Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2016 Jan 21;6:19655. doi: 10.1038/srep19655

Secure Multiparty Quantum Computation for Summation and Multiplication

Run-hua Shi 1,2,a, Yi Mu 2, Hong Zhong 1, Jie Cui 1, Shun Zhang 1
PMCID: PMC4726197  PMID: 26792197

Abstract

As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.


Secure Multiparty Computation (SMC)1 is an important branch in modern cryptography. Secure Multiparty Summation or Multiplication is a fundamental primitive of SMC that enables multiple parties to jointly compute the summation or multiplication of their respective private inputs without revealing any private input. As we know, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. In addition, there are also lots of other important applications of Secure Multiparty Summation and Multiplication in distributed networks, such as secret sharing, electronic voting, secure sorting, data mining and so on.

On the one hand, there existed some classical protocols for Secure Multiparty Summation2,3,4 and Multiplication5,6,7, which were based on classical cryptography. However, classical cryptography cannot provide the unconditionally secure communications and cannot resist the attack of the quantum computer especially.

On the other hand, quantum cryptography can provide the unconditional security, which is guaranteed by physical principles of quantum mechanics. Since Bennett and Brassard8 presented the first quantum key distribution protocol (BB84 protocol), quantum cryptography has been widely studied and rapidly developed. Compared to classical cryptography, the most important advantage is that an eavesdropper can easily be detected by using the characteristics of quantum mechanics. Therefore, a lot of results have been gained, such as quantum key distribution, quantum teleportation, quantum secret sharing, quantum secure direct communication, quantum key agreement, quantum signature and so on. Furthermore, SMC is also studied extensively in quantum cryptography9,10,11,12,13,14.

However, there are only a few quantum protocols for Secure Multiparty Summation. In 2007, Du et al.15 presented a secure quantum addition module n + 1 based on non-orthogonal states, where n denoted the number of all parties. In 2010, Chen et al.16 proposed another secure quantum addition module 2 based on multi-particle entangled states with the trusted third party. However, the module of the two protocols is too small, so that it limits their more extensive applications. Furthermore, the two protocols lack high communication efficiencies due to their bit-by-bit computation and communication. In addition, to the best of our knowledge, there is no any quantum protocol for Secure Multiparty Multiplication.

In this paper, we present a novel quantum approach to systematically and efficiently compute Secure Multiparty Summation and Multiplication, in which the computations of Secure Multiparty Summation and Multiplication are securely translated into the computations of the corresponding phase information by the quantum Fourier transform, and later the phase information is extracted out after performing an inverse quantum Fourier transform.

Here, we first introduce the quantum Fourier transform, which will be used later in proposed protocols. The quantum Fourier transform is a linear transformation on qubits, and is the quantum version of the standard discrete Fourier transform. For Inline graphic, the quantum Fourier transform and the inverse quantum Fourier transform are defined as follows17:

graphic file with name srep19655-m2.jpg
graphic file with name srep19655-m3.jpg

Furthermore,

graphic file with name srep19655-m4.jpg

so,

graphic file with name srep19655-m5.jpg

That is,

graphic file with name srep19655-m6.jpg

In addition, another multi-qubit quantum logic gate, which will be used later in proposed protocols, is the controlled-NOT or CNOT gate: Inline graphic, Inline graphic, Inline graphic and Inline graphic, where the first qubit is the control qubit, and the second qubit is the target qubit. That is, if the control qubit is set to 0, then the target qubit is left alone. If the control qubit is set to 1, then the target qubit is flipped.

Results

Proposed protocols

Secure multiparty quantum summation

Assume that there are n parties: P1, P2, …, Pn (n > 2), where each party Pk (1 ≤ k ≤ n) has a secret integer Inline graphic Inline graphic, and further all n parties want to jointly compute the summation Inline graphic without revealing their respective secret xks. In the following Protocol I, we suppose that P1 is the initiator party.

Protocol I (Secure multiparty quantum summation)

Step 1. The initiator Inline graphic first prepares an m-qubit basis state Inline graphic, where Inline graphic and Inline graphic is his private secret. Then Inline graphic applies a quantum Fourier transform to the state Inline graphic and gets the resultant state Inline graphic. That is,

graphic file with name srep19655-m21.jpg

Step 2. Inline graphic prepares another m-qubit ancillary state Inline graphic and further performs m CNOT gate operators on the product state Inline graphic, where each qubit of the first m qubits is the control qubit and the corresponding qubit of the second m qubits is the target qubit. Here we call the resultant state Inline graphic, which is written as

graphic file with name srep19655-m26.jpg

Clearly, Inline graphic is an entangled state, where the subscript h or t denotes that the qubits will stay at home or be transmitted through the quantum channel.

