Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. 10.1109/ACCESS.2017.DOI
This paragraph of the first footnote will contain support information, including sponsor and financial support acknowledgment. For example, “This work was supported in part by the U.S. Department of Commerce under Grant BS123456.”
Corresponding author: Song Lin (e-mail: [email protected]). .
Quantum Secure Multi-party Summation Based on Entanglement Swapping
Abstract
In this paper, we present a quantum secure multi-party summation protocol, which allows multiple mutually distrustful parties to securely compute the summation of their secret data. In the presented protocol, a semitrusted third party is introduced to help multiple parties to achieve this secure task. Besides, the entanglement swapping of -level cat states and Bell states is employed to securely transmit message between each party and the semitrusted third party. At last, its security against some common attacks is analyzed, which shows that the presented protocol is secure in theory.
Index Terms:
Bell states, Cat states, Entanglement swapping, Quantum secure multi-party summation=-15pt
I Introduction
Secure multi-party computing (SMC)[1, 2], which enables parties to jointly compute functions based on their private inputs while maintaining the confidentiality of privacy inputs. It is a major branch of modern cryptography, which is widely used in private auctions, secret ballot elections, e-commerce and data mining, and so on. The security of classical SMC is based on the assumption of computational complexity. However, it is increasingly vulnerable with the proposing of quantum algorithms, e.g., Grover search algorithm[3, 5]and Shor search algorithm[4, 6]. In the meanwhile, Bennett and Brassard proposed a theoretically unconditional secure key distribution protocol (BB84)[7] in 1984, which aroused people’s interest in extending classical SMC to the field of quantum mechanics. Recently, various quantum secure multiparty computing protocols have been proposed, such as quantum private query[8, 9, 10, 11], quantum private comparison[12, 13, 14, 15], quantum secure multiparty summation[19, 20].
Secure multi-party summation is a common secure task in real life, which can be described as follows. There are participants, and each participant has a secret data. They want to correctly calculate the summation of these inputs without revealing any information about the secret inputs. In 2007, Vaccaro first proposed a quantum secure multi-party summation protocol[21], which was used to implement the secure task of anonymous voting and survey. In this protocol, participants sent secret message to a trusted tallyman, who calculated and published the summation result. After that, Du . designed a quantum secret summation protocol [22]based on non-orthogonal single particles, which allows participants to accumulate their private data to an unknown number in a serial manner, so as to achieve the goal of secure multi-party summation. This protocol can resist the collusion attack of participants and achieve asymptotic security.
We propose a quantum secure multi-party summation (QSMMS) protocol. Multiple parties that do not trust each other can securely compute the summation of their secret data, while keeping their data private. To achieve this task, these particles of Bell states and cat states are transmitted between participants as signal particles. Eavesdropping detection ensures the security of the transmission of these particles. The secret data of participants are encrypted by entanglement swapping. Finally, a third party is introduced to help all participants obtain the calculation. Here, we require the third party to be semitrusted, that is, she is allowed to conduct herself improperly, but not to collude with either party.
The rest of this paper is organized as follows. Some preliminaries are introduced in Sect. 2. We devote Sect. 3 to present the proposed QSMMS protocol. The security of the proposed protocol is analyzed in Sect. 4. Finally, a short conclusion is provided in Sect. 5.
II Preliminaries
In a -level quantum system, the quantum Fourier transform[23] is a common tool, which can be described as follows,
(1) |
where and . So, we can construct two common mutually unbiased bases, and , directly. Besides , and are other common operators,
(2) |
where sign represents the addition module . The -level Bell state is a generalization form of EPR pairs in -level system (qudits), which can be expressed as
(3) |
where . The state can be generated through operations and on particles of ,
(4) |
where , , and . Similarly, the -level cat states can be obtained, which can be described as follows,
(5) |
In the proposed protocol, the -level Bell states and the -level cat states are used as information carriers.
Entanglement swapping is an important tool in quantum information field. In this paper, we use entanglement swapping between a -particle cat state and Bell states . When we make a Bell state measurement on the cat state particle and one particle of each Bell state, the remaining particles collapse into an entangled state. Specifically, it can be expressed by the following formula.
