160 research outputs found
Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement
A feasible, secure and collusion-attack-free quantum sealed-bid auction
protocol is proposed using a modified scheme for multi-party circular quantum
key agreement. In the proposed protocol, the set of all () bidders is
grouped in to subsets (sub-circles) in such a way that only the initiator
(who prepares the quantum state to be distributed for a particular round of
communication and acts as the receiver in that round) is a member of all the
subsets (sub-circles) prepared for a particular round, while any other bidder
is part of only a single subset. All bidders and auctioneer initiate one
round of communication, and each of them prepares copies of a
-partite entangled state (one for each sub-circle), where
. The efficiency and security\textcolor{blue}{{} }of the
proposed protocol are critically analyzed. It is shown that the proposed
protocol is free from the collusion attacks that are possible on the existing
schemes of quantum sealed-bid auction. Further, it is observed that the
security against collusion attack increases with the increase in , but that
reduces the complexity (number of entangled qubits in each entangled state) of
the entangled states to be used and that makes the scheme scalable and
implementable with the available technologies. The additional security and
scalability is shown to arise due to the use of a circular structure in place
of a complete-graph or tree-type structure used earlier.Comment: 10 pages, 2 figure
Continuous variable controlled quantum dialogue and secure multiparty quantum computation
A continuous variable controlled quantum dialogue scheme is proposed. The
scheme is further modified to obtain two other protocols of continuous variable
secure multiparty computation. The first one of these protocols provides a
solution of two party socialist millionaire problem, while the second protocol
provides a solution for a special type of multi-party socialist millionaire
problem which can be viewed as a protocol for multiparty quantum private
comparison. It is shown that the proposed scheme of continuous variable
controlled quantum dialogue can be performed using bipartite entanglement and
can be reduced to obtain several other two and three party cryptographic
schemes in the limiting cases. The security of the proposed scheme and its
advantage over corresponding discrete variable counterpart are also discussed.
Specifically, the ignorance of an eavesdropper in the proposed scheme is shown
to be very high compared with corresponding discrete variable scheme and thus
the present scheme is less prone to information leakage inherent with the
discrete variable quantum dialogue based schemes.It is further established that
the proposed scheme can be viewed as a continuous variable counterpart of
quantum cryptographic switch which allows a supervisor to control the
information transferred between the two legitimate parties to a continuously
varying degree.Comment: Quantum dialogue and its application in the continuous variable
scenario is studied in detai
Quantum Anonymous Transmissions
We consider the problem of hiding sender and receiver of classical and
quantum bits (qubits), even if all physical transmissions can be monitored. We
present a quantum protocol for sending and receiving classical bits
anonymously, which is completely traceless: it successfully prevents later
reconstruction of the sender. We show that this is not possible classically. It
appears that entangled quantum states are uniquely suited for traceless
anonymous transmissions. We then extend this protocol to send and receive
qubits anonymously. In the process we introduce a new primitive called
anonymous entanglement, which may be useful in other contexts as well.Comment: 18 pages, LaTeX. Substantially updated version. To appear at
ASIACRYPT '0
An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States
Two quantum key agreement protocols using Bell states and Bell measurement
were recently proposed by Shukla et al.(Quantum Inf. Process. 13(11),
2391-2405, 2014). However, Zhu et al. pointed out that there are some security
flaws and proposed an improved version (Quantum Inf. Process. 14(11),
4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still
exists some security problems, and its efficiency is not high enough. For
solving these problems, we utilize four Pauli operations {I, Z, X, Y } to
encode two bits instead of the original two operations {I,X} to encode one bit,
and then propose an efficient and secure arbitrary N-party quantum key
agreement protocol. In the protocol, the channel checking with decoy single
photons is introduced to avoid the eavesdropper's flip attack, and a
post-measurement mechanism is used to prevent against the collusion attack. The
security analysis shows the present protocol can guarantee the correctness,
security, privacy and fairness of quantum key agreement.Comment: 13 pages, 5 figure
Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective
Rapid advances in human genomics are enabling researchers to gain a better
understanding of the role of the genome in our health and well-being,
stimulating hope for more effective and cost efficient healthcare. However,
this also prompts a number of security and privacy concerns stemming from the
distinctive characteristics of genomic data. To address them, a new research
community has emerged and produced a large number of publications and
initiatives.
In this paper, we rely on a structured methodology to contextualize and
provide a critical analysis of the current knowledge on privacy-enhancing
technologies used for testing, storing, and sharing genomic data, using a
representative sample of the work published in the past decade. We identify and
discuss limitations, technical challenges, and issues faced by the community,
focusing in particular on those that are inherently tied to the nature of the
problem and are harder for the community alone to address. Finally, we report
on the importance and difficulty of the identified challenges based on an
online survey of genome data privacy expertsComment: To appear in the Proceedings on Privacy Enhancing Technologies
(PoPETs), Vol. 2019, Issue
Secure multiparty quantum computation for summation and multiplication
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics
- …