Step 3. Inline graphic sends the second m qubits (i.e., the ancillary state Inline graphic to Inline graphic through the authenticated quantum channel.

Step 4. After receiving the ancillary state Inline graphic, Inline graphic first prepares his secret state Inline graphic. Then he applies an oracle operator Inline graphic on Inline graphic, where Inline graphic is defined by

graphic file with name srep19655-m37.jpg

with

graphic file with name srep19655-m38.jpg

That is, Inline graphic is an eigenvector of U with the eigenvalue Inline graphic. After applying the oracle operator Inline graphic, the whole composite quantum systems of Inline graphic and Inline graphic are in the following state

graphic file with name srep19655-m44.jpg

Step 5. Furthermore, Inline graphic passes the ancillary state Inline graphic to Inline graphic through the authenticated quantum channel and keeps Inline graphic in secret. Afterward, Inline graphic executes the similar process of Inline graphic, and so on. This process is repeated Inline graphic times, so that, if everyone honestly executes the protocol, the composite quantum systems of all n parties are in the following state

graphic file with name srep19655-m52.jpg

Step 6. Finally, Inline graphic sends the ancillary state Inline graphic back to Inline graphic. After receiving the ancillary state Inline graphic, Inline graphic again applies Inline graphic on his Inline graphic qubits, where each qubit of the first m qubits is the control qubit and the corresponding qubit of the second m qubits is the target qubit. Call the resultant state Inline graphic. That is,

graphic file with name srep19655-m61.jpg

Step 7. Furthermore, Inline graphic measures the second m qubits (i.e., Inline graphic in the computational basis. If the measured result is Inline graphic, then he continues to execute the next step; otherwise he believes that there is at least one dishonest party and ends this protocol.

Step 8. Finally, Inline graphic applies Inline graphic to the first m qubits and further measures it to obtain Inline graphic, where Inline graphic.

The correctness proof.

graphic file with name srep19655-m69.jpg
graphic file with name srep19655-m70.jpg

Therefore, if all parties honestly execute this protocol, Inline graphic will rightly get Inline graphic.

Secure multiparty quantum multiplication

Assume that there are n parties Inline graphic, Inline graphic, …, Inline graphic Inline graphic, each party with a private secret Inline graphic Inline graphic, and all n parties want to jointly compute the multiplication of their respective private secret, i.e., Inline graphic. Since each secret Inline graphic can be split and expressed as Inline graphic, where Inline graphic is an odd integer, then we can get

graphic file with name srep19655-m83.jpg

By Eq. (14), if we get the results of Inline graphic and Inline graphic, then we can easily compute Inline graphic. Accordingly, the computation of Inline graphic can be translated into the computations of Inline graphic and Inline graphic, respectively. We have proposed Protocol I to compute Inline graphic. Furthermore, we present Protocol II to compute Inline graphic, where all Inline graphic are odd integers. Similarly, in the following Protocol II, we suppose that Inline graphic is the initiator.

Protocol II (Secure multiparty quantum multiplication)

Step 1. The initiator Inline graphic randomly chooses an odd integer Inline graphic and further prepares two m qubits in the original state Inline graphic, where the preparation process is the same as that of Step 1 and 2 in Protocol I. Then Inline graphic sends Inline graphic to Inline graphic through the authenticated quantum channel and keeps Inline graphic in hand.

Step 2. After receiving Inline graphic, Inline graphic applies an oracle operator Inline graphic on Inline graphic by his private secret Inline graphic, where Inline graphic is defined by,

graphic file with name srep19655-m107.jpg

Please note that Inline graphic is an odd integer and Inline graphic, thus there exists its modulo-N multiplicative inverse Inline graphic, which implies that Inline graphic is inverse. Furthermore, Inline graphic sends Inline graphic to Inline graphic through the authenticated quantum channel. Afterward, Inline graphic executes the similar process of Inline graphic (i.e., Inline graphic, and so on. This process is repeated Inline graphic times, so that, if everyone honestly executes the protocol, the final quantum states of the qubits of the subscripts Inline graphic and Inline graphic are in,

graphic file with name srep19655-m121.jpg

Finally, Inline graphic sends Inline graphic back to Inline graphic.