(6) |
where
(7) |
where, sign represents the subtraction module . Eavesdroppers are unable to extract any useful information from the particles before and after the entanglement. Thus, we can secretly embed private data for encryption operations. In addition, cat state particles and Bell state particles have the following deterministic relationships.
Theorem 1:
An -qudit state is in the form of the state , when and only when it satisfies both the following two conditions:
(c1)when each of its qudits is measured in basis, measurement results satisfy ;
(c2)when each of its qudits is measured in basis, measurement results satisfy . Theorem 1 is proved as follows:
Simple calculation shows that when qudit is in state , each particle is measured with or basis, and the measurement results meet condition (c1) and (c2).
Now, let’s prove that if the state satisfies condition (c1) and (c2), then . From condition (c1), we can assume , then
(8) |
[t!](topskip=0pt, botskip=0pt, midskip=0pt)[width=4.7 in]2.png The graphical description of entanglement swapping between a -level -particle cat state and -level Bell states.
(9) |
where . Because ,
(10) |
Since only changes the relative phase and does not change the measurement results of the calculation basis, then the measured results of of the state in the calculation basis must satisfy condition (c2), which can be obtained when ; when . Thus, we may get . Now we have proved that
(11) |
According to theorem 1, the particle can be guaranteed to be in state through condition (c1) and (c2). Since the Bell state is a special case of cat state, we can get a similar conclusion for the Bell state.
Corollary 1:
An 2-qudit state is in the form of the state , when and only when is satisfies both the following two conditions:
(c1’)when each of its qudits is measured in basis, measurement results should satisfy ;
(c2’)when each of its qudits is measured in basis, the summation of the measurement results should satisfy .
III The Proposed Protocol
In the proposed protocol, there are mutually distrustful parties labeled . Each party has a secret dataset . We set , and then we have ¿ sup{S}. want to jointly compute the summation with the assistance of a semitrusted third party ( TP), who is allowed to misbehave on her own but cannot conspire with others. Now let us describe steps of the proposed protocol in detail.
Each party prepares copies of -level Bell state.
(7) |
Here, the subscripts and denote two different qudits of a entangled pair, and indicates the order of the entangled pairs. takes particles and from each pair to form two ordered particle sequences and . TP prepares copies of -level cat state , then takes particle from each cat state to construct ordered sequences , ,, where the superscript , represents the order of the copies.
TP remains particle sequence in her own hands, then sends particle sequence to . Meantime, sends particle sequence to TP, and remains particle sequence . The above particles transmission process is shown in Figure 2.
[t!](topskip=0pt, botskip=0pt, midskip=0pt)[width=2.5 in]3.png The distribution process of TP and .
After both TP and participants confirm receiving the particle sequences, the parties (TP and participants) cooperate to execute the following two eavesdropping detections.
Detection 1:
First, randomly chooses qudits from as samples. For each sample particle, measures it randomly in basis or basis. Then requires TP and the other participants to measure the corresponding qudits in their hands with the same basis. After that, TP announces initial states of sample particles and her measurement result , then participants announce their measurement results in a random order. According to the announced messages, can check whether the measurement results satisfy the conditions (c1) and (c2). In this way, can calculate the error rate. Once the error rate is higher than a certain threshold, he will abort the protocol. Otherwise, he will continue.
Detection 2:
First, TP randomly chooses qudits from as samples. For each sample particle, TP measures it randomly in basis or basis. Then TP requires all to measure the corresponding qudits with the same basis. After that, each announces his measurement to TP. According to announced messages, TP can check whether the measurement results satisfy the conditions (c1’) and (c2’).
In this way, TP can calculate the error rate, once the error rate is higher than a certain threshold, she will abort the protocol. Otherwise, she will continue.
encodes his secret dataset. Concretely, randomly generates two variables and and requires them to meet the condition . performs operation on the Bell state . Therefore, the Bell state changes from to
Each participant performs the Bell state measurement on particle and particle . In this case, the particles collapse to a cat state. After that, TP measures this cat state.
After the entanglement swapping, the Bell state of becomes , where , . Then, calculates
(8) |
and announces classical information to TP.
