Experimental realization of an entanglement access network and secure multi-party computation

被引:0
|
作者
X.-Y. Chang
D.-L. Deng
X.-X. Yuan
P.-Y. Hou
Y.-Y. Huang
L.-M. Duan
机构
[1] Center for Quantum Information,Department of Physics
[2] IIIS,undefined
[3] Tsinghua University,undefined
[4] University of Michigan,undefined
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.
引用
收藏
相关论文
共 50 条
  • [1] Experimental realization of an entanglement access network and secure multi-party computation
    Chang, X. -Y.
    Deng, D. -L.
    Yuan, X. -X.
    Hou, P. -Y.
    Huang, Y. -Y.
    Duan, L. -M.
    SCIENTIFIC REPORTS, 2016, 6
  • [2] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [3] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [4] Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network
    黄征
    龚征
    李强
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (01) : 112 - 116
  • [5] Information theory and secure multi-party computation
    Maurer, UM
    1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [6] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [7] Secure multi-party computation made simple
    Maurer, U
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [8] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [9] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [10] Batch secret sharing for secure multi-party computation in asynchronous network
    Huang Z.
    Gong Z.
    Li Q.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 E (01) : 112 - 116