Step 3. After receiving the returned state Inline graphic, Inline graphic continues to send Inline graphic to Inline graphic through the authenticated quantum channel.

Step 4. After receiving the state Inline graphic, Inline graphic again applies the oracle operator Inline graphic on Inline graphic by his private input Inline graphic, i.e., Inline graphic. Furthermore he sends it to Inline graphic through the authenticated quantum channel, and so on. This process is repeated Inline graphic times, so that, if everyone honestly executes the protocol, the final quantum states of the 2 m qubits are in,

graphic file with name srep19655-m137.jpg

Finally, Inline graphic again sends Inline graphic back to Inline graphic.

Step 5. After receiving the state Inline graphic, Inline graphic performs m CNOT gate operators on the two returned states, such that the quantum systems of the subscripts Inline graphic and Inline graphic will be disentangled. That is,

graphic file with name srep19655-m145.jpg

Furthermore, Inline graphic measures the qubits of the subscript Inline graphic in the computation basis. If the measured result is Inline graphic, then he continues to execute the next step. Otherwise, he believes that there is at least one dishonest party and ends this protocol.

Step 6. Finally Inline graphic applies an inverse quantum Fourier transform Inline graphic on the remaining qubits and further measures it to obtain Inline graphic in the computation basis, where Inline graphic. Then Inline graphic outputs Inline graphic. That is, Inline graphic.

The correctness proof.

graphic file with name srep19655-m156.jpg

since

graphic file with name srep19655-m157.jpg

Obviously, Inline graphic, where r is an odd integer. Therefore, Protocol II can rightly output Inline graphic. Furthermore, in order to perfectly compute Inline graphic, the initiator first calls Protocol I to securely compute Inline graphic and then calls Protocol II to securely compute Inline graphic. Finally, the initiator computes Inline graphic. Obviously, Inline graphic.

Security Analysis

We have analyzed the correctness of Protocol I and II, and further analyze their securities. In order to save space, please note that we mainly analyze the security of Protocol I, because the security of Protocol II is the same as that of Protocol I.

We first analyze that Inline graphic does not get any secret information about the initiator Inline graphic’s input Inline graphic. In Protocol I, Inline graphic only sends the ancillary state Inline graphic to Inline graphic without any classical information. So, for a dishonest Inline graphic, if he wants to eavesdrop Inline graphic’s secret, all possible attacks he can perform with the present technology are as follows:

(1) Inline graphic directly measures the ancillary state Inline graphic in the computational basis. Obviously, he will get Inline graphic Inline graphic with the equal probability of Inline graphic, but the measured result j is independent of Inline graphic’s secret Inline graphic. That is, this attack is infeasible.

(2) After applying a unitary operator on the ancillary state Inline graphic, Inline graphic again measures it. Especially, Inline graphic has a knowledge that Inline graphic’s secret state Inline graphic has evolved into the same state (i.e., Inline graphic as the ancillary state Inline graphic based on the quantum Fourier transform, so he may perform an inverse quantum Fourier transform Inline graphic on the ancillary state Inline graphic to expect to extract out Inline graphic. That is, this attack can be described as follows:

graphic file with name srep19655-m190.jpg

By the above equation, if Inline graphic measures the ancillary state, he will get Inline graphic Inline graphic with the equal probability of Inline graphic. It implies that Inline graphic cannot get any secret information about Inline graphic’s private input, because he cannot extract out the global phase information from the partial qubits of the entangled quantum systems with the subscripts h and t. In fact, any local unitary operator on the partial qubits cannot fully disentangle the entanglement of the composite system unless directly measured. Therefore, even if Inline graphic performs this attack, he still cannot get any private information about Inline graphic’s secret Inline graphic.