After the entanglement swapping, the cat state of TP becomes
, where , . Then, TP carries out simple calculations and gets
(9) |
Finally, TP announces the summation to .
Let us consider a simple case as an example to demonstrate the correctness of the presented protocol. Suppose that there are three participants , , and , who have three private datasets , and , respectively. Thus, we can assume that . For simplicity, we ignore the eavesdropping checks. Therefore, in step 1, every prepares four copies of -level Bell state , and TP prepares four copies of -level cat state and . Every takes particle and from each Bell state to form two ordered particle sequences and . TP takes particle from each cat state to construct four ordered sequences .
1 | 1 | 1 | 1 | 0 | (1,0) | 1 | 1 | (0,1) | 1 |
1 | 2 | 3 | 2 | 1 | (2,1) | 1 | 0 | (1,2) | 3 |
2 | 1 | 3 | 1 | 2 | (1,2) | 0 | 1 | (1,0) | 1 |
2 | 2 | 6 | 4 | 2 | (4,2) | 3 | 1 | (1,1) | 2 |
3 | 1 | 2 | 0 | 2 | (0,2) | 0 | 0 | (0,1) | 1 |
3 | 2 | 5 | 3 | 2 | (3,2) | 1 | 0 | (2,2) | 4 |
The concrete value of each variable are shown in Table 1, and the new Bell states and can be obtained after the entanglement swapping.
In step 7, the specific calculation results are shown in Table 2. It can be seen from this example that the results obtained by TP are correct.
j | |||||||
1 | (4,1,1,1) | 5 | 0 | 3 | 2 | (5,0,3,2) | 6 |
2 | (3,2,2,2) | 1 | 1 | 3 | 2 | (1,1,3,2) | 0 |
IV Security analysis
In the following, we analyze the security of the proposed protocol. The security of every quantum channel between TP and participants is ensured by an eavesdropping-check process. Thus, it is evident that stealing information directly is not feasible. An inside attacker is more powerful than an outside attacker. Thus, we focus our attention on the security of protocol against the inside attacks. In addition to dishonest participants, TP is not fully trusted, and she may also steal secret inputs. Thus, two types of attacks will be discussed: attack by dishonest participants and attack by the semitrusted TP.
A.Attack by dishonest participants
In this attack, we will assume that (referred to as ) is dishonest and wishes to eavesdrop on all or partial information about ’s private data. He can perform one of two common attack strategies to attack the proposed protocol in this article, which are described as follows.
Case 1: Intercept-resend attack
In Step 2, TP transmits sequence to , transmits sequence to TP. Thus, can utilize this opportunity to execute his attack action. Concretely, prepares several fake particles and replaces the signal particles with these fake particles. First, let’s analyze the case where TP transmits sequence to . When sequence , which contains partial information about , is transmitted in Step 2, intercepts this particle sequence. After interception, can obtain the value of in the calculation in Step 6 by measuring the sequence . However, this action can be detected in Detection 1. Therefore, the attack will fail. Next, let’s analyze the other case where transmits sequence to TP. Similarly, when sequence is transmitted in Step 2, intercepts and measures this particle sequence. After then, can obtain the value of in the calculation in Step 6. However, this action can be detected in Detection 2. Therefore, the attack will fail, too. Consequently, this protocol is secure against intercept-resend attack.
Case 2: Entangle-ancilla attack
In this attack, let’s first analyze the case where transmits sequence to TP. Before sends sequence to TP, prepares an ancilla and performs a certain unitary operation on this ancillary particle and the transmitted particle in the sequence , which causes the two particles to become entangled. At the end of the protocol, he may utilize this ancilla to eavesdrop on all or some of the information about . In the following, we will show that even if he has unlimited computing power, with technology limited only by the laws of quantum mechanics, cannot obtain any information about ’s secret input under the condition that no errors are to occur in Detection 2.
We can write the most general operation that could apply to particle in sequence (particle T) and the ancilla (particle E) as follows:
(14) |
where . The states are pure ancilla states that are uniquely determined by U. The following conditions can be derived from the unitary nature of U:
(15) |
where or when or .
