Secure Multi-party Quantum Computation with a Dishonest Majority

被引:22
|
作者
Dulek, Yfke [1 ,2 ]
Grilo, Alex B. [1 ,3 ]
Jeffery, Stacey [1 ,3 ]
Majenz, Christian [1 ,3 ]
Schaffner, Christian [1 ,2 ]
机构
[1] QuSoft, Amsterdam, Netherlands
[2] Univ Amsterdam, Amsterdam, Netherlands
[3] Ctr Wiskunde Informat, Amsterdam, Netherlands
关键词
D O I
10.1007/978-3-030-45727-3_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cryptographic task of secure multi-party (classical) computation has received a lot of attention in the last decades. Even in the extreme case where a computation is performed between k mutually distrustful players, and security is required even for the single honest player if all other players are colluding adversaries, secure protocols are known. For quantum computation, on the other hand, protocols allowing arbitrary dishonest majority have only been proven for k = 2. In this work, we generalize the approach taken by Dupuis, Nielsen and Salvail (CRYPTO 2012) in the two-party setting to devise a secure, efficient protocol for multi-party quantum computation for any number of players k, and prove security against up to k - 1 colluding adversaries. The quantum round complexity of the protocol for computing a quantum circuit of {CNOT, T} depth d is O(k center dot (d + logn)), where n is the security parameter. To achieve efficiency, we develop a novel public verification protocol for the Clifford authentication code, and a testing protocol for magic-state inputs, both using classical multi-party computation.
引用
收藏
页码:729 / 758
页数:30
相关论文
共 50 条
  • [1] Adaptively Secure Multi-Party Computation with Dishonest Majority
    Garg, Sanjam
    Sahai, Amit
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 105 - 123
  • [2] Round efficiency of multi-party computation with a dishonest majority
    Katz, J
    Ostrovsky, R
    Smith, A
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 578 - 595
  • [3] Dishonest Majority Multi-Party Computation for Binary Circuits
    Larraia, Enrique
    Orsini, Emmanuela
    Smart, Nigel P.
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 495 - 512
  • [4] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [5] Secure Multi-Party Quantum Computation Based on Blind Quantum Computation
    Gui-Ju Qu
    Ming-Ming Wang
    [J]. International Journal of Theoretical Physics, 2021, 60 : 3003 - 3012
  • [6] Secure Multi-Party Quantum Computation Based on Blind Quantum Computation
    Qu, Gui-Ju
    Wang, Ming-Ming
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (08) : 3003 - 3012
  • [7] Rational protocol of quantum secure multi-party computation
    Dou, Zhao
    Xu, Gang
    Chen, Xiu-Bo
    Niu, Xin-Xin
    Yang, Yi-Xian
    [J]. QUANTUM INFORMATION PROCESSING, 2018, 17 (08)
  • [8] Rational protocol of quantum secure multi-party computation
    Zhao Dou
    Gang Xu
    Xiu-Bo Chen
    Xin-Xin Niu
    Yi-Xian Yang
    [J]. Quantum Information Processing, 2018, 17
  • [9] SECURE MULTI-PARTY QUANTUM CONFERENCE AND XOR COMPUTATION
    Das, Nayana
    Paul, Goutam
    [J]. QUANTUM INFORMATION & COMPUTATION, 2021, 21 (3-4) : 203 - 232
  • [10] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159