Multi-party quantum summation without a third party based on d-dimensional bell states

2021 ◽  
Vol 20 (6) ◽  
Author(s):  
WanQing Wu ◽  
XiaoXue Ma
Entropy ◽  
2019 ◽  
Vol 21 (7) ◽  
pp. 719 ◽  
Author(s):  
Cai Zhang ◽  
Mohsen Razavi ◽  
Zhiwei Sun ◽  
Qiong Huang ◽  
Haozhen Situ

We present a secure multi-party quantum summation protocol based on quantum teleportation, in which a malicious, but non-collusive, third party (TP) helps compute the summation. In our protocol, TP is in charge of entanglement distribution and Bell states are shared between participants. Users encode the qubits in their hand according to their private bits and perform Bell-state measurements. After obtaining participants’ measurement results, TP can figure out the summation. The participants do not need to send their encoded states to others, and the protocol is therefore congenitally free from Trojan horse attacks. In addition, our protocol can be made secure against loss errors, because the entanglement distribution occurs only once at the beginning of our protocol. We show that our protocol is secure against attacks by the participants as well as the outsiders.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Chia-Wei Tsai ◽  
Chun-Wei Yang

AbstractThe mediated semi-quantum key distribution (MSQKD) protocol is an important research issue that lets two classical participants share secret keys securely between each other with the help of a third party (TP). However, in the existing MSQKD protocols, there are two improvable issues, namely (1) the classical participants must be equipped with expensive detectors to avoid Trojan horse attacks and (2) the trustworthiness level of TP must be honest. To the best of our knowledge, none of the existing MSQKD protocols can resolve both these issues. Therefore, this study takes Bell states as the quantum resource to propose a MSQKD protocol, in which the classical participants do not need a Trojan horse detector and the TP is dishonest. Furthermore, the proposed protocol is shown to be secure against well-known attacks and the classical participants only need two quantum capabilities. Therefore, in comparison to the existing MSQKD protocols, the proposed protocol is better practical.


2014 ◽  
Vol 14 (3&4) ◽  
pp. 236-254
Author(s):  
Xiao-Ming Xiu ◽  
Li Dong ◽  
Hong-Zhi Shen ◽  
Ya-Jun Gao ◽  
X. X. Yi

We propose a protocol of quantum privacy comparison with polarization-entangled Einstein-Podolsky-Rosen (Bell) states and the coherent states. One of two legitimate participants, Alice, prepares polarization-entangled Bell states and keeps one photon of each photon pair and sends the other photons to the third party, Charlie. Receiving the photons, Charlie performs single-photon transformation operations on them and then sends them to the other legitimate participant, Bob. Three participants adopt parity analysis method to check the distribution security of Bell states. Exploiting polarization beam splitters and nonlinear interactions mediated by the probe coherent states in Kerr media, Alice and Bob check the parities of their photons using the bases of $\{\ket H, \ket V\}$ or $\{\ket +, \ket -\}$. On the basis of the parity analysis outcomes and Charlie's publicized information, they can analyze the security of the distributed quantum channel. Confirming secure distribution of the shared Bell states, two participants perform respective parity measurements on the privacy photons and own photons of Bell states, and then send the results to Charlie. According to information provided by two legitimate participants and his single-qubit transformation operations, Charlie compares the privacy information of Alice and Bob and publicizes the conclusion.


2015 ◽  
Vol 13 (02) ◽  
pp. 1550011 ◽  
Author(s):  
Cai Zhang ◽  
Zhi-Wei Sun ◽  
Xiang Huang ◽  
Dong-Yang Long

In this paper, we propose a quantum summation protocol, in which the genuinely maximally entangled six-qubit states found by Borras et al., are employed. Because of the excellent properties of the genuinely maximally entangled six-qubit states, the presented protocol allows three participants to compute the summation of their inputs without the help of a trusted third party and preserve the privacy of their inputs, respectively. The participants do not need any unitary operations. In addition, the proposed protocol utilizes the one-step quantum transmission and therefore is congenitally free from Trojan horse attacks. We have also shown that our protocol is secure against other well-known attacks over lossy and noisy quantum channels.


2017 ◽  
Vol 15 (02) ◽  
pp. 1750010 ◽  
Author(s):  
Cai Zhang ◽  
Haozhen Situ ◽  
Qiong Huang ◽  
Pingle Yang

We propose multi-party quantum summation protocols based on single particles, in which participants are allowed to compute the summation of their inputs without the help of a trusted third party and preserve the privacy of their inputs. Only one participant who generates the source particles needs to perform unitary operations and only single particles are needed in the beginning of the protocols.


2019 ◽  
Vol 17 (03) ◽  
pp. 1950027
Author(s):  
C. Zhang ◽  
H. Situ ◽  
Q. Huang ◽  
Z. Sun ◽  
Z. Huang

A multi-party quantum summation with a single [Formula: see text]-level quantum system is proposed, in which a semi-honest third party (TP) is employed. Only sequential communication of a single quantum [Formula: see text]-level system (for any prime [Formula: see text]) is required in the presented protocol, resulting in advantages in scalability. In addition, it can be realized with state-of-the-art technology. Due to the semi-honest TP, the protocol is not only secure against outside attacks, but also secure against participant attacks.


2020 ◽  
Vol 43 ◽  
Author(s):  
Michael Tomasello

Abstract My response to the commentaries focuses on four issues: (1) the diversity both within and between cultures of the many different faces of obligation; (2) the possible evolutionary roots of the sense of obligation, including possible sources that I did not consider; (3) the possible ontogenetic roots of the sense of obligation, including especially children's understanding of groups from a third-party perspective (rather than through participation, as in my account); and (4) the relation between philosophical accounts of normative phenomena in general – which are pitched as not totally empirical – and empirical accounts such as my own. I have tried to distinguish comments that argue for extensions of the theory from those that represent genuine disagreement.


Author(s):  
Carl E. Henderson

Over the past few years it has become apparent in our multi-user facility that the computer system and software supplied in 1985 with our CAMECA CAMEBAX-MICRO electron microprobe analyzer has the greatest potential for improvement and updating of any component of the instrument. While the standard CAMECA software running on a DEC PDP-11/23+ computer under the RSX-11M operating system can perform almost any task required of the instrument, the commands are not always intuitive and can be difficult to remember for the casual user (of which our laboratory has many). Given the widespread and growing use of other microcomputers (such as PC’s and Macintoshes) by users of the microprobe, the PDP has become the “oddball” and has also fallen behind the state-of-the-art in terms of processing speed and disk storage capabilities. Upgrade paths within products available from DEC are considered to be too expensive for the benefits received. After using a Macintosh for other tasks in the laboratory, such as instrument use and billing records, word processing, and graphics display, its unique and “friendly” user interface suggested an easier-to-use system for computer control of the electron microprobe automation. Specifically a Macintosh IIx was chosen for its capacity for third-party add-on cards used in instrument control.


2008 ◽  
Vol 18 (1) ◽  
pp. 9-20 ◽  
Author(s):  
Mark Kander ◽  
Steve White

Abstract This article explains the development and use of ICD-9-CM diagnosis codes, CPT procedure codes, and HCPCS supply/device codes. Examples of appropriate coding combinations, and Coding rules adopted by most third party payers are given. Additionally, references for complete code lists on the Web and a list of voice-related CPT code edits are included. The reader is given adequate information to report an evaluation or treatment session with accurate diagnosis, procedure, and supply/device codes. Speech-language pathologists can accurately code services when given adequate resources and rules and are encouraged to insert relevant codes in the medical record rather than depend on billing personnel to accurately provide this information. Consultation is available from the Division 3 Reimbursement Committee members and from [email protected] .


Sign in / Sign up

Export Citation Format

Share Document