(3) Inline graphic performs a more complicated entangle-measure attack that he is able to prepare another ancillary system Inline graphic and entangle the two ancillary systems by his local unitary operations, where one is transmitted from Inline graphic, and afterward he can measure the ancillary system prepared by himself to get the partial information about Inline graphic’s private inputs. Inline graphic’s dishonest action when he receives Inline graphic’s ancillary Inline graphic can be described by a unitary operator Inline graphic, which acts on Inline graphic and Inline graphic. We can describe it as follows:

graphic file with name srep19655-m210.jpg

where Inline graphic is a vector orthogonal to Inline graphic, i.e.,

graphic file with name srep19655-m213.jpg

In order to completely pass the honest test (see Step 7), it can easily deduce that Inline graphic. That is, the whole quantum systems of Inline graphic and Inline graphic should be in the following state after performing Inline graphic:

graphic file with name srep19655-m218.jpg

Then Inline graphic sends Inline graphic back to Inline graphic. After Inline graphic performing Inline graphic and further measuring the ancillary system t, the state of the remaining quantum system becomes

graphic file with name srep19655-m224.jpg

Now if Inline graphic measures his ancillary state Inline graphic, as the above analysis in the case of (2), he still cannot get any secret information about Inline graphic because of the entanglement of Inline graphic and Inline graphic. If Inline graphic further applies Inline graphic to the first m qubits, the state of the remaining quantum system will be updated into

graphic file with name srep19655-m232.jpg

This equation shows that if Inline graphic measures his remaining m qubits, he will get Inline graphic Inline graphic with the equal probability of Inline graphic, which implies that the probability of getting Inline graphic is also Inline graphic, unless Inline graphic is independent of j. Similarly, Inline graphic cannot get the secret Inline graphic with the probability of more than Inline graphic due to their entanglement yet. It implies that Inline graphic cannot get any secret information about Inline graphic’s private input Inline graphic. Therefore, the entangle-measure attack is infeasible.

From what we have analyzed above, we can see clearly that Inline graphic cannot get any secret information about Inline graphic. Furthermore, we can easily and naturally generalize that any party Inline graphic Inline graphic cannot obtain any secret information about Inline graphic’s private input. Therefore, the initiator’s private input is unconditionally secure against other dishonest parties. In turn, if all party honesty execute this protocol, Inline graphic only gets the final summation Inline graphic Inline graphic, instead of single party’s private secret Inline graphic. However, if the parties Inline graphic and Inline graphic are dishonest, they can collude to get Inline graphic’s private input Inline graphic. In order to overcome this weakness, we can use the communication model in a random order instead of the fixed order, that is, how to choose the next party is randomly determined by the party himself, not pre-determined by a designated party.

In addition, in order to full resist the collusion attack of any less Inline graphic parties, we can design the following Protocol III, in which all parties are full parity.

Protocol III (to compute Inline graphic

Round 1

Step 1. Each party Inline graphic Inline graphic randomly generates Inline graphic integers Inline graphic, Inline graphic, …, Inline graphic in Inline graphic, and then computes Inline graphic. That is,

graphic file with name srep19655-m269.jpg

Step 2. Each party Inline graphic Inline graphic as the initiator calls Protocol I to compute

graphic file with name srep19655-m272.jpg

where Inline graphic is Inline graphic’s the initial input.

Round 2

Finally, all parties designate an agent who could be one of them to again call Protocol I to compute and announce

graphic file with name srep19655-m275.jpg

Obviously,

graphic file with name srep19655-m276.jpg

Because Protocol I can ensure the unconditional security of the private input of the initiator, every sub-secret Inline graphic of Inline graphic Inline graphic in Round 1 of Protocol III is unconditionally secure against any less Inline graphic parties. Therefore, Protocol III is unconditional secure against any collusion attack, unless there are Inline graphic cheating parties.

As for Protocol II, obviously Inline graphic’s secret Inline graphic is unconditionally secure because the transmitted quantum messages don’t include any private information about Inline graphic. Conversely, if all parties honestly execute Protocol II, Inline graphic only gets the final multiplication Inline graphic Inline graphic, instead of certain party’s secret Inline graphic. In addition, the n-th party Inline graphic can easily perform an intercept-resend attack. That is, he intercepts all qubits passing through his hands, and then sends fake qubits back to Inline graphic. Accordingly, Inline graphic may finally obtain Inline graphic after applying m CNOT gate operators and an inverse quantum Fourier transform Inline graphic to his intercepted qubits, where Inline graphic. However, Inline graphic does not know r, so he still cannot get any secret information about other parties’ private inputs. Therefore, this attack is infeasible. Furthermore, in order to resist the collusion attack, we can also use the communication model in a random order instead of the fixed order. Similarly, we can also design the unconditionally secure quantum protocol for Secure Multiparty Multiplication.