After performs U operation the quantum system composed of particle H, particle T and particle E will be in the state,
(16) |
In Detection 2, we can get from Eq.(L’1)
(17) |
where .
According to Eqs.(16) and (17), we can further obtain
(18) |
When and TP measure particles with basis, the state of the system can be written as
(19) |
We get from Eq.(L’2)
(20) |
where . Then,
(21) |
After a simple calculation, we can get
(22) |
From Eqs.(20),(21) and (22) we can derive
(23) |
where is independent of .
Above we have deduced successful eavesdropping conditions. When entangles an ancilla particle on a particle T, the probability that is equal to is . When a sequence has particles, the probability that is equal to is . As tends to infinity, the probability of successful eavesdropping tends to 0.
For analysis of eavesdropping , see Appendix 1.
B.Attack by the semitrusted TP
Now, we will discuss the case in which TP attempts to eavesdrop on private data. In the proposed protocol, TP is allowed to behave improperly, but she cannot conspire with other participants. To get useful information about a participant, TP must get and of the participant without introducing any errors into the detection. If TP implements the protocol honestly, then she can obtain , , and by measurement in step 2 before entanglement swapping. After entanglement swapping, in step 6, due to the publication of , TP can know , namely, . In step 7, she can obtain and by measurement after entanglement swapping. At the end of the protocol, she also can know . Even if TP knew so much information, it could not eavesdrop on the value of . If TP adopts intercept-resend attack and entangle-ancilla attack , the analysis results are the same as above.
V Summary and Conclusion
Before giving a conclusion, we first compare and analyze the proposed with other QMS protocols. In order to highlight the advantages of the proposed protocol more intuitively, we make the following comparisons. Please refer to Table 3 for detailed comparison results. First, several QSMS algorithms were proposed in quantum anonymous voting and surveying protocols in order to calculate the summation of some private data including binary numbers and integers[24]. In 2005, Hillery et al. proposed a QSMS algorithm in their quantum anonymous voting protocol, in which each number is 0 or 1. In 2007, Vaccaro et al. proposed another QSMS algorithm for calculating the summation of integers, where denotes the number of parties (voters) in their quantum anonymous surveying protocol, in which a -particle entangled state is employed. Each party makes a vote by performing a phase-shifting operation on its respective particles[25]. Then all parties send their particles to the tallyman who is responsible for counting the votes (i.e., calculating the summation of integers).
Protocol | Information carriers | User’s operations | Data type |
proposed protocol | cat states and Bell states | Single operations | Nonnegative integer |
Refs.[24] | Cat states and Bell states | Single operations | Binary number |
Refs.[25] | N-particle entangled states | Phase-shifting operation | Integer |
From Table 2, we can clearly find the advantages of the proposed protocol. In addition, even if the eavesdropper escaped all detection risks, he would still not have access to useful information.
In the proposed protocol, we propose a QMS protocol that allows multiple parties to securely compute the summation of their secret data. The special feature of the proposed protocol is employing entanglement swapping between cat states and Bell states to encode secret data. The proposed protocols use entanglement swapping between cat states and Bell states to securely transmit message between each party and TP. It is worthy pointing that all parties employ unitary operation to encode their secret data, and generate Bell states. With the help of the semitrusted TP, they can obtain the summation successfully at the end of the protocol.
Acknowledgment
This work is partially supported by Fujian Normal University.
References
- [1] A. C. Yao, “Protocols for Secure Computations,”Foundations of Computer Science, 1982, 160-164.
- [2] C. Lovis, “Privacy-preserving Analysis of Distributed Biomedical Data: Designing Efficient and Secure Multiparty Computations Using Distributed Statistical Learning Theory,” JMIR Medical Informatics, 2019,7(2).
- [3] K. H. Yee, Y. K. Hyuk, B. Jeongho, et al., “Speedup of Grover’s Search Algorithm and Closed Timelike Curves,”Quantum Science and Technology, 2020,5(4):045011.
- [4] W. Arya, A. Anthony, W. A. Wahyu, “Web-app Realization of Shor’s Quantum Factoring Algorithm and Grover’s Quantum Search Algorithm,” TELKOMNIKA, 2020,18(3).
