-
保密两方比较问题用于两方在不泄漏自己保密数值的前提下判断两数值的大小,但现有的解决方案无法对抗强大的量子攻击.设计了一个半诚实模型下的基于量子隐式模n+1加法保密两方量子比较协议,并且详细地分析了该协议的安全性.
-
关键词:
- 保密两方计算 /
- 保密两方比较问题 /
- 量子隐式模n+1加法
Secure two-party comparing problem is used to compare two private integer without further leaking of information. But in case of the quantum computer the currently available solutions become useless. A secure two-party quantum comparing protocol in semi-honest model is presented based on the a quantum implicit module n+1 addition. The security of the protocol is analyzed.-
Keywords:
- secure two-party computation /
- secure two-party vector dominance statistic problem /
- quantum implicit module n+1 addition
[1] Yao A C 1982 Proceeding of the 23th IEEE Symposium on Foundations of Computer Science Los Alamitos, CA, November 3—5, 1982 p160
[2] Cachin C 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security Kent Ridge Digital Labs, Singapore November 3—5, 1999 p120
[3] Lin H Y, Tzeng W G 2005 Proceedings of the 4th International Conference on Applied Cryptography and Networks Security Singapore, June 6—9, 2006 p456
[4] Qin B, Qin H, Zhou K F, Wang X F, Wang Y M 2005 Journal of Xi’an University of Technology 21 149 (in Chinese)[秦 波、秦 慧、周克复、王晓峰、王育民 2005 西安理工大学学报 21 149]
[5] Ioannidis I, Grama A 2003 Proceedings of the 36th Annual Hawaii International Conference on System Sciences Big Island, HI, USA, January 6—9, 2003 p2005
[6] Li S D, Dai Y Q, You Q Y 2005 Acta Electronica Sinica 33 769 (in Chinese)[李顺东、戴一奇、游启友 2005电子学报 33 769]
[7] Li S D, Wang D S, Dai Y Q, Luo P 2008 Information Sciences 178 244
[8] Li S D,Wang D S, Dai Y Q 2009 Science in China Series F: Information Sciences 52 974
[9] Shi B S, Jiang Y K, Guo G C 2000 Appl. Phys. B: Laser Opt. B 70 415
[10] Xue P, Li C F, Guo G C 2002 Phys. Rev. A 65 022317
[11] Zhang Y S, Li C F, Guo G C arXIV: quant-Ph/ 0008044
[12] Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 3995 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 54 3995]
[13] Chen P, Deng F G, Long G L 2006 Chin. Phys. 15 2228
[14] Yang Y G, Wen Q Y, Zhu F C 2006 Acta Phys. Sin. 55 3255 (in Chinese) [杨宇光、温巧燕、朱甫臣 2006 55 3255]
[15] Gu B, Li C Q, Xu F, Chen Y L 2009 Chin. Phys. B 18 4690
[16] Wang C, Zhang Y 2009 Chin. Physi. B 18 3238
[17] J.Mueller Quade, H.Imai 2000 quant-ph/0010112
[18] Crepeau C, Gottesman D, Smith A 2002 Proceedings of 34th Annual ACM Symposium on Theory of Computing Montréal, Québec, Canada, May 19—21, 2002 p643
[19] Tokunaga Y, Okamoto T, Imoto N 2005 Phys. Rev. A 71 012314
[20] Cai Q Y, Li B W 2004 Chin. Phys. Lett. 21 601
[21] Du J Z, Chen X B, Wen Q Y, Zhu F C 2007 Acta Phys. Sin. 56 6214 (in Chinese) [杜建忠、陈秀波、温巧燕、朱甫臣 2007 56 6214]
[22] Goldreich O 2004 Fountions of Cryptography: Basic Applications (London: Cambridge University Press) p599
-
[1] Yao A C 1982 Proceeding of the 23th IEEE Symposium on Foundations of Computer Science Los Alamitos, CA, November 3—5, 1982 p160
[2] Cachin C 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security Kent Ridge Digital Labs, Singapore November 3—5, 1999 p120
[3] Lin H Y, Tzeng W G 2005 Proceedings of the 4th International Conference on Applied Cryptography and Networks Security Singapore, June 6—9, 2006 p456
[4] Qin B, Qin H, Zhou K F, Wang X F, Wang Y M 2005 Journal of Xi’an University of Technology 21 149 (in Chinese)[秦 波、秦 慧、周克复、王晓峰、王育民 2005 西安理工大学学报 21 149]
[5] Ioannidis I, Grama A 2003 Proceedings of the 36th Annual Hawaii International Conference on System Sciences Big Island, HI, USA, January 6—9, 2003 p2005
[6] Li S D, Dai Y Q, You Q Y 2005 Acta Electronica Sinica 33 769 (in Chinese)[李顺东、戴一奇、游启友 2005电子学报 33 769]
[7] Li S D, Wang D S, Dai Y Q, Luo P 2008 Information Sciences 178 244
[8] Li S D,Wang D S, Dai Y Q 2009 Science in China Series F: Information Sciences 52 974
[9] Shi B S, Jiang Y K, Guo G C 2000 Appl. Phys. B: Laser Opt. B 70 415
[10] Xue P, Li C F, Guo G C 2002 Phys. Rev. A 65 022317
[11] Zhang Y S, Li C F, Guo G C arXIV: quant-Ph/ 0008044
[12] Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 3995 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 54 3995]
[13] Chen P, Deng F G, Long G L 2006 Chin. Phys. 15 2228
[14] Yang Y G, Wen Q Y, Zhu F C 2006 Acta Phys. Sin. 55 3255 (in Chinese) [杨宇光、温巧燕、朱甫臣 2006 55 3255]
[15] Gu B, Li C Q, Xu F, Chen Y L 2009 Chin. Phys. B 18 4690
[16] Wang C, Zhang Y 2009 Chin. Physi. B 18 3238
[17] J.Mueller Quade, H.Imai 2000 quant-ph/0010112
[18] Crepeau C, Gottesman D, Smith A 2002 Proceedings of 34th Annual ACM Symposium on Theory of Computing Montréal, Québec, Canada, May 19—21, 2002 p643
[19] Tokunaga Y, Okamoto T, Imoto N 2005 Phys. Rev. A 71 012314
[20] Cai Q Y, Li B W 2004 Chin. Phys. Lett. 21 601
[21] Du J Z, Chen X B, Wen Q Y, Zhu F C 2007 Acta Phys. Sin. 56 6214 (in Chinese) [杜建忠、陈秀波、温巧燕、朱甫臣 2007 56 6214]
[22] Goldreich O 2004 Fountions of Cryptography: Basic Applications (London: Cambridge University Press) p599
计量
- 文章访问数: 7859
- PDF下载量: 981
- 被引次数: 0