Next Article in Journal
Advancing Synthetic R&D Through Scenarios: Integrating Science, Technology, and Stakeholder Needs
Previous Article in Journal
Transient Performance Improvement for Sustainability and Robustness Coverage in Hybrid Battery Management System ASIC Integration for Solar Energy Conversion
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quantum Security Multi-Party Extremum Protocol with Greenberger–Horne–Zeilinger States

1
School of Artificial Intelligence, Xiamen Institute of Technology, Xiamen 361021, China
2
Artificial Intelligence Research Institute, Xiamen Institute of Technology, Xiamen 361021, China
3
College of Computer and Data Science, Fuzhou University, Fuzhou 350108, China
4
School of Mathematics and Statistics, Fujian Normal University, Fuzhou 350007, China
5
College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350007, China
*
Authors to whom correspondence should be addressed.
Technologies 2025, 13(10), 431; https://doi.org/10.3390/technologies13100431
Submission received: 28 July 2025 / Revised: 19 September 2025 / Accepted: 22 September 2025 / Published: 24 September 2025
(This article belongs to the Section Quantum Technologies)

Abstract

Secure multi-party extremum, as a significant offshoot of secure multi-party computation, has extensive applications in various domains, including healthcare, financial transactions, market analysis, sports events, etc. Nevertheless, most existing secure multi-party extremum protocols rely on computational hard problems and are thus vulnerable to quantum algorithms. This paper presents a quantum secure multi-party extremum protocol that is built upon the correlations of Greenberger–Horne–Zeilinger (GHZ) states. Within this protocol, multiple participants, with the aid of a semi-honest third party, can obtain the maximum and minimum values of their secret inputs. GHZ states act as the information carriers and are transmitted among the participants and the third party. Their unique correlations ensure the secure transmission of quantum particles. The analysis demonstrates that the proposed protocol is capable of not only warding off common external attacks but also resisting internal attacks launched by dishonest participants and the semi-honest third party. Moreover, the protocol boasts correctness and high scalability.

1. Introduction

Quantum cryptography is an innovative integration of quantum mechanics and cryptography. Unlike traditional cryptography, which hinges on computational complexity, quantum cryptography is built on the fundamental principles of quantum mechanics, providing significantly enhanced security. Since Bennett and Brassard introduced the pioneering quantum key distribution protocol (BB84 protocol) [1], researchers have developed a wide array of quantum cryptographic protocols. These protocols address complex security tasks that are challenging for traditional cryptography, such as quantum key distribution (QKD) [2,3,4,5], quantum secret sharing (QSS) [6,7,8,9], quantum secure direct communication (QSDC) [10,11,12], and more.
Secure multi-party computation (SMPC), a major branch of cryptography, has extensive applications across various fields, including finance, healthcare, social networking, data analysis, and beyond. Quantum secure multi-party computation, which harnesses the unique properties of quantum mechanics to effectively solve some SMPC tasks, has made remarkable research progress in recent years. It has established a relatively comprehensive theoretical framework and has been applied to address numerous practical privacy-preservation challenges in the information age, such as private comparison problems [13,14,15], private query problems [16,17,18], private set computation problems [19,20,21,22], private scientific computing problems [23,24,25,26,27], private geometric computation problems [28], and other practical SMPC issues. Moreover, to deepen understanding of the quantum-classical boundary and lower the barriers to entry for quantum technology, a series of semi-quantum SMPC protocols [29,30,31,32,33,34,35,36] have been proposed, meaning the gradual practicalization of quantum secure multi-party computation. Calculating the minimum (or maximum) value of multiple private inputs is a highly significant problem in private scientific computing. In 2022, Shi et al. proposed the first quantum protocol for privately computing the logical OR [37]. Based on this work, the secure task of privately computing the maximum value was accomplished using single particles. Subsequently, Kong et al. introduced the first protocol for privately computing the minimum value [38]. To achieve this, they designed two quantum-secure MPC protocols for the logical AND operation, which can respectively resist collective dephasing noise and collective rotation noise. In 2024, Lu and Ding proposed two quantum secure extremum protocols utilizing d-dimensional particles [39]. One protocol is for privately computing the maximum and minimum values, while the other protocol is for privately computing the sum and difference of extremums. Inspired by these works, we propose a quantum-secure MPC extremum protocol based on GHZ states, in which multiple participants compute the maximum and minimum values of their private inputs with the assistance of a semi-honest third party. In this protocol, the GHZ states are prepared by the third party and distributed to each participant. The correlation properties of GHZ states are utilized to design an eavesdropping detection process, ensuring the security of particle transmission. At the end of the protocol, all participants simultaneously obtain the maximum and minimum values, keeping these results and the private inputs confidential from others, including the third party.
The remainder of this paper is organized as follows. The relevant preliminary knowledge related to this paper is introduced in Section 2. Subsequently, the proposed three-party quantum private extremum protocol is presented in Section 3. The proposed protocol’s security, scalability, and correctness are analyzed in Section 4, Section 5, and Section 6, respectively. After that, the performance of this protocol is discussed in Section 7. Finally, Section 8 provides a short conclusion.

2. Preliminary

2.1. Security Multi-Party Extremum

Secure multi-party computation refers to a scenario where two or more mutually distrustful participants collaborate to solve a computational problem. After the computation is completed, each participant only obtains the result without gaining any private information about the other participants’ inputs. Since Yao proposed the two-party secure computation problem, known as Yao’s Millionaires’ Problem, in 1982, numerous scholars have conducted research on secure multi-party computation, which has now become an important research hotspot in the field of cryptography. Secure multi-party extremum (SME) is a new research branch within secure multi-party computation that has wide applications in fields such as healthcare, financial transactions, market analysis, sports events, and so on. For instance, in psychology, the difference between the maximum and minimum values is known as the total range. It is an important measurement indicator in psychology, and utilizing this range helps in the early detection of psychological disorders, enabling preventive measures to be taken. Meanwhile, to protect user privacy, specific user data should not be disclosed.
In a secure multi-party extremum protocol, there are multiple participants, each possessing a private data value. They wish to securely compute the extrema of these values, such as the maximum and minimum, without revealing any other information about the values. For a security multi-party extremum protocol, it is commonly required to meet the following criteria:
R1: Correctness. The protocol should ensure that, as long as participants follow the protocol steps, the computation process can be completed smoothly. Moreover, all participants should obtain the same accurate computation result after the protocol execution.
R2: Security. Each participant’s input must be strictly protected throughout the computation process. No participant should be able to obtain any information about the inputs of other participants except for the final extremum result.
R3: Scalability. The protocol should be easily extendable to scenarios involving multiple parties without a significant decrease in protocol efficiency due to an increase in the number of participants.
However, the advent of cutting-edge quantum algorithms [40,41,42,43,44] has placed traditional SMC protocols—whose security rests on the computational hardness of mathematical problems—under unprecedented pressure. To break the impasse, researchers are turning to the fundamental effects of quantum mechanics itself, seeking to design quantum SMC protocols that will preserve the frontiers of privacy in the quantum era.

