-
保密多方排序问题用于多方在不泄漏自己保密数值的前提下安全计算出自己保密数值在这n个数值中的排名情况,该问题是保密两方比较问题的扩展问题.本文设计了一个半诚实模型下的基于量子隐式模n+1加法保密多方量子排序协议,并且详细地分析了该协议对于多方的安全性.
-
关键词:
- 保密多方计算 /
- 保密多方排序问题 /
- 量子隐式模n+1加法
Secure multi-party ranking problem is used to rank n private integers without leaking further information. It is an extended problem of secure two-party comparing problem. A secure multi-party quantum ranking protocol in semi-honest model is presented based on the a quantum implicit module n+1 addition. The security for multi-parties of the protocol is analyzed.-
Keywords:
- secure multi-party computation /
- secure multi-party ranking problem /
- quantum implicit module n+1 addition
[1] Yao A C 1982 Proceeding of the 23th IEEE Symposium on Foundations of Computer Science Los Alamitos, CA, November 3—5, 1982 p160
[2] Cachin C 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security Kent Ridge Digital Labs, Singapore November 3—5, 1999 p120
[3] Lin H Y, Tzeng W G 2005 Proceedings of the 4th International Conference on Applied Cryptography and Networks Security Singapore, June 6—9, 2006 p456
[4] Qin B, Qin H, Zhou K F, Wang X F, Wang Y M 2005 Journal of Xi'an University of Technology 21 149 (in Chinese)[秦 波、秦 慧、周克复、王晓峰、王育民 2005 西安理工大学学报 21 149]
[5] Ioannidis I, Grama A 2003 Proceedings of the 36th Annual Hawaii International Conference on System Sciences Big Island, HI, USA, January 6—9, 2003 p2005
[6] Li S D, Dai Y Q, You Q Y 2005 Acta Electronica Sinica 33 769 (in Chinese)[李顺东、戴一奇、游启友 2005 电子学报 33 769]
[7] Li S D, Wang D S, Dai Y Q, Luo P 2008 Information Sciences 178 244
[8] Li S D,Wang D S, Dai Y Q 2009 Science in China Series F: Information Sciences 52 974
[9] Xiao Q, Luo S S, Chen P, Wu B 2008 Acta Electronica Sinica 36 709 (in Chinese)[肖 倩、罗守山、陈 萍、吴 波 2008 电子学报 36 709]
[10] Liu W, Luo S S, Chen P 2007 Journal on Communications 28 1 (in Chinese)[刘 文、罗守山、陈 萍 2007 通信学报 28 1]
[11] Qiu M, Luo S S, Liu W, Chen P 2009 Acta Electronica Sinica 37 1119 (in Chinese)[邱 梅、罗守山、刘 文、陈 萍 2009 电子学报 37 1119]
[12] Shi B S, Jiang Y K, Guo G C 2000 Appl. Phys. B: Laser Opt. B 70 415
[13] Xue P, Li C F, Guo G C 2002 Phys. Rev. A 65 022317
[14] Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 5549 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 54 5549]
[15] Yang Y G, Wen Q Y 2007 Chin. Phys. 16 910
[16] Zhang Y S, Li C F, Guo G arXIV: quant-Ph/ 0008044
[17] Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 3995 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 54 3995]
[18] Wang Y W, Zhan Y B 2009 Acta Phys. Sin. 58 7668 (in Chinese) [王郁武、詹佑邦 2009 58 7668]
[19] Chen P, Deng F G, Long G L 2006 Chin. Phys. 15 2228
[20] Yang Y G, Wen Q Y, Zhu F C 2006 Acta Phys. Sin. 55 3255 (in Chinese) [杨宇光、温巧燕、朱甫臣 2006 55 3255]
[21] Gu B, Li C Q, Xu F, Chen Y L 2009 Chin. Phys. B 18 4690
[22] Sun Y, Du J Z, Qin S J, Wen Q Y, Zhu F C 2008 Acta Phys. Sin. 57 4689 (in Chinese) [孙 莹、杜建忠、秦素娟、温巧燕、朱甫臣 2008 57 4689]
[23] Liu Y L, Man Z X, Xia Y J 2008 Acta Phys. Sin. 57 2680 (in Chinese) [刘玉玲 、满忠晓 、夏云杰 2008 57 2680]
[24] Yang Y G, Wen Q Y 2008 Chin. Phys. B 17 419
[25] Wang C, Zhang Y 2009 Chin. Phys. B 18 3238
[26] Mueller Quade J, Imai H 2000 quant-ph/0010112
[27] Crepeau C, Gottesman D, Smith A 2002 Proceedings of 34th Annual ACM Symposium on Theory of Computing Montréal, Québec, Canada, May 19—21, 2002 p643
[28] Cai Q Y, Li B W 2004 Chin. Phys. Lett. 21 601
[29] Tokunaga Y, Okamoto T, Imoto N 2005 Phys. Rev. A 71 012314
[30] Du J Z, Chen X B, Wen Q Y, Zhu F C 2007 Acta Phys. Sin. 56 6214 (in Chinese) [杜建忠、陈秀波、温巧燕、朱甫臣 2007 56 6214]
[31] Liu W, Wang Y B 2011 Acta Phys. Sin. 60 030305 (in Chinese) (in Chinese) [刘 文、王永滨 2011 60 030305]
[32] Goldreich O 2004 Fountions of Cryptography: Basic Applications (London: Cambridge University Press) p599
-
[1] Yao A C 1982 Proceeding of the 23th IEEE Symposium on Foundations of Computer Science Los Alamitos, CA, November 3—5, 1982 p160
[2] Cachin C 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security Kent Ridge Digital Labs, Singapore November 3—5, 1999 p120
[3] Lin H Y, Tzeng W G 2005 Proceedings of the 4th International Conference on Applied Cryptography and Networks Security Singapore, June 6—9, 2006 p456
[4] Qin B, Qin H, Zhou K F, Wang X F, Wang Y M 2005 Journal of Xi'an University of Technology 21 149 (in Chinese)[秦 波、秦 慧、周克复、王晓峰、王育民 2005 西安理工大学学报 21 149]
[5] Ioannidis I, Grama A 2003 Proceedings of the 36th Annual Hawaii International Conference on System Sciences Big Island, HI, USA, January 6—9, 2003 p2005
[6] Li S D, Dai Y Q, You Q Y 2005 Acta Electronica Sinica 33 769 (in Chinese)[李顺东、戴一奇、游启友 2005 电子学报 33 769]
[7] Li S D, Wang D S, Dai Y Q, Luo P 2008 Information Sciences 178 244
[8] Li S D,Wang D S, Dai Y Q 2009 Science in China Series F: Information Sciences 52 974
[9] Xiao Q, Luo S S, Chen P, Wu B 2008 Acta Electronica Sinica 36 709 (in Chinese)[肖 倩、罗守山、陈 萍、吴 波 2008 电子学报 36 709]
[10] Liu W, Luo S S, Chen P 2007 Journal on Communications 28 1 (in Chinese)[刘 文、罗守山、陈 萍 2007 通信学报 28 1]
[11] Qiu M, Luo S S, Liu W, Chen P 2009 Acta Electronica Sinica 37 1119 (in Chinese)[邱 梅、罗守山、刘 文、陈 萍 2009 电子学报 37 1119]
[12] Shi B S, Jiang Y K, Guo G C 2000 Appl. Phys. B: Laser Opt. B 70 415
[13] Xue P, Li C F, Guo G C 2002 Phys. Rev. A 65 022317
[14] Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 5549 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 54 5549]
[15] Yang Y G, Wen Q Y 2007 Chin. Phys. 16 910
[16] Zhang Y S, Li C F, Guo G arXIV: quant-Ph/ 0008044
[17] Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 3995 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 54 3995]
[18] Wang Y W, Zhan Y B 2009 Acta Phys. Sin. 58 7668 (in Chinese) [王郁武、詹佑邦 2009 58 7668]
[19] Chen P, Deng F G, Long G L 2006 Chin. Phys. 15 2228
[20] Yang Y G, Wen Q Y, Zhu F C 2006 Acta Phys. Sin. 55 3255 (in Chinese) [杨宇光、温巧燕、朱甫臣 2006 55 3255]
[21] Gu B, Li C Q, Xu F, Chen Y L 2009 Chin. Phys. B 18 4690
[22] Sun Y, Du J Z, Qin S J, Wen Q Y, Zhu F C 2008 Acta Phys. Sin. 57 4689 (in Chinese) [孙 莹、杜建忠、秦素娟、温巧燕、朱甫臣 2008 57 4689]
[23] Liu Y L, Man Z X, Xia Y J 2008 Acta Phys. Sin. 57 2680 (in Chinese) [刘玉玲 、满忠晓 、夏云杰 2008 57 2680]
[24] Yang Y G, Wen Q Y 2008 Chin. Phys. B 17 419
[25] Wang C, Zhang Y 2009 Chin. Phys. B 18 3238
[26] Mueller Quade J, Imai H 2000 quant-ph/0010112
[27] Crepeau C, Gottesman D, Smith A 2002 Proceedings of 34th Annual ACM Symposium on Theory of Computing Montréal, Québec, Canada, May 19—21, 2002 p643
[28] Cai Q Y, Li B W 2004 Chin. Phys. Lett. 21 601
[29] Tokunaga Y, Okamoto T, Imoto N 2005 Phys. Rev. A 71 012314
[30] Du J Z, Chen X B, Wen Q Y, Zhu F C 2007 Acta Phys. Sin. 56 6214 (in Chinese) [杜建忠、陈秀波、温巧燕、朱甫臣 2007 56 6214]
[31] Liu W, Wang Y B 2011 Acta Phys. Sin. 60 030305 (in Chinese) (in Chinese) [刘 文、王永滨 2011 60 030305]
[32] Goldreich O 2004 Fountions of Cryptography: Basic Applications (London: Cambridge University Press) p599
计量
- 文章访问数: 8238
- PDF下载量: 725
- 被引次数: 0