-
Secure multi-party ranking problem is used to rank n private integers without leaking further information. It is an extended problem of secure two-party comparing problem. A secure multi-party quantum ranking protocol in semi-honest model is presented based on the a quantum implicit module n+1 addition. The security for multi-parties of the protocol is analyzed.
-
Keywords:
- secure multi-party computation /
- secure multi-party ranking problem /
- quantum implicit module n+1 addition
[1] Yao A C 1982 Proceeding of the 23th IEEE Symposium on Foundations of Computer Science Los Alamitos, CA, November 3—5, 1982 p160
[2] Cachin C 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security Kent Ridge Digital Labs, Singapore November 3—5, 1999 p120
[3] Lin H Y, Tzeng W G 2005 Proceedings of the 4th International Conference on Applied Cryptography and Networks Security Singapore, June 6—9, 2006 p456
[4] Qin B, Qin H, Zhou K F, Wang X F, Wang Y M 2005 Journal of Xi'an University of Technology 21 149 (in Chinese)[秦 波、秦 慧、周克复、王晓峰、王育民 2005 西安理工大学学报 21 149]
[5] Ioannidis I, Grama A 2003 Proceedings of the 36th Annual Hawaii International Conference on System Sciences Big Island, HI, USA, January 6—9, 2003 p2005
[6] Li S D, Dai Y Q, You Q Y 2005 Acta Electronica Sinica 33 769 (in Chinese)[李顺东、戴一奇、游启友 2005 电子学报 33 769]
[7] Li S D, Wang D S, Dai Y Q, Luo P 2008 Information Sciences 178 244
[8] Li S D,Wang D S, Dai Y Q 2009 Science in China Series F: Information Sciences 52 974
[9] Xiao Q, Luo S S, Chen P, Wu B 2008 Acta Electronica Sinica 36 709 (in Chinese)[肖 倩、罗守山、陈 萍、吴 波 2008 电子学报 36 709]
[10] Liu W, Luo S S, Chen P 2007 Journal on Communications 28 1 (in Chinese)[刘 文、罗守山、陈 萍 2007 通信学报 28 1]
[11] Qiu M, Luo S S, Liu W, Chen P 2009 Acta Electronica Sinica 37 1119 (in Chinese)[邱 梅、罗守山、刘 文、陈 萍 2009 电子学报 37 1119]
[12] Shi B S, Jiang Y K, Guo G C 2000 Appl. Phys. B: Laser Opt. B 70 415
[13] Xue P, Li C F, Guo G C 2002 Phys. Rev. A 65 022317
[14] Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 5549 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 物理学报 54 5549]
[15] Yang Y G, Wen Q Y 2007 Chin. Phys. 16 910
[16] Zhang Y S, Li C F, Guo G arXIV: quant-Ph/ 0008044
[17] Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 3995 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 物理学报 54 3995]
[18] Wang Y W, Zhan Y B 2009 Acta Phys. Sin. 58 7668 (in Chinese) [王郁武、詹佑邦 2009 物理学报 58 7668]
[19] Chen P, Deng F G, Long G L 2006 Chin. Phys. 15 2228
[20] Yang Y G, Wen Q Y, Zhu F C 2006 Acta Phys. Sin. 55 3255 (in Chinese) [杨宇光、温巧燕、朱甫臣 2006 物理学报55 3255]
[21] Gu B, Li C Q, Xu F, Chen Y L 2009 Chin. Phys. B 18 4690
[22] Sun Y, Du J Z, Qin S J, Wen Q Y, Zhu F C 2008 Acta Phys. Sin. 57 4689 (in Chinese) [孙 莹、杜建忠、秦素娟、温巧燕、朱甫臣 2008 物理学报 57 4689]
[23] Liu Y L, Man Z X, Xia Y J 2008 Acta Phys. Sin. 57 2680 (in Chinese) [刘玉玲 、满忠晓 、夏云杰 2008 物理学报 57 2680]
[24] Yang Y G, Wen Q Y 2008 Chin. Phys. B 17 419
[25] Wang C, Zhang Y 2009 Chin. Phys. B 18 3238
[26] Mueller Quade J, Imai H 2000 quant-ph/0010112
[27] Crepeau C, Gottesman D, Smith A 2002 Proceedings of 34th Annual ACM Symposium on Theory of Computing Montréal, Québec, Canada, May 19—21, 2002 p643
[28] Cai Q Y, Li B W 2004 Chin. Phys. Lett. 21 601
[29] Tokunaga Y, Okamoto T, Imoto N 2005 Phys. Rev. A 71 012314
[30] Du J Z, Chen X B, Wen Q Y, Zhu F C 2007 Acta Phys. Sin. 56 6214 (in Chinese) [杜建忠、陈秀波、温巧燕、朱甫臣 2007 物理学报 56 6214]
[31] Liu W, Wang Y B 2011 Acta Phys. Sin. 60 030305 (in Chinese) (in Chinese) [刘 文、王永滨 2011 物理学报 60 030305]
[32] Goldreich O 2004 Fountions of Cryptography: Basic Applications (London: Cambridge University Press) p599
-
[1] Yao A C 1982 Proceeding of the 23th IEEE Symposium on Foundations of Computer Science Los Alamitos, CA, November 3—5, 1982 p160
[2] Cachin C 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security Kent Ridge Digital Labs, Singapore November 3—5, 1999 p120
[3] Lin H Y, Tzeng W G 2005 Proceedings of the 4th International Conference on Applied Cryptography and Networks Security Singapore, June 6—9, 2006 p456
[4] Qin B, Qin H, Zhou K F, Wang X F, Wang Y M 2005 Journal of Xi'an University of Technology 21 149 (in Chinese)[秦 波、秦 慧、周克复、王晓峰、王育民 2005 西安理工大学学报 21 149]
[5] Ioannidis I, Grama A 2003 Proceedings of the 36th Annual Hawaii International Conference on System Sciences Big Island, HI, USA, January 6—9, 2003 p2005
[6] Li S D, Dai Y Q, You Q Y 2005 Acta Electronica Sinica 33 769 (in Chinese)[李顺东、戴一奇、游启友 2005 电子学报 33 769]
[7] Li S D, Wang D S, Dai Y Q, Luo P 2008 Information Sciences 178 244
[8] Li S D,Wang D S, Dai Y Q 2009 Science in China Series F: Information Sciences 52 974
[9] Xiao Q, Luo S S, Chen P, Wu B 2008 Acta Electronica Sinica 36 709 (in Chinese)[肖 倩、罗守山、陈 萍、吴 波 2008 电子学报 36 709]
[10] Liu W, Luo S S, Chen P 2007 Journal on Communications 28 1 (in Chinese)[刘 文、罗守山、陈 萍 2007 通信学报 28 1]
[11] Qiu M, Luo S S, Liu W, Chen P 2009 Acta Electronica Sinica 37 1119 (in Chinese)[邱 梅、罗守山、刘 文、陈 萍 2009 电子学报 37 1119]
[12] Shi B S, Jiang Y K, Guo G C 2000 Appl. Phys. B: Laser Opt. B 70 415
[13] Xue P, Li C F, Guo G C 2002 Phys. Rev. A 65 022317
[14] Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 5549 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 物理学报 54 5549]
[15] Yang Y G, Wen Q Y 2007 Chin. Phys. 16 910
[16] Zhang Y S, Li C F, Guo G arXIV: quant-Ph/ 0008044
[17] Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 3995 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 物理学报 54 3995]
[18] Wang Y W, Zhan Y B 2009 Acta Phys. Sin. 58 7668 (in Chinese) [王郁武、詹佑邦 2009 物理学报 58 7668]
[19] Chen P, Deng F G, Long G L 2006 Chin. Phys. 15 2228
[20] Yang Y G, Wen Q Y, Zhu F C 2006 Acta Phys. Sin. 55 3255 (in Chinese) [杨宇光、温巧燕、朱甫臣 2006 物理学报55 3255]
[21] Gu B, Li C Q, Xu F, Chen Y L 2009 Chin. Phys. B 18 4690
[22] Sun Y, Du J Z, Qin S J, Wen Q Y, Zhu F C 2008 Acta Phys. Sin. 57 4689 (in Chinese) [孙 莹、杜建忠、秦素娟、温巧燕、朱甫臣 2008 物理学报 57 4689]
[23] Liu Y L, Man Z X, Xia Y J 2008 Acta Phys. Sin. 57 2680 (in Chinese) [刘玉玲 、满忠晓 、夏云杰 2008 物理学报 57 2680]
[24] Yang Y G, Wen Q Y 2008 Chin. Phys. B 17 419
[25] Wang C, Zhang Y 2009 Chin. Phys. B 18 3238
[26] Mueller Quade J, Imai H 2000 quant-ph/0010112
[27] Crepeau C, Gottesman D, Smith A 2002 Proceedings of 34th Annual ACM Symposium on Theory of Computing Montréal, Québec, Canada, May 19—21, 2002 p643
[28] Cai Q Y, Li B W 2004 Chin. Phys. Lett. 21 601
[29] Tokunaga Y, Okamoto T, Imoto N 2005 Phys. Rev. A 71 012314
[30] Du J Z, Chen X B, Wen Q Y, Zhu F C 2007 Acta Phys. Sin. 56 6214 (in Chinese) [杜建忠、陈秀波、温巧燕、朱甫臣 2007 物理学报 56 6214]
[31] Liu W, Wang Y B 2011 Acta Phys. Sin. 60 030305 (in Chinese) (in Chinese) [刘 文、王永滨 2011 物理学报 60 030305]
[32] Goldreich O 2004 Fountions of Cryptography: Basic Applications (London: Cambridge University Press) p599
Catalog
Metrics
- Abstract views: 8646
- PDF Downloads: 725
- Cited By: 0