2.2. Greenberger–Horne–Zeilinger States

Quantum entanglement, a unique characteristic in quantum mechanics, refers to the phenomenon where the state of the remaining subsystems in a composite system can be determined based on the measurement outcomes of some of its subsystems. The GHZ state is an important class of multi-particle entangled states, boasting excellent entanglement properties. It is frequently chosen as an information carrier and finds extensive applications in the field of quantum cryptography.
For example, in 1999, Hillery et al. [7] designed the first (2,2) quantum secret-sharing protocol utilizing the three-particle GHZ state,
| G H Z 3 2 = 1 2 ( | 000 + | 111 ) .
Here, the subscript denotes the number of particles, while the superscript indicates the dimension of the particles. In this protocol, the security is ensured by the correlations among the measurement outcomes of the three particles in this state. Subsequently, Xiao et al. [8] extended this protocol to a multi-party scenario, implementing a (m, m) quantum secret-sharing protocol using the m-particle GHZ state,
| G H Z m 2 = 1 2 ( | 00 0 m + | 11 1 m ) .
Each particle of these two quantum states depicted in Equations (1) and (2) is two-dimensional. Namely, it exists in a state of two-dimensional Hilbert space H 2 , whose computational basis is { | 0 , | 1 } .
Furthermore, we can consider a more general scenario where each particle resides in a d-dimensional Hilbert space H d . In this case, this class of GHZ states can be represented as
| G H Z m d = 1 d ( | 00 0 m + | 11 1 m + | d 1 d 1 d 1 m .
where C B d = { | 0 , | 1 , , | d 1 } is a set of computational basis vectors for H d . Obviously, when a computational basis measurement is performed on these m particles, the measurement results r 1 , r 2 , , r m satisfy the following correlation,
r 1 = r 2 = = r m .
Moreover, when a Fourier transform F d : | j 1 d k = 0 d 1 e 2 π i j k / d | k ( i = 1 ) is applied to each particle of state | G H Z m d , this quantum state is transformed into the following state,
F d F d F d m | G H Z m d = | F G H Z m d = ( 1 d ) m 1 i 1 + i 2 + + i m = 0 mod d | i 1 | i 2 | i m .
At this point, if a computational basis measurement is applied on these particles again, the sum of these measurement results is equal to zero. In other words, if a measurement is performed on a Fourier basis F B d = { F d | 0 , F d | 1 , , F d | d 1 } on the quantum state | G H Z m d , the measurement results satisfy the following correlation:
r 1 + r 2 + + r m = 0 mod d .
Based on Equations (4) and (6), it is guaranteed that these particles are in the state | G H Z m d . In Ref. [45], Huang et al. proved that these particles are in the state | G H Z m d when the measurement results meet these two equations; this proof is shown below.
Theorem 1.
An m-particle d-level state is in the form of the state | G H Z m d , if and only if it satisfies both the following conditions:
(C1) When each particle is measured on the basis of C B d , the m measurement results are the same, i.e., Equation (4).
(C2) When each particle is measured on the basis of F B d , the sum of the m measurement results is 0 modulo d, i.e., Equation (6).

