Secure Multi-party Quantum Computation with a Dishonest Majority

被引:22
|
作者
Dulek, Yfke [1 ,2 ]
Grilo, Alex B. [1 ,3 ]
Jeffery, Stacey [1 ,3 ]
Majenz, Christian [1 ,3 ]
Schaffner, Christian [1 ,2 ]
机构
[1] QuSoft, Amsterdam, Netherlands
[2] Univ Amsterdam, Amsterdam, Netherlands
[3] Ctr Wiskunde Informat, Amsterdam, Netherlands
关键词
D O I
10.1007/978-3-030-45727-3_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cryptographic task of secure multi-party (classical) computation has received a lot of attention in the last decades. Even in the extreme case where a computation is performed between k mutually distrustful players, and security is required even for the single honest player if all other players are colluding adversaries, secure protocols are known. For quantum computation, on the other hand, protocols allowing arbitrary dishonest majority have only been proven for k = 2. In this work, we generalize the approach taken by Dupuis, Nielsen and Salvail (CRYPTO 2012) in the two-party setting to devise a secure, efficient protocol for multi-party quantum computation for any number of players k, and prove security against up to k - 1 colluding adversaries. The quantum round complexity of the protocol for computing a quantum circuit of {CNOT, T} depth d is O(k center dot (d + logn)), where n is the security parameter. To achieve efficiency, we develop a novel public verification protocol for the Clifford authentication code, and a testing protocol for magic-state inputs, both using classical multi-party computation.
引用
收藏
页码:729 / 758
页数:30
相关论文
共 50 条
  • [31] Secure multi-party computation in large networks
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    Zamani, Mahdi
    [J]. DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
  • [32] Comment on "Secure multiparty computation with a dishonest majority via quantum means"
    Li, Yan-bing
    Wen, Qiao-yan
    Qin, Su-juan
    [J]. PHYSICAL REVIEW A, 2011, 84 (01):
  • [33] Improved Secure Multiparty Computation with a Dishonest Majority via Quantum Means
    Yan-Bing Li
    Qiao-Yan Wen
    Su-Juan Qin
    [J]. International Journal of Theoretical Physics, 2013, 52 : 199 - 205
  • [34] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [35] Proactive Secure Multiparty Computation with a Dishonest Majority
    Eldefrawy, Karim
    Ostrovsky, Rafail
    Park, Sunoo
    Yung, Moti
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 200 - 215
  • [36] Secure Massively Parallel Computation for Dishonest Majority
    Fernando, Rex
    Komargodski, Ilan
    Liu, Yanyi
    Shi, Elaine
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2020, PT II, 2020, 12551 : 379 - 409
  • [37] Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority
    Blanton, Marina
    Kang, Ahreum
    Yuan, Chen
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 377 - 397
  • [38] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    [J]. TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [39] Multi-party quantum private comparison with an almost-dishonest third party
    Sheng-Liang Huang
    Tzonelih Hwang
    Prosanta Gope
    [J]. Quantum Information Processing, 2015, 14 : 4225 - 4235
  • [40] Multi-party quantum private comparison with an almost-dishonest third party
    Huang, Sheng-Liang
    Hwang, Tzonelih
    Gope, Prosanta
    [J]. QUANTUM INFORMATION PROCESSING, 2015, 14 (11) : 4225 - 4235