- [5] D. Fernandes, I. Dutra,“Inês Dutra. Using Grover’s Search Quantum Algorithm to Solve Boolean Satisfiability Problems: Part I,” XRDS: Crossroads, The ACM Magazine for Students, 2019,26(1).
- [6] P. R. Giri, V. E. Korepin, “ A Review on Quantum Search Algorithms,” Quantum Information Processing, 2017,16(12).
- [7] F. Gao, S. J. Qin, W. Huang, Q. Y. Wen, “Quantum Private Query: A New Kind of Practical Quantum Cryptographic Protocol,” Science China Physics,Mechanics and Astronomy, 2019,62(07):10-21.
- [8] Y. Wang, F.Z. Guo, L. Liu, et al., “A New Protocol for Quantum Private Query Against Joint-Measurement Attack,”International Journal of Theoretical Physics, 2019,58(6):1828-1835.
- [9] T.R. Pei, X.L. Meng, C.Y. Wei, et al., “Practical Quantum Private Query of Blocks Based on the Two-dimensional QKD System,” Quantum Information Processing,2019,18(8):1-13.
- [10] “Information Technology,Study Results from Chengdu University of Information and Technology Provide New Insights into Information Technology (Practical Quantum Database Private Query Protocol With Classical Database Owner),” Journal of Physics Research, 2020.
- [11] B. Liu, D. Xiao , W. Huang, et al., “Quantum Private Comparison Employing Single-photon Interference,” Quantum Information Processing, 2017,16(7).
- [12] Z. X. Ji, P. R. Fan, H. G. Zhang, H. Z. “Cryptanalysis and improvement of several quantum private comparison protocols,” Communications in Theoretical Physics, 2020,72(08):59-64.
- [13] L. Z. Jiang, “Semi-quantum private comparisonbased on Bell states,”Quantum Information Processing, 2020,19(1).
- [14] Y. F. Lang, “Quantum Gate-Based Quantum Private Comparison,” International Journal of Theoretical Physics, 2020,59(3).
- [15] Y. H. Yang, F. Gao, X. Wu, et al., “Quantum Secret Sharing via Local Operations and Classical Communication,” Scientific Reports,2015,5(1).
- [16] L. Hong, J. Pieprzyk, L. Pan, “Analysis of weighted quantum secret sharing based on matrix product states,” Quantum Information Processing,2020,19(12).
- [17] Z. K. Gao,Z. H. Li, “Deterministic Measurement-device-independent Quantum Secret Sharing,” Science China Physics,Mechanics and Astronomy, 2020,63(12):76-83.
- [18] S. Kartick, O. Har, “Hybrid Quantum Protocols for Secure Multiparty Summation and Multiplication,” Scientific Reports, 2020,10(1):9097.
- [19] W. Liu,Y. B. Wang, W. Q,“ An Novel Protocol for the Quantum Secure Multi-Party Summation Based on Two-Particle Bell States,” International Journal of Theoretical Physics, 2017,56(9):2783-2791.
- [20] J. A. Vaccaro, J. Spring, Chefles, “Quantum Protocols for Anonymous Voting and Surveying,” Phys.Rev.A, 2007,75(1):012333.
- [21] J. Z. Du, X. B. Chen,Q. Y. Wen, F. C. Zhu, “Secure Multipartite Quantum Summation,” Journal of Physics, 2007,(11):6214-6219.
- [22] Z. X. Ji, H. G. Zhang, H. Z. Wang, F. S. Wu,J. W. Jia,W. Q. Wu,“Quantum Protocols for Secure Multi-party Summation,” Quantum Inf. Process, 2019,18(6).
- [23] A. Shakeel,“Efficient and Scalable Quantum Walk Algorithms via the Quantum Fourier Transform,” Quantum Information Processing, 2020,19(9).
- [24] J. A. Vaccaro, J. Spring,A. Chefles, “Quantum Protocols for Anonymous Voting and Surveying,” Phys.Rev.A, 2007,75(1):012333.
- [25] M. Hillery, M. Ziman, V. Buek, M. Bielikova, “Towards Quantum-based Privacy and Voting,” Physics Letters A, 2006,349(1):75-81.