3. Three-Party Protocol

In this section, we propose a three-party quantum security extremum protocol with GHZ states. For generality, we consider three participants, Alice, Bob, and Charlie, who hold three private numbers s 1 , s 2 , s 3 X = { x 0 , x 1 , , x n 1 } , respectively. They hope to securely compute the maximum and minimum values of these three private numbers with the assistance of a semi-honest third party, Trent. The specific steps are as follows (also see Figure 1).
Protocol 1
Step 1. Three participants share a session key a , b Z n = { 0 , 1 , , n 1 } through a secure quantum key distribution or quantum key agreement protocol (e.g., BB84 protocol), with the condition that gcd ( a , n ) = 1 . In this way, Alice, Bob, and Charlie can obtain a one-to-one mapping function f ( x ) = a x + b mod n over the set Z n . Moreover, this function is kept confidential from anyone else, including Trent.
Step 2. Trent prepares n = n + 3 η four-particle four-level GHZ states | G H Z 4 4 = 1 2 ( | 0000 + | 1111 + | 2222 + | 3333 ) . Then, he organizes the four particles of each quantum state into four ordered sequences of n -length particle sequences, denoted as P 0 , P 1 , P 2 , P 3 . Finally, Trent respectively sends P 1 , P 2 , P 3 to Alice, Bob, and Charlie, while keeping P 0 himself.
Step 3. After all three participants confirm receipt of the particle sequence, they respectively execute an eavesdropping detection process. The specific detection process is described as follows. Alice (Bob, Charlie) randomly selects η particles from the particle sequence as samples and measures these sample particles in the computational basis or Fourier basis at random. Then, Alice (Bob, Charlie) requires Trent plus Bob and Charlie (Charlie and Alice, Alice and Bob) to measure the corresponding particles in the same bases and announce their measurement results accordingly. In terms of Theorem 1, if the sample particles are in the state | G H Z 4 4 , the measurement result must satisfy the conditions (C1) and (C2). Therefore, Alice (Bob, Charlie) can calculate the error rate based on these measurement results. If the error rate is higher than the pre-set threshold, there is an eavesdropping termination protocol, otherwise the protocol continues.
Step 4. Trent and the three participants discard the sample particles and are left with four new n-length particle sequences, denoted as P 0 , P 1 , P 2 , P 3 , respectively. After that, they perform Fourier basis measurements on the remaining n particles in their possession and record the measurement outcomes R i = ( r i 1 , r i 2 , , r i n ) , where i = 0 , 1 , 2 , 3 .
Step 5. Based on her/his own private data s 1 ( s 2 , s 3 ) and the set X, Alice (Bob, Charlie) obtains an n-length bit string Y 1 = ( y 1 1 , y 1 2 , , y 1 n ) ( Y 2 , Y 3 ). The specific calculation formula is described as follows:
y i j = 1 , x j s i 0 , x j > s i ,
where i = 1 , 2 , 3 and j = 1 , 2 , , n . Then, according to Y 1 ( Y 2 , Y 3 ) and the function f ( x ) , Alice (Bob, Charlie) derives a new n-length bit string Z 1 = ( z 1 1 , z 1 2 , , z 1 n ) ( Z 2 = ( z 2 1 , z 2 2 , , z 2 n ) , Z 3 = ( z 3 1 , z 3 2 , , z 3 n ) ), where z i f ( j ) = y i j . Finally, Alice (Bob, Charlie) calculates O 1 = ( o 1 1 , o 1 2 , , o 1 n ) ( O 2 = ( o 2 1 , o 2 2 , , o 2 n ) , O 3 = ( o 3 1 , o 3 2 , , o 3 n ) ), where o i j = z i j r i j , and publicly announces the result O 1 ( O 2 , O 3 ).
Step 6. According to the messages announced by the three participants and his own measurement results, Trent can calculate T = ( t 1 , t 2 , , t n ) , where t j = o 1 j o 2 j o 3 j r 0 j . Then, he infers the message O 0 = ( o 0 1 , o 0 2 , , o 0 n ) from T as follows: for each j = 1 , 2 , , n , set o 0 j = 0 if t j = 0 or t j = 3 ; otherwise, set o 0 j = 1 . Finally, Trent publicly declares this message to the three participants.
Step 7. The Three participants, based on the public message O 0 and the function f ( x ) , obtain a new n-length bit string V = ( v 1 , v 2 , , v n ) , where v j = o 0 f ( j ) . If the bit string does not contain consecutive “1”s, it indicates an error in the protocol and the protocol is restarted. Otherwise, the positions of the first “1” and the last “1” in the string V are recorded as k 1 and k 2 , respectively. In this way, the participants can obtain the minimum and maximum values of their private numbers, which are x k 1 1 and x k 2 , respectively.
Next, we will further elaborate on the execution process of the protocol through a simple example. In this example, we can assume three private numbers, s 1 = 255 , s 2 = 4100 , s 3 = 30 , and the set X = { 1 , 16 , 30 , 255 , 512 , 1025 , 4100 , 15000 , 32767 } ( n = 9 ) . Some classical sequences in this example are depicted in Table 1.
In Step 1, Alice, Bob, and Charlie negotiate and agree on a secret affine function f ( x ) = 5 x + 2 mod 9 , where a = 5 and b = 2 . In Step 2, Trent prepares nine four-particle, four-level GHZ states | G H Z 4 4 . Here, our focus is on discussing the correctness of the protocol under ideal conditions, so we will temporarily disregard the eavesdropping detection process. In Step 4, Trent and the three participants each perform a measurement on the particles in their possession using the Fourier basis. The measurement results obtained are R 0 = ( 3 , 3 , 0 , 2 , 1 , 2 , 0 , 3 , 1 ) , R 1 = ( 1 , 2 , 1 , 0 , 1 , 1 , 0 , 0 , 3 ) , and R 2 = ( 1 , 2 , 2 , 0 , 1 , 2 , 2 , 3 , 3 ) , R 3 = ( 3 , 1 , 1 , 2 , 1 , 3 , 2 , 2 , 1 ) .
In Step 5, Alice obtains Y 1 = ( 1 , 1 , 1 , 1 , 0 , 0 , 0 , 0 , 0 ) based on Equation (7) and her secret number s 1 = 255 . Then, by utilizing the function f ( x ) , she derives Z 1 = ( 0 , 0 , 1 , 1 , 0 , 0 , 0 , 1 , 1 ) . Finally, she performs a bitwise modulo 4 addition on these two values R 1 and Z 1 to obtain a result O 1 = ( 1 , 2 , 2 , 1 , 1 , 1 , 0 , 1 , 0 ) . Similarly, Bob and Charlie each calculate their respective values, O 2 = ( 2 , 2 , 3 , 1 , 2 , 3 , 2 , 0 , 0 ) and O 3 = ( 3 , 1 , 2 , 3 , 1 , 3 , 2 , 3 , 1 ) . These three messages are told to Trent publicly. In Step 6, Trent performs a bitwise modulo 4 addition on these three open messages and his own measurement results R 0 to obtain T = ( 1 , 0 , 3 , 3 , 1 , 1 , 0 , 3 , 2 ) , according to which he announces O 0 = ( 1 , 0 , 0 , 0 , 1 , 1 , 0 , 0 , 1 ) .
At the end of the protocol, the three participants derive V = ( 0 , 0 , 0 , 1 , 1 , 1 , 1 , 0 , 0 ) based on the open message O 0 and the secret function f ( x ) . Specifically, they obtain k 1 = 3 and k 2 = 6 . In this way, they are able to simultaneously determine both the minimum value x k 1 1 = 30 and the maximum value x k 2 = 4100 .

4. Security

Before presenting the security analysis, let us first briefly discuss the security model of the protocol. In the realm of SMPC, there are two common security models: the semi-honest model and the malicious model. In the semi-honest model, it is postulated that one or more parties engaged in the computation are semi-honest. These parties comply with the protocol yet endeavor to deduce information about others through their interactions. In contrast, in the malicious model, the parties may be malicious. They have the capacity to arbitrarily deviate from the protocol and even initiate active attacks. Obviously, in comparison to the semi-honest model, the malicious model that constitutes the strongest security assumption in MPC provides a higher level of security and is more apt for high-risk scenarios, including finance, healthcare, and government affairs, thereby rendering it more practical. The protocol proposed in this paper is based on the assumption of the malicious model.
On the other hand, owing to the limitations imposed by the no-go theorem [46,47], most quantum SMPC protocols require the introduction of a semi-honest third party. This third party will strictly adhere to the protocol procedures but may passively attempt to infer the private information of other participating parties through protocol interactions, a behavior characterized as “honest but curious”. Introducing a semi-honest third party under the malicious model represents a compromise solution. It enables us to harness the semi-honest third party to enhance efficiency while still shielding the protocol from attacks by malicious parties. Nevertheless, it is imperative to rigorously restrict the volume of information accessible to the third party and assume that the third party does not collude with malicious parties. Therefore, in addition to external attacks, the security of the proposed protocol is analyzed under some common types of internal attacks.

4.1. External Attack

Suppose that there is an external attacker named Eve, whose goal is to eavesdrop on the secret input of one of the participants (e.g., Bob, s 2 ). Based on the publicly available messages O 1 and O 0 , Eve cannot obtain any information about s 2 . Therefore, she must target the traveling particle sequence P 2 , which is transmitted from Trent to Bob. Common attack strategies could be the intercept–measure–resend attack, the entanglement–measure attack, etc. However, these attacks can be detected by Bob when he performs his eavesdropping detection process in Step 3. From Theorem 1, we can deduce that there are no errors introduced only when the traveling particles are in the state | G H Z 4 4 . In other words, as long as Eve attempts to attack the traveling particles during their transmission, her actions will be detected because the traveling particles are not in the state | G H Z 4 4 . Consequently, the proposed protocol is secure against such external attacks.

4.2. Internal Attack

4.2.1. Dishonest Participant’s Attack

Since the three participating parties play identical roles in the protocol and perform the same operations without the loss of generality, we can assume that participant Alice is dishonest, denoted as Alice*. She attempts to steal the secret input of participant Bob, s 2 . To this end, she may adopt the following common attack strategy.
In this attack, Alice intercepts the signal particle sequence P 2 . For each particle in this sequence, she prepares two fake particles ( f 1 , f 2 ) in a quantum state | ψ = 1 2 ( | 00 + | 11 + | 22 + | 33 ) and substitutes the fake particle f 1 for the signal particle to be transmitted to Bob. After Bob performs a Fourier basis measurement on the fake particle f 1 , Alice* also measures the particle f 2 in the Fourier basis. Consequently, Alice* can infer Bob’s measurement result from her own measurement outcome. Using this information along with Bob’s public disclosures O 2 , she can deduce Bob’s private data. However, this attack will be detected by Bob’s eavesdropping detection process in Step 3. When the fake particle f 1 is selected as the sample, Bob measures this particle using a randomly chosen computational basis or Fourier basis. With a probability of 1/2, Bob selects the computational basis, resulting in a random measurement outcome. According to the eavesdropping detection process, Bob then requests for Trent and the other two participants to measure their corresponding particles. Since the fake particles are not entangled with the four genuine particles in the GHZ state | G H Z 4 4 , there is no correlation between the measurement results of these particles. Alice* is also unable to forge the measurement results of Trent and Charlie. Therefore, the probability of obtaining different measurement results is 3 4 . Clearly, this attack will be easily detected by Bob.
Moreover, it is not difficult to see that even if Charlie is also dishonest and conspires with Alice to attack the protocol, they will not succeed. The reason is that they cannot forge Trent’s measurement results, and the selection of sample particles is entirely determined by Bob, something they cannot predict in advance. In summary, the proposed protocol can resist attacks from dishonest participants.

4.2.2. Semi-Honest Third Party’s Attack

Similarly to most quantum secure multi-party computation protocols, the proposed protocol requires the introduction of a third party, Trent, to assist the participants in completing secure computation tasks. Here, the requirement for Trent is that he is semi-honest. It means that he will correctly follow the protocol steps and will not collude with other participants, but he may attempt to obtain participants’ privacy numbers or computation results (i.e., the maximum and minimum values) from the protocol execution process.
In the protocol, although Trent calculates O 0 based on the public messages O 1 , O 2 , and O 3 , he does not know the function f ( x ) , and thus cannot deduce the participants’ secret inputs solely from these messages. Since the initial quantum states are prepared by Trent and sent to each participant, Trent might attempt to exploit this convenience to launch an attack. For example, he could prepare multiple two-particle entangled states | ψ and distribute them to each participant instead of the GHZ state | G H Z 4 4 . However, according to Theorem 1 and the analysis above, such behavior will inevitably introduce errors during the eavesdropping detection process in Step 3, which will be detected by the participants. Therefore, the proposed protocol is secure against this type of attack.

5. Scalability

In this section, we can directly generate the three-party quantum security extremum protocol presented in Section 3 to the multi-party case. In the multi-party protocol, there are m participants and Useri ( i = 1 , 2 , m ), who holds a private numbers s i X = { x 0 , x 1 , , x n 1 } . They can securely compute the maximum and minimum values of these m private numbers by executing the following steps:
Protocol 2
Step 2.1. The m participants securely agree on a session key a , b Z n and obtain a one-to-one mapping function f ( x ) = a x + b mod n .
Step 2.2. Trent prepares n = n + m η   m + 1 -particle d-level GHZ states | G H Z m + 1 d ( d > m ). Then, he selects the m + 1 particles from each quantum state and obtains m + 1 ordered sequences of n -length particle sequences, denoted as P 0 , P 1 , , P m . Finally, Trent distributes these sequences, sending P i to Useri for i = 1 , 2 , , m , while retaining P 0 .
Step 2.3. After confirming receipt of the particle sequence, each Useri ( i = 1 , 2 , , m ) chooses η samples and performs their eavesdropping detection process. The specific detection process is the same as that in Step 3 of Protocol 1.
Step 2.4. Following the discarding of sample particles, Trent and m participants obtain m + 1 new n-length particle sequences, denoted as P 0 , P 1 , , P m . After that, Fourier basis measurements are performed on the remaining particles, yielding the measurement outcomes R i = ( r i 1 , r i 2 , , r i n ) for i = 0 , 1 , , m .
Step 2.5. Based on his private data s i and Equation (9), each participant Useri ( i = 1 , 2 , , m ) generates an n-length bit string Y i = ( y i 1 , y i 2 , , y i n ) . Then, according to Y i and the function f ( x ) , Useri derives a new n-length bit string Z i = ( z i 1 , z i 2 , , z i n ) , where z i f ( j ) = y i j . Finally, Useri computes O i = ( o i 1 , o i 2 , , o i n ) , with o i j = z i j r i j , and sends it to Trent.
Step 2.6. Trent combines the messages O 1 , O 2 , , O m and his own measurement results to calculate T = ( t 1 , t 2 , , t n ) , where t j = o 1 j o 2 j o 3 j r 0 j . After that, he can obtain the message O 0 = ( o 0 1 , o 0 2 , , o 0 n ) and publicly announce it to all participants. Here, the calculation formula for o 0 j is as follows:
o 0 j = 0 , if t j = 0 or t j = m 1 , otherwise ,
Step 2.7. In terms of the public message O 0 and f ( x ) , each Useri ( i = 1 , 2 , , m ) obtains a new n-length bit string V = ( v 1 , v 2 , , v n ) , where v j = o 0 f ( j ) . He then identifies the positions of the first “1” ( k 1 ) and the last “1” ( k 2 ) in the string V. These positions allow all participants to determine the minimum and maximum values of their private numbers, x k 1 1 and x k 2 , respectively.
It is not hard to see that the amounts of classical and quantum bits that need to be transmitted in Protocol 2 are m n ( 1 + log 2 d ) and ( m + 1 ) n log 2 d , respectively. This implies that the communication complexity of the protocol, O ( m n log 2 m ) ( d = m + 1 ), increases approximately linearly, rather than exponentially, with the growth in the number of participants m and the size of the dataset n. Moreover, since each participant only needs to perform single-particle measurements n times, the computational complexity of the protocol is O ( n α ) , where α is the cost of a single-particle operation. This implies that its computational complexity remains unchanged as the number of participants increases. For Trent, he is required to prepare GHZ entangled states comprising m + 1 particles, which is quite challenging under current technological conditions. However, it is believed that with continuous breakthroughs in quantum technology, especially in quantum entanglement in recent years, this issue can be resolved in the near future. Therefore, the protocol proposed in this paper is not only theoretically scalable but also practically feasible.

6. Correctness

Suppose that the minimum value of the set { s 1 , s 2 , , s m } is x m i n , the maximum value is x m a x , the secret number of m 1 participants is x m i n , and the secret number of m 2 participants is x m a x ( 0 < m 1 , m 2 < m ). From the protocol, it is evident that each participant performs the same operation in the protocol. Therefore, for simplicity, we assume that the secret number of the first m 1 participants is x m i n , and that of the last m 2 participants is x m a x . That is,
s 1 = = s m 1 = x m i n , s m = = s m m 2 + 1 = x m a x .
In this case, the secret numbers of the remaining m m 1 m 2 participants lie between x m i n and x m a x , namely,
x m i n < s m 1 + 1 , , s m m 2 < x m a x .
According to Equations (7) and (9), we can obtain,
Y 1 = = Y m 1 = ( 1 , , 1 m i n , 0 , , 0 n m i n ) , Y m m 2 + 1 = = Y m = ( 1 , , 1 m a x , 0 , , 0 n m a x )
Similarly, the corresponding bit string of the remaining participant Useri ( m 1 < i < m m 2 + 1 ) is
Y i = ( 1 , , 1 m i n , 1 , , 1 j m i n , 0 , , 0 n m a x j , 0 , , 0 n m a x ) ,
where s i = x j .
In the protocol, the affine function f ( x ) is employed to prevent Trent from obtaining the computation result. Since an inverse transformation is applied to it in subsequent steps, this function has no impact on the correctness of the protocol. For simplicity, we assume that f ( x ) = x , i.e., Z i = Y i . In this case, the concrete value of T = ( t 1 , t 2 , , t n ) calculated by Trent in Step 6 is depicted as follows. For 1 j m 1 , in terms of Equation (7) and z i j = y i j = 1 ( i = 1 , 2 , m ) , the value of t j is obtained,
t j = i = 1 m o i j = i = 1 m ( y i j + r i j ) = i = 1 m y i j + i = 1 m r i j = i = 1 m y i j = m .
For j > m m 2 + 1 , in terms of Equation (7) and z i j = y i j = 0 ( i = 1 , 2 , m ) , the value of t j is obtained,
t j = i = 1 m o i j = 0 .
In the same way, for m 1 < j m m 2 + 1 , 1 < t j < m can be derived from Equation (12). Based on T and Equation (8), we obtain O 0 ,
O 0 = ( 0 , , 0 m i n , 1 , , 1 m a x m i n , 0 , , 0 n m a x ) .
From this public message, all participants deduce that k 1 = m i n + 1 and k 2 = m a x , namely, the minimum and maximum values of their private numbers are, respectively, x k 1 1 = x m i n and x k 2 = x m a x . Hence, the proposed protocol is correct.

7. Performance Evaluation

In this section, we briefly discuss other performance aspects of the proposed protocol, aside from its security, correctness, and scalability. To better illustrate the performance characteristics of our protocol, we compare it with two other existing protocols [37,39], with the specific comparison results presented in Table 2.
Communication complexity serves as a crucial indicator representing the efficiency of the proposed protocol. In our protocol, Trent prepares n  m + 1 -particle d-level GHZ states and respectively sends n particles to all m participants. In Step 5, each participant, Useri, sends a classical message O i to Trent. In Step 8, Trent announces his result O 0 to all participants, which consumes m n classical bits. In total, the communication overhead comprises ( m + 1 ) n log 2 d qubits and m n ( 1 + log 2 d ) classical bits. Given that d = m + 1 , the overall communication complexity of the proposed protocol is O ( m n log 2 m ) .
In the protocol presented in Ref. [37], the maximum of all private inputs is obtained through multiple executions OR computations, which has a certain probability of yielding incorrect results, meaning that the computation is probabilistic. To reduce the error probability, the protocol needs to be executed k times so that the error probability ( 1 2 ) k approaches zero. Consequently, this protocol incurs a relatively high communication complexity. As for the protocol presented in Ref. [39], d-level single particles are utilized as information carriers and the computation is deterministic, resulting in a low communication complexity, which is the same as in our proposed protocol. However, in this protocol, the decoy method is employed to ensure the security of signal particle transmission between two adjacent participants, but it cannot withstand collusion attacks from multiple dishonest participants [9]. Moreover, at the end of the protocol, only the first participant obtains the computation result, which makes it unsuitable for some application scenarios that require fairness, where each participant is expected to obtain the result simultaneously. A detailed performance comparison between the proposed protocol and these two protocols is presented in Table 2. The comparison is based on various factors, including communication complexity, quantum resources, security model, etc.
Certainly, from the perspective of near-term deployment, semi-quantum secure multi-party computation [29,30,31,32,33,34,35,36] is more feasible. Such protocols only require one party among the communicating parties to possess quantum capabilities, while the other party only needs to perform classical operations to complete secure computation tasks. This significantly reduces the demand for quantum devices, making them easier to deploy and apply in practical communication networks. However, most current semi-quantum cryptographic protocols are designed for two-party or three-party scenarios and have poor scalability for arbitrary multi-party scenarios. A common solution is to achieve multi-party secure computation by conducting semi-quantum two-party secure communication between the third party with each participant. This, however, requires the expenditure of a substantial amount of quantum resources and increases communication complexity. Furthermore, compared to quantum participants, classical participants require more quantum states for measurement and reflecting transmission. Therefore, the efficiency of such semi-quantum multi-party secure computation protocols is generally low.

8. Conclusions

This paper presents a quantum secure multi-party computation protocol for finding the maximum and minimum values based on GHZ states. The protocol involves multiple participants and a semi-honest third party. By leveraging the correlations inherent in GHZ states, the participants can simultaneously obtain the final computational results, namely, the maximum and minimum values of their secret inputs, with the assistance of the third party. Meanwhile, the correlations of GHZ states are also employed to ensure the secure transmission of signal particles. Security analysis demonstrates that the protocol can not only withstand common external attacks but also resist internal attacks from dishonest participants and the semi-honest third party. Furthermore, the correctness and scalability of the protocol are analyzed, showing that it is both correct and scalable. Additionally, it is straightforward to compute the sum and difference of the extremum values using this protocol. Compared with Refs. [37,39], although our protocol adopts GHZ states, it offers distinct advantages, including that it does not require decoy particles or authenticated quantum channels and it places lower demands on participants’ quantum capabilities, thereby improving both feasibility and practicality. Notably, Refs. [48,49] demonstrate that the preparation of GHZ states is no longer experimentally prohibitive. In future work, we will attempt to construct multi-particle GHZ states on existing quantum cloud platforms to further evaluate the practical potential of the protocol. Additionally, since the protocol requires the assistance of a semi-honest third party, this imposes certain limitations on its practical applications. Therefore, we will also explore how to achieve secure computation of multi-party extremum values in scenarios without third-party involvement or when the third party is untrusted.

Author Contributions

Conceptualization, P.W.; methodology, G.-D.G. and S.L.; software, X.Z.; validation, P.W. and S.L.; formal analysis, G.-D.G.; investigation, S.L.; resources, X.Z.; data curation, P.W.; writing—original draft preparation, P.W. and S.L.; writing—review and editing, S.L. and S.-X.L.; visualization, S.-X.L. and X.Z.; supervision, G.-D.G.; project administration, P.W.; funding acquisition, S.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (Grant No. 62171131) and Fujian Province Natural Science Foundation (Grant Nos. 2022J01186 and 2023J01533).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Bennett, C.H.; Brassard, G. Quantum cryptography: Public-key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 10–12 December 1984; IEEE Computer Society Press: Piscataway, NJ, USA, 1984; pp. 175–179. [Google Scholar]
  2. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145. [Google Scholar] [CrossRef]
  3. Scarani, V.; Pasquinucci, H.B.; Cerf, N.J.; Dusek, M.; Lutkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301. [Google Scholar] [CrossRef]
  4. Meyer, J.; Reches, Y.; Gary Rozenman, G.; Oz, Y.; Suchowski, H.; Arie, A. Analogy of free-space quantum key distribution using spatial modes of light: Scaling up the distance and the dimensionality. Opt. Lett. 2025, 50, 3297. [Google Scholar] [CrossRef]
  5. Sisodia, M.; Venkataraman, V.; Ghosh, J. FSO-QKD protocols under free-space losses and device imperfections: A comparative study. Quantum Inf. Process. 2024, 23, 5. [Google Scholar] [CrossRef]
  6. Cleve, R.; Gottesman, D.; Lo, H.K. How to share a quantum secret. Phys. Rev. Lett. 1999, 83, 648. [Google Scholar] [CrossRef]
  7. Hillery, M.; Bužek, V.; Berthiaume, A. Quantum secret sharing. Phys. Rev. A 1999, 59, 1829. [Google Scholar] [CrossRef]
  8. Xiao, L.; Long, G.-L.; Deng, F.-G.; Pan, J.-W. Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 2004, 69, 052307. [Google Scholar] [CrossRef]
  9. Lin, S.; Guo, G.; Xu, Y.; Sun, Y.; Liu, X. Cryptanalysis of quantum secret sharing with d-level single particles. Phys. Rev. A 2016, 93, 062343. [Google Scholar] [CrossRef]
  10. Boström, K.; Felbinger, T. Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 2002, 89, 187902. [Google Scholar] [CrossRef]
  11. Deng, F.G.; Long, G.L.; Liu, X.S. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 2003, 68, 042317. [Google Scholar] [CrossRef]
  12. Lin, S.; Wen, Q.; Gao, F.; Zhu, F. Quantum secure direct communication with χ-type entangled state. Phys. Rev. A 2008, 78, 064304. [Google Scholar] [CrossRef]
  13. Yang, Y.-G.; Wen, Q.-Y. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A-Math. Theor. 2010, 43, 209801. [Google Scholar] [CrossRef]
  14. Chen, X.B.; Xu, G.; Niu, X.X.; We, W.Y.; Yang, Y.X. An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 2010, 283, 1561–1565. [Google Scholar] [CrossRef]
  15. Lin, S.; Sun, Y.; Liu, X.-F.; Yao, Z.-Q. Quantum private comparison protocol with d-dimensional Bell states. Quantum Inf. Process. 2013, 12, 559–568. [Google Scholar] [CrossRef]
  16. Giovannetti, V.; Lloyd, S.; Maccone, L. Quantum private queries. Phys. Rev. Lett. 2008, 100, 230502. [Google Scholar] [CrossRef] [PubMed]
  17. Jakobi, M.; Simon, C.; Gisin, N.; Branciard, C.; Bancal, J.; Walenta, N.; Zbinden, H. Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 2011, 83, 022301. [Google Scholar] [CrossRef]
  18. Gao, F.; Qin, S.J.; Huang, W.; Wen, Q. Quantum private query: A new kind of practical quantum cryptographic protocol. Sci. China-Phys. Mech. Astron. 2019, 62, 070301. [Google Scholar] [CrossRef]
  19. Shi, R.; Mu, Y.; Zhong, H.; Cui, J.; Zhang, S. An efficient quantum scheme for private set intersection. Quantum Inf. Process. 2016, 15, 363–371. [Google Scholar] [CrossRef]
  20. Liu, W.; Yin, H.W. A novel quantum protocol for private set intersection. Int. J. Theor. Phys. 2021, 60, 2074–2083. [Google Scholar] [CrossRef]
  21. Chen, Y.M.; Situ, H.; Huang, Q.; Zhang, C. A novel quantum private set intersection scheme with a semi-honest third party. Quantum Inf. Process. 2023, 22, 429. [Google Scholar] [CrossRef]
  22. Huang, X.; Zhang, W.F.; Zhang, S.B. Quantum multi-party private set intersection using single photons. Physica A 2024, 649, 129974. [Google Scholar] [CrossRef]
  23. Chen, X.B.; Xu, G.; Yang, Y.X.; Wen, Q.Y. An efficient protocol for the secure multi-party quantum summation. Int. J. Theor. Phys. 2010, 49, 2793–2804. [Google Scholar] [CrossRef]
  24. Liu, W.; Wang, Y.B.; Fan, W.Q. An novel protocol for the quantum secure multi-party summation based on two-particle bell states. Int. J. Theor. Phys. 2017, 56, 2783–2791. [Google Scholar] [CrossRef]
  25. Zhang, C.; Situ, H.; Huang, Q.; Yang, P. Multi-party quantum summation without a trusted third party based on single particles. Int. J. Quantum Inform. 2017, 15, 1750010. [Google Scholar] [CrossRef]
  26. Yang, H.Y.; Ye, T.Y. Secure multi-party quantum summation based on quantum Fourier transform. Quantum Inf. Process. 2018, 17, 129. [Google Scholar] [CrossRef]
  27. Wang, Y.; Hu, P.; Xu, Q. Quantum secure multi-party summation based on entanglement swapping. Quantum Inf. Process. 2021, 20, 319. [Google Scholar] [CrossRef]
  28. Peng, Z.; Shi, R.; Zhong, H.; Cui, J.; Zhang, S. A novel quantum scheme for secure two-party distance computation. Quantum Inf. Process. 2017, 16, 316. [Google Scholar] [CrossRef]
  29. Tian, Y.; Li, J.; Chen, X.B.; Ye, C.Q.; Li, C.Y.; Hou, Y.Y. An efficient semi-quantum private comparison without pre-shared keys. Quantum Inf. Process. 2021, 20, 360. [Google Scholar] [CrossRef]
  30. Yan, L.; Zhang, S.; Chang, Y.; Wan, G.; Yang, F. Semi-quantum private comparison protocol with three-particle G-like states. Quantum Inf. Process. 2021, 20, 17. [Google Scholar] [CrossRef]
  31. Li, Q.; Li, P.; Xie, L.; Chen, L.; Quan, J. Security analysis and improvement of a semi-quantum private comparison protocol with three-particle G-like states. Quantum Inf. Process. 2022, 21, 127. [Google Scholar] [CrossRef]
  32. Wang, B.; Liu, S.-Q.; Gong, L.-H. Semi-quantum private comparison protocol of size relation with d-dimensional GHZ states. Chin. Phys. B 2022, 31, 010302. [Google Scholar] [CrossRef]
  33. Wu, W.; Guo, L.; Xie, M. Multi-party semi-quantum private comparison based on the maximally entangled GHZ-type states. Front. Phys. 2022, 10, 1048325. [Google Scholar] [CrossRef]
  34. Yang, C.-W.; Huang, Y.-Y.; Lin, J.; Tsai, C.-W. Efficient and secure semi-quantum private comparison protocol using three-particle GHZ-like states against participant attack. Mod. Phys. Lett. A 2024, 39, 2450037. [Google Scholar] [CrossRef]
  35. Yang, C.-W.; Huang, Y.-Y.; Tsai, C.-W.; Lin, J. Reflecting attack and improvement of a semi-quantum private comparison protocol with three-particle GHZ-like states. Mod. Phys. Lett. A 2024, 39, 2450175. [Google Scholar] [CrossRef]
  36. Zhang, X.; Wei, C.; Gao, F.; Li, W.; Qin, S. Efficient semi-quantum private set intersection cardinality protocol without pre-shared key. Quantum Inf. Process. 2025, 24, 213. [Google Scholar] [CrossRef]
  37. Shi, R.H.; Li, Y.F. Privacy-preserving quantum protocol for finding the maximum value. EPJ Quantum Technol. 2022, 9, 1–14. [Google Scholar] [CrossRef]
  38. Kong, H.-X.; Jia, H.-Y.; Wu, X.; Li, G.-Q. Robust quantum secure multiparty computation protocols for minimum value calculation in collective noises and their simulation. Int. J Theor. Phys. 2023, 62, 172. [Google Scholar] [CrossRef]
  39. Lu, Y.H.; Ding, G.Y. A novel quantum security multi-party extremum protocol in a d-dimensional quantum system. Phys. Scr. 2024, 99, 095111. [Google Scholar] [CrossRef]
  40. Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; pp. 124–134. [Google Scholar]
  41. Grover, L.K. Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 1997, 79, 325–328. [Google Scholar] [CrossRef]
  42. Feng, W.; Guo, G.; Lin, S.; Xu, Y. Quantum Isomap algorithm for manifold learning. Phys. Rev. Appl. 2024, 22, 014049. [Google Scholar] [CrossRef]
  43. Su, J.; Fan, J.; Wu, S.; Li, G.; Qin, S.; Gao, F. Topology-driven quantum architecture search framework. Sci. China Inf. Sci. 2025, 68, 180507. [Google Scholar] [CrossRef]
  44. Wu, S.; Li, R.; Song, Y.; We, Q.; Gao, F. Quantum-Assisted Hierarchical Fuzzy Neural Network for Image Classification. IEEE Trans. Fuzzy Syst. 2025, 33, 491–502. [Google Scholar] [CrossRef]
  45. Huang, W.; Wen, Q.-Y.; Liu, B. Quantum anonymous ranking. Phys. Rev. A 2014, 89, 032325. [Google Scholar] [CrossRef]
  46. Lo, H.K.; Chau, H.F. Is quantum bit commitment really possible? Phys. Rev. Lett. 1997, 78, 3410. [Google Scholar] [CrossRef]
  47. Mayers, D. Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett. 1997, 78, 3414. [Google Scholar] [CrossRef]
  48. Hou, M.; Wu, Y.; Zhang, S. Efficient Quantum Private Comparison Based on GHZ States. Entropy 2024, 26, 413. [Google Scholar] [CrossRef]
  49. Pont, M.; Corrielli, G.; Fyrillas, A.; Agresti, I.; Carvacho, G.; Maring, N.; Emeriau, P.; Ceccarelli, F.; Albiero, R.; Ferreira, P.H.D.; et al. High-fidelity Four-Photon GHZ States on Chip. npj Quantum Inf. 2024, 10, 50. [Google Scholar] [CrossRef]
Figure 1. (Color online) A schematic diagram of the three-party protocol. The yellow dotted line represents the bidirectional classical channel for transmitting classical bits. The solid blue line represents a one-way quantum channel for the transmission of the GHZ state prepared by Trent, and the orange dots represent the GHZ state of the transmission. Additionally, Alice, Bob, and Charlie are all located within the cloud-like structure, indicating that the three parties securely share a session key.
Figure 1. (Color online) A schematic diagram of the three-party protocol. The yellow dotted line represents the bidirectional classical channel for transmitting classical bits. The solid blue line represents a one-way quantum channel for the transmission of the GHZ state prepared by Trent, and the orange dots represent the GHZ state of the transmission. Additionally, Alice, Bob, and Charlie are all located within the cloud-like structure, indicating that the three parties securely share a session key.
Technologies 13 00431 g001
Table 1. Some classical sequences in the presented example.
Table 1. Some classical sequences in the presented example.
TrentAliceBobCharlie
Step 1 a = 5 , b = 2 a = 5 , b = 2 a = 5 , b = 2
Step 4 R 0 = 3 , 3 , 0 , 2 , 1 , 2 , 0 , 3 , 1 R 1 = 1 , 2 , 1 , 0 , 1 , 1 , 0 , 0 , 3 R 2 = 1 , 2 , 2 , 0 , 1 , 2 , 2 , 3 , 3 R 3 = 3 , 1 , 1 , 2 , 1 , 3 , 2 , 2 , 1
Step 5 Y 1 = 1 , 1 , 1 , 1 , 0 , 0 , 0 , 0 , 0 , Z 1 = 0 , 0 , 1 , 1 , 0 , 0 , 0 , 1 , 1 , O 1 = 1 , 2 , 2 , 1 , 1 , 1 , 0 , 1 , 0 Y 2 = 1 , 1 , 1 , 1 , 1 , 1 , 1 , 0 , 0 , Z 2 = 1 , 0 , 1 , 1 , 1 , 1 , 0 , 1 , 1 , O 2 = 2 , 2 , 3 , 1 , 2 , 3 , 2 , 0 , 0 Y 3 = 1 , 1 , 1 , 0 , 0 , 0 , 0 , 0 , 0 , Z 3 = 0 , 0 , 1 , 1 , 0 , 0 , 0 , 1 , 0 , O 3 = 3 , 1 , 2 , 3 , 1 , 3 , 2 , 3 , 1
Step 6 T = 1 , 0 , 3 , 3 , 1 , 1 , 0 , 3 , 2 , O 0 = 1 , 0 , 0 , 0 , 1 , 1 , 0 , 0 , 1
Step 7 V = 0 , 0 , 0 , 1 , 1 , 1 , 1 , 0 , 0 , x 2 = 30 , x 6 = 4100 V = 0 , 0 , 0 , 1 , 1 , 1 , 1 , 0 , 0 , x 2 = 30 , x 6 = 4100 V = 0 , 0 , 0 , 1 , 1 , 1 , 1 , 0 , 0 , x 2 = 30 , x 6 = 4100
Table 2. A performance comparison between the proposed protocol and the existing QSME protocol is presented, covering comparative analysis across 11 aspects including quantum resources. A detailed discussion is provided in Section 4 of the main text.
Table 2. A performance comparison between the proposed protocol and the existing QSME protocol is presented, covering comparative analysis across 11 aspects including quantum resources. A detailed discussion is provided in Section 4 of the main text.
ProtocolsRef. [37]Ref. [39]The Proposed Protocol
Quantum resourcesingle particlessingle particlesmulti-particle GHZ states
Quantum bits 2 k m n log 2 m m n log 2 d ( m + 1 ) n log 2 d
Classical bits 2 k m n log 2 m 0 m n ( 1 + log 2 d )
Communication complexity O ( k m n log 2 m ) O ( m n log 2 m ) O ( m n log 2 m )
Quantum operationSingle-particle operationSingle-particle operationSingle-particle measurement
Computation taskMaximumMaximum and MinimumMaximum and Minimum
Resistant to external attacksYesYesYes
Resistant to internal attacksYesNoYes
Security modelSemi-honest modelMalicious modelMalicious model with a semi-honest third party
Deterministic or probabilisticProbabilisticDeterministicDeterministic
Other requirementAuthenticated quantum channelsDecoy quditsNo
m = number of parties, n = cardinality of the dataset, d = dimension of signal particle > m, ( 1 2 ) k = probability of obtaining wrong calculation results.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, P.; Guo, G.-D.; Lin, S.-X.; Zhang, X.; Lin, S. Quantum Security Multi-Party Extremum Protocol with Greenberger–Horne–Zeilinger States. Technologies 2025, 13, 431. https://doi.org/10.3390/technologies13100431

AMA Style

Wang P, Guo G-D, Lin S-X, Zhang X, Lin S. Quantum Security Multi-Party Extremum Protocol with Greenberger–Horne–Zeilinger States. Technologies. 2025; 13(10):431. https://doi.org/10.3390/technologies13100431

Chicago/Turabian Style

Wang, Ping, Gong-De Guo, Shu-Xin Lin, Xin Zhang, and Song Lin. 2025. "Quantum Security Multi-Party Extremum Protocol with Greenberger–Horne–Zeilinger States" Technologies 13, no. 10: 431. https://doi.org/10.3390/technologies13100431

APA Style

Wang, P., Guo, G.-D., Lin, S.-X., Zhang, X., & Lin, S. (2025). Quantum Security Multi-Party Extremum Protocol with Greenberger–Horne–Zeilinger States. Technologies, 13(10), 431. https://doi.org/10.3390/technologies13100431

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop