scholarly journals Multi-Party Quantum Byzantine Agreement without Entanglement

Entropy ◽  
2020 ◽  
Vol 22 (10) ◽  
pp. 1152
Author(s):  
Xin Sun ◽  
Piotr Kulicki ◽  
Mirek Sopek

In this paper, we propose a protocol of quantum communication to achieve Byzantine agreement among multiple parties. Our protocol’s striking feature compared to the existing protocols is that we do not use entanglement to achieve the agreement. The role played by entangled states in other protocols is replaced in our protocol by a group of semi-honest list distributors. Such a replacement makes the implementation of our protocol more feasible. Moreover, our protocol is efficient in the sense that it achieves agreement in only three rounds which is a significant improvement with respect to the alternative agreement protocol not using entanglement. In the first round, a list of numbers that satisfies some special properties is distributed to every participant by list distributors via quantum secure communication. Then, in the second and third rounds, those participants exchange some information to reach an agreement.

2008 ◽  
Vol 19 (11) ◽  
pp. 1673-1681 ◽  
Author(s):  
LI DONG ◽  
XIAO-MING XIU ◽  
YA-JUN GAO ◽  
FENG CHI

A three-party controlled deterministic secure quantum communication scheme through entanglement swapping is proposed firstly. In the scheme, the sender needs to prepare a class of Greenberger–Horne–Zeilinger (GHZ) states which are used as quantum channel. The two communicators may securely communicate under the control of the controller if the quantum channel is safe. The roles of the sender, the receiver, and the controller can be exchanged owing to the symmetry of the quantum channel. Different from other controlled quantum secure communication schemes, the scheme needs lesser additional classical information for transferring secret information. Finally, it is generalized to a multiparty controlled deterministic secure quantum communication scheme.


2017 ◽  
Vol 1 (1) ◽  
pp. 21-26
Author(s):  
Georgi Petrov Bebrov ◽  
Rozalina Stefanova Dimova

The paper concerns the quantum cryptography, more specifically, the quantum secure communication type of schemes. The main focus here is on making a comparison between the distinct secure quantum communication models – quantum secure direct communication and deterministic secure quantum communication, in terms of three parameters: resource efficiency, eavesdropping check efficiency, and security (degree of preserving the confidentiality).


2011 ◽  
Vol 09 (supp01) ◽  
pp. 357-365 ◽  
Author(s):  
FAIEGH SHEIKHEHI ◽  
MOSAYEB NASERI

A new probabilistic bidirectional quantum secure communication protocol based on a shared partially entangled states is proposed. In this scheme the decoy-photon technique is exploited to ensure the security of the transmission of qubits. The highlight of our protocol is that in addition to elimination of the drawback "information leakage", In our protocol it is not necessary to the parties of communication to have an ideal maximally entangled pairs, which makes this scheme more convenient than previews protocols in a practical application.


Author(s):  
Pramode K. Verma ◽  
Mayssaa El Rifai ◽  
Kam Wai Clifford Chan

Author(s):  
Lyubov V. Amitonova ◽  
Tristan B. H. Tentrup ◽  
Ivo M. Vellekoop ◽  
Pepijn W. H. Pinkse

2021 ◽  
pp. 2150343
Author(s):  
Xiao-Jun Wen ◽  
Yong-Zhi Chen ◽  
Xin-Can Fan ◽  
Zheng-Zhong Yi ◽  
Zoe L. Jiang ◽  
...  

Blockchain technology represented by Bitcoin and Ethereum has been deeply developed and widely used due to its broad application prospects such as digital currency and IoT. However, the security of the existing blockchain technologies built on the classical cryptography depends on the computational complexity problem. With the enhancement of the attackers’ computing power, especially the upcoming quantum computers, this kind of security is seriously threatened. Based on quantum hash, quantum SWAP test and quantum teleportation, a quantum blockchain system is proposed with quantum secure communication. In classical cryptographic theory sense, the security of this system is unconditional since it has nothing to do with the attackers’ computing power and computing resources.


2019 ◽  
Vol 58 (4) ◽  
pp. 1079-1087
Author(s):  
Dong-fen Li ◽  
Rui-jin Wang ◽  
Ya-ming Yang ◽  
Jin-lian Chen

2014 ◽  
Vol 2014 ◽  
pp. 1-13 ◽  
Author(s):  
Yao-Hsin Chou ◽  
Yu-Ting Lin ◽  
Guo-Jyun Zeng ◽  
Fang-Jhu Lin ◽  
Chi-Yuan Chen

We propose a novel protocol for controlled bidirectional quantum secure communication based on anonlocal swapgate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on thenonlocal swapgate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages.


Sign in / Sign up

Export Citation Format

Share Document