Protocol IV (to compute Inline graphic

Round 1

Step 1. Each party Inline graphic Inline graphic splits his secret Inline graphic into n random integers Inline graphic, Inline graphic, …, Inline graphic in Inline graphic, such that

graphic file with name srep19655-m304.jpg

where Inline graphic. That is, Inline graphic.

Step 2. Each party Inline graphic Inline graphic as the initiator calls Protocol III to compute

graphic file with name srep19655-m309.jpg

where Inline graphic is Inline graphic’s the initial input.

Step 3. At the same time, each party Inline graphic Inline graphic as the initiator calls Protocol II to compute

graphic file with name srep19655-m314.jpg

where Inline graphic is Inline graphic’s the initial input.

Round 2

Finally, all parties designate an agent who could be one of them to again call Protocol II to compute Inline graphic and to further announce

graphic file with name srep19655-m318.jpg

As for the security of the quantum channel, we can use the decoy technology to check eavesdropping in all proposed protocols. That is, the initiator randomly inserts enough decoy particles into the qubit sequence to be transmitted, where every decoy particle is prepared randomly with either Z-basis (i.e. Inline graphic or X-basis (i.e. Inline graphic. After confirming that the receiver has received the transmitted sequence, the initiator announces the positions of partial decoy particles and the corresponding measurement basis. The receiver measures these decoy particles according to the initiator’s announcements and tells the initiator his measurement results. Then the initiator compares the measurement results of the receiver with the initial states of these corresponding decoy particles in the transmitted sequence and analyzes the security of the transmissions. If the error rate is higher than the threshold determined by the channel noise, they cancel this protocol and restarts; or else they continue to the next step.

In addition, the authenticated quantum channel can further ensure the security of quantum communications. Like most existing secure multiparty quantum computations, our protocols need there is an authenticated quantum channel. This is the only assumption we need to have for proposed protocols to work. In principle, we may use a quantum authentication scheme (QAS)18 based on Clifford operators introduced in19 to implement it. We may also use quantum encryptions combined with classical authenticated keys20,21. In addition, we may still ensure the authentication by sharing the entangled quantum resources in advance22 or using the detecting (or decoy) particle technologies23.

Discussion

In this paper, we presented a novel and efficient quantum approach to systematically compute secure multiparty summation and multiplication. In our approach, there is an initiator who prepares an entangled state and further transmits the partial qubits of the entangled state to every party in turn through the quantum channel. According to the different computations, there are two specific processing ways: the receiver in computing the summation adds his secret into the global phase of the entangled state by an oracle operator, while the receiver in computing the multiplication embeds his secret into the received basis state by another oracle operator. Finally, the initiator takes the transmitted qubits back and subtly extracts out the corresponding summation and multiplication from the phase information by an inverse quantum Fourier transform. More specifically, we proposed several quantum protocols for secure multiparty summation and multiplication, where Protocol I and II have higher efficiency due to the linear communication complexity, and Protocol III and IV provide the unconditional security and the perfect privacy protection with Inline graphic communication complexity.

In conclusion, our approach securely implements the fundamental arithmetic operations (i.e., summation and multiplication) in secret-by-secret way instead of bit-by-bit way, which may give some good references for solving other SMC problems. In theory, it can be generalized to compute lots of secure multiparty numerical computations.

Additional Information

How to cite this article: Shi, R.- et al. Secure Multiparty Quantum Computation for Summation and Multiplication. Sci. Rep. 6, 19655; doi: 10.1038/srep19655 (2016).

Acknowledgments

This work was supported by National Natural Science Foundation of China (Nos 61173187, 61173188 and 11301002), the Ministry of Education institution of higher learning doctor discipline and scientific research fund aids a project financially (No. 20133401110004), Natural Science Foundation of Anhui Province (No. 1408085QF107), and the 211 Project of Anhui University (Nos 33190187 and 17110099).

Footnotes

Author Contributions Study conception, design, and writing of the manuscript: R.-H.S. and Y.M. Analysis and discussion: H.Z., J.C. and S.Z. All authors reviewed the manuscript.

References

  1. Yao A. C. Protocols for secure computations. In Proc. 23rd IEEE Symposium on Foundations of Computer Science (FOCS’ 82), 160 (1982).
  2. Clifton C., Kantarcioglu M., Vaidya J., Lin X. & Zhu M. Y. Tools for Privacy-Preserving Distributed Data Mining. ACM SIGKDD Explorations Newsletter 4, 28–34 (2002). [Google Scholar]
  3. Sanil A. P., Karr A. F., Lin X. & Reiter J. P. Privacy preserving regression modeling via distributed computation. In Proc. the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 677-682 (2004).
  4. Atallah M., Bykova M., Li J., Frikken K. & Tophara M. Private collaborative forecasting and benchmarking. In Proc. the 2004 ACM Workshop on Privacy in the Electronic Society, 103-114 (2004).
  5. Masayuki A. Non-interactive and optimally resilient distributed multiplication (Special Section on Discrete Mathematics and Its Applications). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E83A, 598–605 (2000). [Google Scholar]
  6. Ronald C., Ivan D. & Robbert D. H. Atomic Secure Multi-party Multiplication with Low Communication. In Proc. Advances in Cryptology-EUROCRYPT 2007. LNCS 4515, 329-346 (2007).
  7. Peter L. Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the Protocol. In Proc. 3rd International Conference on Emerging Security Information, Systems and Technologies, 286-291 (2009).
  8. Bennett C. H. & Brassard G. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proc. IEEE International Conference on Computers, Systems, and Signal Processing, 175-179 (1984).
  9. Lo H. K. Insecurity of quantum secure computations. Phys. Rev. A 56, 1154–1162 (1997). [Google Scholar]
  10. Colbeck R. The impossibility of secure two-party classical computation. Phys. Rev. A 76, 062308 (2007). [Google Scholar]
  11. Buhrman H., Christandl M. & Schaffner C. Complete Insecurity of Quantum Protocols for Classical Two-Party Computation. Phys. Rev. Lett. 109, 160501 (2012). [DOI] [PubMed] [Google Scholar]
  12. Crépeau C., Gottesman D. & Smith A. Secure multi-party quantum computation. In Proc. STOC’02 Proceedings of the thirty-fourth annual ACM symposium on Theory of Computing, 643-652 (2002).
  13. Ben-or M., Crépeau C., Gottesman, D., Hassidim, A. & Smith A. Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority. In Proc. FOCS’06, 47th Annual IEEE Symposium on Foundations of Computer Science, 249-260 (2006).
  14. Unruh D. Universally Composable Quantum Multi-party Computation. In Proc. Advances in Cryptology - EUROCRYPT 2010, LNCS 6110, 486-505 (2010).
  15. Du J. Z., Chen X. B., Wen Q. X. & Zhu F. C. Secure multiparty quantum summation. Acta Phys Sin-Ch Ed 56, 6214–6219 (2007). [Google Scholar]
  16. Chen X. B., Xu G., Yang Y. X. & Wen Q. Y. An Efficient Protocol for the Secure Multi-party Quantum Summation. Int J Theor Phys. 49, 2793–2804 (2010). [Google Scholar]
  17. Diao Z. J., Huang C. F. & Wang K. Quantum Counting: Algorithm and Error Distribution. Acta Appl Math. 118, 147–159 (2012). [Google Scholar]
  18. Barnum H., Crépeau C., Gottesman, D., Smith A. & Tapp A. Authentication of quantum messages. In Proc. 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS), 449–458 (2002).
  19. Aharonov D., Ben-Or M. & Eban E. Interactive proofs for quantum computations. In Proc. Innovations in Computer Science, arxiv.org/abs/0810.5375 (2008).
  20. Yu K. F., Yang C. W., Liao C. H. & Hwang T. Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13, 1457–1465 (2014). [Google Scholar]
  21. Guan D. J., Wang Y. J. & Zhuang E. S. A practical protocol for three-party authenticated quantum key distribution. Quantum Inf. Process. 13, 2355–2374 (2014). [Google Scholar]
  22. Farouk A., Zakaria M., Megahed A. & Omara F.A. A generalized architecture of quantum secure direct communication for N disjointed users with authentication. Sci. Rep 5, 16080 (2015). [DOI] [PMC free article] [PubMed] [Google Scholar]
  23. Shi R. H., Mu Y., Zhong H., Cui J. & Zhang S. Two Quantum Protocols for Oblivious Set-member Decision Problem. Sci. Rep 5, 15914 (2015). [DOI] [PMC free article] [PubMed] [Google Scholar]

Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES