Search

Article

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

Research of quantum secure multi-party ranking protocol

Liu Wen Wang Yong-Bin

Citation:

Research of quantum secure multi-party ranking protocol

Liu Wen, Wang Yong-Bin
PDF
Get Citation

(PLEASE TRANSLATE TO ENGLISH

BY GOOGLE TRANSLATE IF NEEDED.)

  • Secure multi-party ranking problem is used to rank n private integers without leaking further information. It is an extended problem of secure two-party comparing problem. A secure multi-party quantum ranking protocol in semi-honest model is presented based on the a quantum implicit module n+1 addition. The security for multi-parties of the protocol is analyzed.
    [1]

    Yao A C 1982 Proceeding of the 23th IEEE Symposium on Foundations of Computer Science Los Alamitos, CA, November 3—5, 1982 p160

    [2]

    Cachin C 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security Kent Ridge Digital Labs, Singapore November 3—5, 1999 p120

    [3]

    Lin H Y, Tzeng W G 2005 Proceedings of the 4th International Conference on Applied Cryptography and Networks Security Singapore, June 6—9, 2006 p456

    [4]

    Qin B, Qin H, Zhou K F, Wang X F, Wang Y M 2005 Journal of Xi'an University of Technology 21 149 (in Chinese)[秦 波、秦 慧、周克复、王晓峰、王育民 2005 西安理工大学学报 21 149]

    [5]

    Ioannidis I, Grama A 2003 Proceedings of the 36th Annual Hawaii International Conference on System Sciences Big Island, HI, USA, January 6—9, 2003 p2005

    [6]

    Li S D, Dai Y Q, You Q Y 2005 Acta Electronica Sinica 33 769 (in Chinese)[李顺东、戴一奇、游启友 2005 电子学报 33 769]

    [7]

    Li S D, Wang D S, Dai Y Q, Luo P 2008 Information Sciences 178 244

    [8]

    Li S D,Wang D S, Dai Y Q 2009 Science in China Series F: Information Sciences 52 974

    [9]

    Xiao Q, Luo S S, Chen P, Wu B 2008 Acta Electronica Sinica 36 709 (in Chinese)[肖 倩、罗守山、陈 萍、吴 波 2008 电子学报 36 709]

    [10]

    Liu W, Luo S S, Chen P 2007 Journal on Communications 28 1 (in Chinese)[刘 文、罗守山、陈 萍 2007 通信学报 28 1]

    [11]

    Qiu M, Luo S S, Liu W, Chen P 2009 Acta Electronica Sinica 37 1119 (in Chinese)[邱 梅、罗守山、刘 文、陈 萍 2009 电子学报 37 1119]

    [12]

    Shi B S, Jiang Y K, Guo G C 2000 Appl. Phys. B: Laser Opt. B 70 415

    [13]

    Xue P, Li C F, Guo G C 2002 Phys. Rev. A 65 022317

    [14]

    Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 5549 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 54 5549]

    [15]

    Yang Y G, Wen Q Y 2007 Chin. Phys. 16 910

    [16]

    Zhang Y S, Li C F, Guo G arXIV: quant-Ph/ 0008044

    [17]

    Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 3995 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 54 3995]

    [18]

    Wang Y W, Zhan Y B 2009 Acta Phys. Sin. 58 7668 (in Chinese) [王郁武、詹佑邦 2009 58 7668]

    [19]

    Chen P, Deng F G, Long G L 2006 Chin. Phys. 15 2228

    [20]

    Yang Y G, Wen Q Y, Zhu F C 2006 Acta Phys. Sin. 55 3255 (in Chinese) [杨宇光、温巧燕、朱甫臣 2006 55 3255]

    [21]

    Gu B, Li C Q, Xu F, Chen Y L 2009 Chin. Phys. B 18 4690

    [22]

    Sun Y, Du J Z, Qin S J, Wen Q Y, Zhu F C 2008 Acta Phys. Sin. 57 4689 (in Chinese) [孙 莹、杜建忠、秦素娟、温巧燕、朱甫臣 2008 57 4689]

    [23]

    Liu Y L, Man Z X, Xia Y J 2008 Acta Phys. Sin. 57 2680 (in Chinese) [刘玉玲 、满忠晓 、夏云杰 2008 57 2680]

    [24]

    Yang Y G, Wen Q Y 2008 Chin. Phys. B 17 419

    [25]

    Wang C, Zhang Y 2009 Chin. Phys. B 18 3238

    [26]

    Mueller Quade J, Imai H 2000 quant-ph/0010112

    [27]

    Crepeau C, Gottesman D, Smith A 2002 Proceedings of 34th Annual ACM Symposium on Theory of Computing Montréal, Québec, Canada, May 19—21, 2002 p643

    [28]

    Cai Q Y, Li B W 2004 Chin. Phys. Lett. 21 601

    [29]

    Tokunaga Y, Okamoto T, Imoto N 2005 Phys. Rev. A 71 012314

    [30]

    Du J Z, Chen X B, Wen Q Y, Zhu F C 2007 Acta Phys. Sin. 56 6214 (in Chinese) [杜建忠、陈秀波、温巧燕、朱甫臣 2007 56 6214]

    [31]

    Liu W, Wang Y B 2011 Acta Phys. Sin. 60 030305 (in Chinese) (in Chinese) [刘 文、王永滨 2011 60 030305]

    [32]

    Goldreich O 2004 Fountions of Cryptography: Basic Applications (London: Cambridge University Press) p599

  • [1]

    Yao A C 1982 Proceeding of the 23th IEEE Symposium on Foundations of Computer Science Los Alamitos, CA, November 3—5, 1982 p160

    [2]

    Cachin C 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security Kent Ridge Digital Labs, Singapore November 3—5, 1999 p120

    [3]

    Lin H Y, Tzeng W G 2005 Proceedings of the 4th International Conference on Applied Cryptography and Networks Security Singapore, June 6—9, 2006 p456

    [4]

    Qin B, Qin H, Zhou K F, Wang X F, Wang Y M 2005 Journal of Xi'an University of Technology 21 149 (in Chinese)[秦 波、秦 慧、周克复、王晓峰、王育民 2005 西安理工大学学报 21 149]

    [5]

    Ioannidis I, Grama A 2003 Proceedings of the 36th Annual Hawaii International Conference on System Sciences Big Island, HI, USA, January 6—9, 2003 p2005

    [6]

    Li S D, Dai Y Q, You Q Y 2005 Acta Electronica Sinica 33 769 (in Chinese)[李顺东、戴一奇、游启友 2005 电子学报 33 769]

    [7]

    Li S D, Wang D S, Dai Y Q, Luo P 2008 Information Sciences 178 244

    [8]

    Li S D,Wang D S, Dai Y Q 2009 Science in China Series F: Information Sciences 52 974

    [9]

    Xiao Q, Luo S S, Chen P, Wu B 2008 Acta Electronica Sinica 36 709 (in Chinese)[肖 倩、罗守山、陈 萍、吴 波 2008 电子学报 36 709]

    [10]

    Liu W, Luo S S, Chen P 2007 Journal on Communications 28 1 (in Chinese)[刘 文、罗守山、陈 萍 2007 通信学报 28 1]

    [11]

    Qiu M, Luo S S, Liu W, Chen P 2009 Acta Electronica Sinica 37 1119 (in Chinese)[邱 梅、罗守山、刘 文、陈 萍 2009 电子学报 37 1119]

    [12]

    Shi B S, Jiang Y K, Guo G C 2000 Appl. Phys. B: Laser Opt. B 70 415

    [13]

    Xue P, Li C F, Guo G C 2002 Phys. Rev. A 65 022317

    [14]

    Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 5549 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 54 5549]

    [15]

    Yang Y G, Wen Q Y 2007 Chin. Phys. 16 910

    [16]

    Zhang Y S, Li C F, Guo G arXIV: quant-Ph/ 0008044

    [17]

    Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 3995 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 54 3995]

    [18]

    Wang Y W, Zhan Y B 2009 Acta Phys. Sin. 58 7668 (in Chinese) [王郁武、詹佑邦 2009 58 7668]

    [19]

    Chen P, Deng F G, Long G L 2006 Chin. Phys. 15 2228

    [20]

    Yang Y G, Wen Q Y, Zhu F C 2006 Acta Phys. Sin. 55 3255 (in Chinese) [杨宇光、温巧燕、朱甫臣 2006 55 3255]

    [21]

    Gu B, Li C Q, Xu F, Chen Y L 2009 Chin. Phys. B 18 4690

    [22]

    Sun Y, Du J Z, Qin S J, Wen Q Y, Zhu F C 2008 Acta Phys. Sin. 57 4689 (in Chinese) [孙 莹、杜建忠、秦素娟、温巧燕、朱甫臣 2008 57 4689]

    [23]

    Liu Y L, Man Z X, Xia Y J 2008 Acta Phys. Sin. 57 2680 (in Chinese) [刘玉玲 、满忠晓 、夏云杰 2008 57 2680]

    [24]

    Yang Y G, Wen Q Y 2008 Chin. Phys. B 17 419

    [25]

    Wang C, Zhang Y 2009 Chin. Phys. B 18 3238

    [26]

    Mueller Quade J, Imai H 2000 quant-ph/0010112

    [27]

    Crepeau C, Gottesman D, Smith A 2002 Proceedings of 34th Annual ACM Symposium on Theory of Computing Montréal, Québec, Canada, May 19—21, 2002 p643

    [28]

    Cai Q Y, Li B W 2004 Chin. Phys. Lett. 21 601

    [29]

    Tokunaga Y, Okamoto T, Imoto N 2005 Phys. Rev. A 71 012314

    [30]

    Du J Z, Chen X B, Wen Q Y, Zhu F C 2007 Acta Phys. Sin. 56 6214 (in Chinese) [杜建忠、陈秀波、温巧燕、朱甫臣 2007 56 6214]

    [31]

    Liu W, Wang Y B 2011 Acta Phys. Sin. 60 030305 (in Chinese) (in Chinese) [刘 文、王永滨 2011 60 030305]

    [32]

    Goldreich O 2004 Fountions of Cryptography: Basic Applications (London: Cambridge University Press) p599

  • [1] Tang Jie, Shi Lei, Wei Jia-Hua, Yu Hui-Cun, Xue Yang, Wu Tian-Xiong. Multi-party quantum key agreement based on d-level GHZ states. Acta Physica Sinica, 2020, 69(20): 200301. doi: 10.7498/aps.69.20200799
    [2] Yang Lu, Ma Hong-Yang, Zheng Chao, Ding Xiao-Lan, Gao Jian-Cun, Long Gui-Lu. Quantum communication scheme based on quantum teleportation. Acta Physica Sinica, 2017, 66(23): 230303. doi: 10.7498/aps.66.230303
    [3] Li Shu, Li Gang, Tian Dong-Feng, Deng Li. An implicit Monte Carlo method for thermal radiation transport. Acta Physica Sinica, 2013, 62(24): 249501. doi: 10.7498/aps.62.249501
    [4] Lei Jun, Ma Song-Hua, Fang Jian-Ping. Multiple quadrate soliton solutions and chaotic behaviours of (2+1)-dimensional breaking soliton equation. Acta Physica Sinica, 2011, 60(5): 050302. doi: 10.7498/aps.60.050302
    [5] Liu Wen, Wang Yong-Bin. Research of secure two-party quantum comparing protocol. Acta Physica Sinica, 2011, 60(3): 030305. doi: 10.7498/aps.60.030305
    [6] Min Fu-Hong, Wang En-Rong. Dislocated projective synchronization of Qi hyper-chaotic system and its application to secure communication. Acta Physica Sinica, 2010, 59(11): 7657-7662. doi: 10.7498/aps.59.7657
    [7] Wang Ming-Jun, Wang Xing-Yuan. A secure communication scheme based on parameter identification of first order time-delay chaotic system. Acta Physica Sinica, 2009, 58(3): 1467-1472. doi: 10.7498/aps.58.1467
    [8] Guo Dong-Ming, Yang Ling-Zhen, Wang An-Bang, Zhang Xiu-Juan, Wang Yun-Cai. Modulation of feedback strength to enhance the security of chaos optical communication system. Acta Physica Sinica, 2009, 58(12): 8275-8280. doi: 10.7498/aps.58.8275
    [9] Li Nong, Li Jian-Fen. Generalized projective synchronization of chaotic system based on a single driving variable and its application in secure communication. Acta Physica Sinica, 2008, 57(10): 6093-6098. doi: 10.7498/aps.57.6093
    [10] Hu Jin-Feng, Guo Jing-Bo. Breaking a chaotic direct sequence spreading spectrum secure communication system. Acta Physica Sinica, 2008, 57(3): 1477-1484. doi: 10.7498/aps.57.1477
    [11] Yan Sen-Lin. Studies on dual-core-bidirectional optical fiber chaotic secure communication system. Acta Physica Sinica, 2008, 57(5): 2819-2826. doi: 10.7498/aps.57.2819
    [12] Wang Tian-Yin, Qin Su-Juan, Wen Qiao-Yan, Zhun Fu-Chen. Analysis and improvement of multiparty controlled quantum secure direct communication protocol. Acta Physica Sinica, 2008, 57(12): 7452-7456. doi: 10.7498/aps.57.7452
    [13] Wang Jian, Chen Huang-Qing, Zhang Quan, Tang Chao-Jing. Multiparty controlled quantum secure direct communication protocol. Acta Physica Sinica, 2007, 56(2): 673-677. doi: 10.7498/aps.56.673
    [14] Du Jian-Zhong, Chen Xiu-Bo, Wen Qiao-Yan, Zhu Fu-Chen. Secure multiparty quantum summation. Acta Physica Sinica, 2007, 56(11): 6214-6219. doi: 10.7498/aps.56.6214
    [15] Sun Lin, Jiang De-Ping. A switch-modulated method for hyperchaotic digital secure communications based on drive functions. Acta Physica Sinica, 2006, 55(7): 3283-3288. doi: 10.7498/aps.55.3283
    [16] Yu Ling-Hui, Fang Jian-Cheng. Synchronization of chaotic neural networks based on adaptive inverse control and its applications in secure communications. Acta Physica Sinica, 2005, 54(9): 4012-4018. doi: 10.7498/aps.54.4012
    [17] Yan Sen-Lin. Theoretical studies on optical fiber secure communication using chaotic phase encoding. Acta Physica Sinica, 2005, 54(5): 2000-2006. doi: 10.7498/aps.54.2000
    [18] Tang Zhi-Lie, Li Ming, Wei Zheng-Jun, Lu Fei, Liao Chang-Jun, Liu Song-Hao. The quantum key distribution system based on polarization states produced by phase modulation. Acta Physica Sinica, 2005, 54(6): 2534-2539. doi: 10.7498/aps.54.2534
    [19] Yang Yu-Guang, Wen Qiao-Yan, Zhu Fu-Chen. Multi-party multi-level quantum key distribution protocol based on entanglement swapping. Acta Physica Sinica, 2005, 54(12): 5544-5548. doi: 10.7498/aps.54.5544
    [20] Li Jian-Fen, Li Nong, Lin Hui. Secure communication method for fast-varying information signal based on chaotic modulation. Acta Physica Sinica, 2004, 53(6): 1694-1698. doi: 10.7498/aps.53.1694
Metrics
  • Abstract views:  8725
  • PDF Downloads:  726
  • Cited By: 0
Publishing process
  • Received Date:  26 July 2010
  • Accepted Date:  14 October 2010
  • Published Online:  15 July 2011

/

返回文章
返回
Baidu
map