus_{i=1}^{n}x^{j}_{i} with the assistance of a semitrusted third party ( TP), who is allowed to misbehave on her own but cannot conspire with others. Now let us describe steps of the proposed protocol in detail.

(𝟏)\mathbf{(1)} Each party Pi(i=1,2,,n)P_{i}(i=1,2,\cdots,n) prepares L+σL+\sigma copies of dd-level Bell state.

|Φ(0,0)=1da=0d1|ahij|atij.|\Phi(0,0)\rangle=\frac{1}{\sqrt{d}}\sum_{a=0}^{d-1}|a\rangle_{h^{j}_{i}}|a\rangle_{t^{j}_{i}}. (7)

Here, the subscripts hijh^{j}_{i} and tijt^{j}_{i} denote two different qudits of a entangled pair, and j(j=1,2,,L+σ)j(j=1,2,\cdots,L+\sigma) indicates the order of the entangled pairs. PiP_{i} takes particles hijh^{j}_{i} and tijt^{j}_{i} from each pair to form two ordered particle sequences Hi=(hi1,hi2,,hiL+σ)H_{i}=(h^{1}_{i},h^{2}_{i},\cdots,h^{L+\sigma}_{i}) and Ti=(ti1,ti2,,tiL+σ)T_{i}=(t^{1}_{i},t^{2}_{i},\cdots,t^{L+\sigma}_{i}). TP prepares L+nδL+n\delta copies of dd-level cat state |Ψ(vj,uj,uj,,uj)s0js1jsnj|\Psi(v^{j},u^{j},u^{j},\cdots,u^{j})\rangle_{s^{j}_{0}s^{j}_{1}\cdots s^{j}_{n}}, then takes particle sijs^{j}_{i} from each cat state |Ψ(vj,uj,uj,,uj)|\Psi(v^{j},u^{j},u^{j},\cdots,u^{j})\rangle to construct n+1n+1 ordered sequences S0=(s01,s02,,s0L+nδ)S_{0}=(s^{1}_{0},s^{2}_{0},\cdots,s^{L+n\delta}_{0}), S1=(s11,s12,,s1L+nδ)S_{1}=(s^{1}_{1},s^{2}_{1},\cdots,s^{L+n\delta}_{1}) ,,Sn=(sn1,sn2,,snL+nδ)\cdots,S_{n}=(s^{1}_{n},s^{2}_{n},\cdots,s^{L+n\delta}_{n}), where the superscript j(j=1,2,,L+nδ)j(j=1,2,\cdots,L+n\delta), represents the order of the copies.

(𝟐)\mathbf{(2)} TP remains particle sequence S0S_{0} in her own hands, then sends particle sequence SiS_{i} to PiP_{i}. Meantime, PiP_{i} sends particle sequence TiT_{i} to TP, and remains particle sequence HiH_{i}. The above particles transmission process is shown in Figure 2.

\Figure

[t!](topskip=0pt, botskip=0pt, midskip=0pt)[width=2.5 in]3.png The distribution process of TP and PiP_{i}.

(𝟑)\mathbf{(3)} After both TP and participants confirm receiving the particle sequences, the n+1n+1 parties (TP and nn participants) cooperate to execute the following two eavesdropping detections.
Detection 1:

First, PiP_{i} randomly chooses δ\delta qudits from SiS_{i} as samples. For each sample particle, PiP_{i} measures it randomly in B1B_{1} basis or B2B_{2} basis. Then PiP_{i} requires TP and the other n1n-1 participants to measure the corresponding qudits in their hands with the same basis. After that, TP announces initial states of sample particles and her measurement result k0k_{0}, then n1n-1 participants announce their measurement results in a random order. According to the announced messages, PiP_{i} can check whether the measurement results satisfy the conditions (c1) and (c2). In this way, PiP_{i} can calculate the error rate. Once the error rate is higher than a certain threshold, he will abort the protocol. Otherwise, he will continue.
Detection 2:

First, TP randomly chooses σ\sigma qudits from TiT_{i} as samples. For each sample particle, TP measures it randomly in B1B_{1} basis or B2B_{2} basis. Then TP requires all PiP_{i} to measure the corresponding qudits with the same basis. After that, each PiP_{i} announces his measurement to TP. According to announced messages, TP can check whether the measurement results satisfy the conditions (c1’) and (c2’).

In this way, TP can calculate the error rate, once the error rate is higher than a certain threshold, she will abort the protocol. Otherwise, she will continue.

(𝟒)\mathbf{(4)} PiP_{i} encodes his secret dataset. Concretely, PiP_{i} randomly generates two variables rijr^{j}_{i} and wijw^{j}_{i} and requires them to meet the condition xij=rijwijx^{j}_{i}=r^{j}_{i}\oplus\ w^{j}_{i}. PiP_{i} performs ZrijXwijZ_{r^{j}_{i}}\otimes X_{w^{j}_{i}} operation on the Bell state |Φ(0,0)|\Phi(0,0)\rangle. Therefore, the Bell state changes from |Φ(0,0)|\Phi(0,0)\rangle to |Φ(rij,wij)=1dt=0d1ξtrij|t|twij.|\Phi(r^{j}_{i},w^{j}_{i})\rangle=\frac{1}{\sqrt{d}}\sum_{t=0}^{d-1}\xi^{tr^{j}_{i}}|t\rangle|t\oplus\ w^{j}_{i}\rangle.

(𝟓)\mathbf{(5)} Each participant PiP_{i} performs the Bell state measurement on particle sijs^{j}_{i} and particle hijh^{j}_{i}. In this case, the particles s0j,t1j,t2j,,tnjs^{j}_{0},t^{j}_{1},t^{j}_{2},\cdots,t^{j}_{n} collapse to a cat state. After that, TP measures this cat state.

(𝟔)\mathbf{(6)} After the entanglement swapping, the Bell state of PiP_{i} becomes |Φ(r~ij,w~ij)|\Phi(\widetilde{r}^{j}_{i},\widetilde{w}^{j}_{i})\rangle, where r~ij=rijkij\widetilde{r}^{j}_{i}=r^{j}_{i}\ominus k^{j}_{i} , w~ij=uilij\widetilde{w}^{j}_{i}=u_{i}\ominus l^{j}_{i}. Then, PiP_{i} calculates

qij=r~ijw~ij=rijkijuilijq^{j}_{i}=\widetilde{r}^{j}_{i}\oplus\widetilde{w}^{j}_{i}=r^{j}_{i}\ominus k^{j}_{i}\oplus u_{i}\ominus l^{j}_{i} (8)

and announces classical information qijq^{j}_{i} to TP.

(𝟕)\mathbf{(7)} After the entanglement swapping, the cat state of TP becomes
|Ψ(v~j,u~1j,u~2j,,u~nj)|\Psi(\widetilde{v}^{j},\widetilde{u}^{j}_{1},\widetilde{u}^{j}_{2},\cdots,\widetilde{u}^{j}_{n})\rangle, where v~j=vji=1nkij\widetilde{v}^{j}=v^{j}\oplus\sum^{n}_{i=1}k^{j}_{i}, u~ij=wijlij\widetilde{u}^{j}_{i}=w^{j}_{i}\oplus l^{j}_{i}. Then, TP carries out simple calculations and gets

v~ji=1nu~iji=1nqijvjnuj=i=1nriji=1nwij=i=1nxij\widetilde{v}^{j}\oplus\sum_{i=1}^{n}\widetilde{u}^{j}_{i}\oplus\sum_{i=1}^{n}q^{j}_{i}\ominus v^{j}\ominus nu^{j}=\sum_{i=1}^{n}r^{j}_{i}\oplus\sum_{i=1}^{n}w^{j}_{i}=\sum_{i=1}^{n}x^{j}_{i} (9)

Finally, TP announces the summation to PiP_{i}.

Let us consider a simple case as an example to demonstrate the correctness of the presented protocol. Suppose that there are three participants P1P_{1}, P2P_{2}, and P3P_{3}, who have three private datasets D1={1,3}D_{1}=\{1,3\}, D2={3,6}D_{2}=\{3,6\} and D3={2,5}D_{3}=\{2,5\}, respectively. Thus, we can assume that d=7>6d=7>6. For simplicity, we ignore the eavesdropping checks. Therefore, in step 1, every Pi(i=1,2,3)P_{i}(i=1,2,3) prepares four copies of dd-level Bell state |Φ(0,0)|\Phi(0,0)\rangle, and TP prepares four copies of dd-level cat state |Ψ1(4,1,1,1),|Ψ2(3,2,2,2),|Ψ3(2,5,5,5)|\Psi^{1}(4,1,1,1)\rangle,|\Psi^{2}(3,2,2,2)\rangle,|\Psi^{3}(2,5,5,5)\rangle and |Ψ4(6,3,3,3)|\Psi^{4}(6,3,3,3)\rangle. Every Pi(i=1,2,3)P_{i}(i=1,2,3) takes particle hijh^{j}_{i} and tijt^{j}_{i} from each Bell state to form two ordered particle sequences HiH_{i} and TiT_{i}. TP takes particle sijs^{j}_{i} from each cat state to construct four ordered sequences S0=(4,3,2,6),S1=(1,2,5,3),S2=(1,2,5,3),S3=(1,2,5,3)S_{0}=(4,3,2,6),S_{1}=(1,2,5,3),S_{2}=(1,2,5,3),S_{3}=(1,2,5,3).

TABLE I: The proposed protocol in the example.
ii jj xijx_{i}^{j} rijr_{i}^{j} wijw_{i}^{j} |Φ|\Phi\rangle kijk_{i}^{j} lijl_{i}^{j} |Φ|\Phi^{{}^{\prime}}\rangle qijq_{i}^{j}
1 1 1 1 0 (1,0) 1 1 (0,1) 1
1 2 3 2 1 (2,1) 1 0 (1,2) 3
2 1 3 1 2 (1,2) 0 1 (1,0) 1
2 2 6 4 2 (4,2) 3 1 (1,1) 2
3 1 2 0 2 (0,2) 0 0 (0,1) 1
3 2 5 3 2 (3,2) 1 0 (2,2) 4

The concrete value of each variable are shown in Table 1, and the new Bell states and qijq_{i}^{j} can be obtained after the entanglement swapping.

In step 7, the specific calculation results are shown in Table 2. It can be seen from this example that the results obtained by TP are correct.

TABLE II: The proposed protocol in the example.
j |Ψ|\Psi\rangle v~j\widetilde{v}^{j} u~1j\widetilde{u}_{1}^{j} u~2j\widetilde{u}_{2}^{j} u~3j\widetilde{u}_{3}^{j} |Ψ|\Psi^{{}^{\prime}}\rangle i=13xij\sum^{3}_{i=1}x_{i}^{j}
1 (4,1,1,1) 5 0 3 2 (5,0,3,2) 6
2 (3,2,2,2) 1 1 3 2 (1,1,3,2) 0

IV Security analysis

In the following, we analyze the security of the proposed protocol. The security of every quantum channel between TP and participants is ensured by an eavesdropping-check process. Thus, it is evident that stealing information directly is not feasible. An inside attacker is more powerful than an outside attacker. Thus, we focus our attention on the security of protocol against the inside attacks. In addition to dishonest participants, TP is not fully trusted, and she may also steal secret inputs. Thus, two types of attacks will be discussed: attack by dishonest participants and attack by the semitrusted TP.

A.Attack by dishonest participants

In this attack, we will assume that PmP_{m} (referred to as PmP^{*}_{m}) is dishonest and wishes to eavesdrop on all or partial information about PlP_{l}’s private data. He can perform one of two common attack strategies to attack the proposed protocol in this article, which are described as follows.

Case 1: Intercept-resend attack

In Step 2, TP transmits sequence SlS_{l} to PlP_{l}, PlP_{l} transmits sequence TlT_{l} to TP. Thus, PmP^{*}_{m} can utilize this opportunity to execute his attack action. Concretely, PmP^{*}_{m} prepares several fake particles and replaces the signal particles with these fake particles. First, let’s analyze the case where TP transmits sequence SiS_{i} to PiP_{i}. When sequence SlS_{l}, which contains partial information about PlP_{l}, is transmitted in Step 2, PmP^{*}_{m} intercepts this particle sequence. After interception, PmP^{*}_{m} can obtain the value of uu in the calculation in Step 6 by measuring the sequence SlS_{l}. However, this action can be detected in Detection 1. Therefore, the attack will fail. Next, let’s analyze the other case where PiP_{i} transmits sequence TiT_{i} to TP. Similarly, when sequence TlT_{l} is transmitted in Step 2, PmP^{*}_{m} intercepts and measures this particle sequence. After then, PmP^{*}_{m} can obtain the value of wljw^{j}_{l} in the calculation in Step 6. However, this action can be detected in Detection 2. Therefore, the attack will fail, too. Consequently, this protocol is secure against intercept-resend attack.

Case 2: Entangle-ancilla attack

In this attack, let’s first analyze the case where PiP_{i} transmits sequence TiT_{i} to TP. Before PlP_{l} sends sequence TlT_{l} to TP, PmP^{*}_{m} prepares an ancilla and performs a certain unitary operation on this ancillary particle and the transmitted particle in the sequence TlT_{l}, which causes the two particles to become entangled. At the end of the protocol, he may utilize this ancilla to eavesdrop on all or some of the information about PlP_{l}. In the following, we will show that even if he has unlimited computing power, with technology limited only by the laws of quantum mechanics, PmP^{*}_{m} cannot obtain any information about PlP_{l}’s secret input under the condition that no errors are to occur in Detection 2.

We can write the most general operation that PmP^{*}_{m} could apply to tljt^{j}_{l} particle in sequence TlT_{l} (particle T) and the ancilla (particle E) as follows:

U:|fT|0Eg=0d1|gT|εf,gE\displaystyle U:|f\rangle_{T}|0\rangle_{E}\rightarrow\sum^{d-1}_{g=0}|g\rangle_{T}|\varepsilon_{f,g}\rangle_{E} (14)

where fDf\in D. The states |εf,g|\varepsilon_{f,g}\rangle are pure ancilla states that are uniquely determined by U. The following conditions can be derived from the unitary nature of U:

g=0d1(|εf,g,|εf,g)=δf,f\displaystyle\sum^{d-1}_{g=0}(|\varepsilon_{f,g}\rangle,|\varepsilon_{f^{\prime},g}\rangle)=\delta_{f,f^{\prime}} (15)

where f,fD,δf,f=0(f,f^{\prime}\in D,\delta_{f,f^{\prime}}=0(or 1)1) when ff(f\neq f^{\prime}(or f=f)f=f^{\prime}).

After P3P^{*}_{3} performs U operation the quantum system composed of particle H, particle T and particle E will be in the state,

|Δ\displaystyle|\Delta\rangle =U1df=0d1|fH|fT|0E\displaystyle=U\frac{1}{\sqrt{d}}\sum^{d-1}_{f=0}|f\rangle_{H}|f\rangle_{T}|0\rangle_{E}
=1dk=fg=0d1(f=0d1|f|fk|εf,fk)HTE.\displaystyle=\frac{1}{\sqrt{d}}\sum^{d-1}_{k=f\oplus g=0}(\sum^{d-1}_{f=0}|f\rangle|f\oplus k\rangle|\varepsilon_{f,f\oplus k}\rangle)_{HTE}. (16)

In Detection 2, we can get from Eq.(L’1)

f=0d1|f|fk|εf,fk=0,\displaystyle\sum^{d-1}_{f=0}|f\rangle|f\oplus k\rangle|\varepsilon_{f,f\oplus k}\rangle=\overrightarrow{0}, (17)

where k=1,2,,d1k=1,2,\cdots,d-1.

According to Eqs.(16) and (17), we can further obtain

|Δ\displaystyle|\Delta\rangle =1dk=fg=0d1(f=0d1|f|fk|εf,fk)\displaystyle=\frac{1}{\sqrt{d}}\sum^{d-1}_{k=f\oplus g=0}(\sum^{d-1}_{f=0}|f\rangle|f\oplus k\rangle|\varepsilon_{f,f\oplus k}\rangle)
=1df=0d1|f|f|εf,f.\displaystyle=\frac{1}{\sqrt{d}}\sum^{d-1}_{f=0}|f\rangle|f\rangle|\varepsilon_{f,f}\rangle. (18)

When PiP_{i} and TP measure particles with B2B_{2} basis, the state of the system can be written as

FF|Δ=F1df=0d1|f|f|εf,f\displaystyle F\otimes F|\Delta\rangle=F\otimes\frac{1}{\sqrt{d}}\sum^{d-1}_{f=0}|f\rangle|f\rangle|\varepsilon_{f,f}\rangle
=1dk=0yHfξfyHf(kyH)|yH|kyH)|εf,f.\displaystyle=\frac{1}{\sqrt{d}}\sum_{k=0}\sum_{y_{H}}\sum_{f}\xi^{fy_{H}\oplus f(k\ominus y_{H})}|y_{H}\rangle|k\ominus y_{H}\rangle)|\varepsilon_{f,f}\rangle. (19)

We get from Eq.(L’2)

yHfξfyHf(kyH)|yH|kyH)|εf,f=0.\displaystyle\sum_{y_{H}}\sum_{f}\xi^{fy_{H}\oplus f(k\ominus y_{H})}|y_{H}\rangle|k\ominus y_{H}\rangle)|\varepsilon_{f,f}\rangle=\overrightarrow{0}. (20)

where k=1,2,,d1k=1,2,\cdots,d-1. Then,

fξfk|εf,f=0.\displaystyle\sum_{f}\xi^{fk}|\varepsilon_{f,f}\rangle=\overrightarrow{0}. (21)

After a simple calculation, we can get

|ε0,0=|ε1,1==|εd1,d1.\displaystyle|\varepsilon_{0,0}\rangle=|\varepsilon_{1,1}\rangle=\cdots=|\varepsilon_{d-1,d-1}\rangle. (22)

From Eqs.(20),(21) and (22) we can derive

FF1df=0d1|f|f|εf,f=1df=0d1F|fF|f|ε,\displaystyle F\otimes F\frac{1}{\sqrt{d}}\sum^{d-1}_{f=0}|f\rangle|f\rangle|\varepsilon_{f,f}\rangle=\frac{1}{\sqrt{d}}\sum^{d-1}_{f=0}F|f\rangle F|f\rangle\otimes|\varepsilon\rangle, (23)

where |ε|\varepsilon\rangle is independent of |f|f\rangle.

Above we have deduced PmP^{*}_{m} successful eavesdropping conditions. When PmP^{*}_{m} entangles an ancilla particle on a particle T, the probability that ff is equal to gg is 1d\frac{1}{d}. When a sequence has nn particles, the probability that ff is equal to gg is (1d)n(\frac{1}{d})^{n}. As nn tends to infinity, the probability of PmP^{*}_{m} successful eavesdropping tends to 0.

For analysis of PmP^{*}_{m} eavesdropping SlS_{l}, see Appendix 1.

B.Attack by the semitrusted TP

Now, we will discuss the case in which TP attempts to eavesdrop on private data. In the proposed protocol, TP is allowed to behave improperly, but she cannot conspire with other participants. To get useful information about a participant, TP must get rr and ww of the participant without introducing any errors into the detection. If TP implements the protocol honestly, then she can obtain vjv^{j}, uju^{j}, and wijw_{i}^{j} by measurement in step 2 before entanglement swapping. After entanglement swapping, in step 6, due to the publication of PiP_{i} , TP can know qijq_{i}^{j}, namely, r~ijw~ij\widetilde{r}_{i}^{j}\oplus\widetilde{w}_{i}^{j}. In step 7, she can obtain v~j\widetilde{v}^{j} and u~ij\widetilde{u}_{i}^{j} by measurement after entanglement swapping. At the end of the protocol, she also can knowi=1nxij\sum^{n}_{i=1}x^{j}_{i} . Even if TP knew so much information, it could not eavesdrop on the value of rijwijr^{j}_{i}\oplus w^{j}_{i}. If TP adopts intercept-resend attack and entangle-ancilla attack , the analysis results are the same as above.

V Summary and Conclusion

Before giving a conclusion, we first compare and analyze the proposed with other QMS protocols. In order to highlight the advantages of the proposed protocol more intuitively, we make the following comparisons. Please refer to Table 3 for detailed comparison results. First, several QSMS algorithms were proposed in quantum anonymous voting and surveying protocols in order to calculate the summation of some private data including binary numbers and integers[24]. In 2005, Hillery et al. proposed a QSMS algorithm in their quantum anonymous voting protocol, in which each number is 0 or 1. In 2007, Vaccaro et al. proposed another QSMS algorithm for calculating the summation of nn integers, where nn denotes the number of parties (voters) in their quantum anonymous surveying protocol, in which a (n1)(n-1)-particle entangled state is employed. Each party makes a vote by performing a phase-shifting operation on its respective particles[25]. Then all parties send their particles to the tallyman who is responsible for counting the votes (i.e., calculating the summation of nn integers).

TABLE III: The comparion among proposed protocol and Refs.[24,25]
Protocol Information carriers User’s operations Data type
proposed protocol cat states and Bell states Single operations Nonnegative integer
Refs.[24] Cat states and Bell states Single operations Binary number
Refs.[25] N-particle entangled states Phase-shifting operation Integer

From Table 2, we can clearly find the advantages of the proposed protocol. In addition, even if the eavesdropper escaped all detection risks, he would still not have access to useful information.

In the proposed protocol, we propose a QMS protocol that allows multiple parties to securely compute the summation of their secret data. The special feature of the proposed protocol is employing entanglement swapping between cat states and Bell states to encode secret data. The proposed protocols use entanglement swapping between cat states and Bell states to securely transmit message between each party and TP. It is worthy pointing that all parties employ unitary operation to encode their secret data, and generate Bell states. With the help of the semitrusted TP, they can obtain the summation successfully at the end of the protocol.

Acknowledgment

This work is partially supported by Fujian Normal University.

References

  • [1] A. C. Yao, “Protocols for Secure Computations,”Foundations of Computer Science, 1982, 160-164.
  • [2] C. Lovis, “Privacy-preserving Analysis of Distributed Biomedical Data: Designing Efficient and Secure Multiparty Computations Using Distributed Statistical Learning Theory,” JMIR Medical Informatics, 2019,7(2).
  • [3] K. H. Yee, Y. K. Hyuk, B. Jeongho, et al., “Speedup of Grover’s Search Algorithm and Closed Timelike Curves,”Quantum Science and Technology, 2020,5(4):045011.
  • [4] W. Arya, A. Anthony, W. A. Wahyu, “Web-app Realization of Shor’s Quantum Factoring Algorithm and Grover’s Quantum Search Algorithm,” TELKOMNIKA, 2020,18(3).
  • [5] D. Fernandes, I. Dutra,“Inês Dutra. Using Grover’s Search Quantum Algorithm to Solve Boolean Satisfiability Problems: Part I,” XRDS: Crossroads, The ACM Magazine for Students, 2019,26(1).
  • [6] P. R. Giri, V. E. Korepin, “ A Review on Quantum Search Algorithms,” Quantum Information Processing, 2017,16(12).
  • [7] F. Gao, S. J. Qin, W. Huang, Q. Y. Wen, “Quantum Private Query: A New Kind of Practical Quantum Cryptographic Protocol,” Science China Physics,Mechanics and Astronomy, 2019,62(07):10-21.
  • [8] Y. Wang, F.Z. Guo, L. Liu, et al., “A New Protocol for Quantum Private Query Against Joint-Measurement Attack,”International Journal of Theoretical Physics, 2019,58(6):1828-1835.
  • [9] T.R. Pei, X.L. Meng, C.Y. Wei, et al., “Practical Quantum Private Query of Blocks Based on the Two-dimensional QKD System,” Quantum Information Processing,2019,18(8):1-13.
  • [10] “Information Technology,Study Results from Chengdu University of Information and Technology Provide New Insights into Information Technology (Practical Quantum Database Private Query Protocol With Classical Database Owner),” Journal of Physics Research, 2020.
  • [11] B. Liu, D. Xiao , W. Huang, et al., “Quantum Private Comparison Employing Single-photon Interference,” Quantum Information Processing, 2017,16(7).
  • [12] Z. X. Ji, P. R. Fan, H. G. Zhang, H. Z. “Cryptanalysis and improvement of several quantum private comparison protocols,” Communications in Theoretical Physics, 2020,72(08):59-64.
  • [13] L. Z. Jiang, “Semi-quantum private comparisonbased on Bell states,”Quantum Information Processing, 2020,19(1).
  • [14] Y. F. Lang, “Quantum Gate-Based Quantum Private Comparison,” International Journal of Theoretical Physics, 2020,59(3).
  • [15] Y. H. Yang, F. Gao, X. Wu, et al., “Quantum Secret Sharing via Local Operations and Classical Communication,” Scientific Reports,2015,5(1).
  • [16] L. Hong, J. Pieprzyk, L. Pan, “Analysis of weighted quantum secret sharing based on matrix product states,” Quantum Information Processing,2020,19(12).
  • [17] Z. K. Gao,Z. H. Li, “Deterministic Measurement-device-independent Quantum Secret Sharing,” Science China Physics,Mechanics and Astronomy, 2020,63(12):76-83.
  • [18] S. Kartick, O. Har, “Hybrid Quantum Protocols for Secure Multiparty Summation and Multiplication,” Scientific Reports, 2020,10(1):9097.
  • [19] W. Liu,Y. B. Wang, W. Q,“ An Novel Protocol for the Quantum Secure Multi-Party Summation Based on Two-Particle Bell States,” International Journal of Theoretical Physics, 2017,56(9):2783-2791.
  • [20] J. A. Vaccaro, J. Spring, Chefles, “Quantum Protocols for Anonymous Voting and Surveying,” Phys.Rev.A, 2007,75(1):012333.
  • [21] J. Z. Du, X. B. Chen,Q. Y. Wen, F. C. Zhu, “Secure Multipartite Quantum Summation,” Journal of Physics, 2007,(11):6214-6219.
  • [22] Z. X. Ji, H. G. Zhang, H. Z. Wang, F. S. Wu,J. W. Jia,W. Q. Wu,“Quantum Protocols for Secure Multi-party Summation,” Quantum Inf. Process, 2019,18(6).
  • [23] A. Shakeel,“Efficient and Scalable Quantum Walk Algorithms via the Quantum Fourier Transform,” Quantum Information Processing, 2020,19(9).
  • [24] J. A. Vaccaro, J. Spring,A. Chefles, “Quantum Protocols for Anonymous Voting and Surveying,” Phys.Rev.A, 2007,75(1):012333.
  • [25] M. Hillery, M. Ziman, V. Buek, M. Bielikova, “Towards Quantum-based Privacy and Voting,” Physics Letters A, 2006,349(1):75-81.
\EOD