Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (29)

Search Parameters:
Keywords = quantum secure multiparty computation

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 382 KB  
Article
Personal vs. Non-Personal Data Privacy in 6G Networks: Mechanisms, Compliance, and Architectural Patterns
by Maryam Almarwani and Reem Almarwani
Appl. Sci. 2026, 16(10), 4604; https://doi.org/10.3390/app16104604 - 7 May 2026
Viewed by 524
Abstract
Sixth-generation (6G) networks are expected to provide ubiquitous connectivity, AI-native orchestration, and seamless integration across terrestrial and non-terrestrial infrastructures. However, these capabilities introduce new privacy challenges related to the classification and protection of personal, quasi-personal, and non-personal data in complex data-driven environments. This [...] Read more.
Sixth-generation (6G) networks are expected to provide ubiquitous connectivity, AI-native orchestration, and seamless integration across terrestrial and non-terrestrial infrastructures. However, these capabilities introduce new privacy challenges related to the classification and protection of personal, quasi-personal, and non-personal data in complex data-driven environments. This paper presents a systematic review of 78 peer-reviewed studies published between 2019 and 2025. Following a PRISMA-based methodology, this review analyzes privacy-enhancing technologies (PETs), regulatory compliance frameworks, and architectural patterns for privacy preservation in 6G networks. The findings show that differential privacy (DP) and federated learning (FL) dominate current research, accounting for nearly 52% of the reviewed studies. Blockchain auditing and zero-knowledge proofs (ZKPs) collectively represent approximately 30%, while the remaining mechanisms, including physical-layer security (PLS), trusted execution environments (TEEs), homomorphic encryption (HE), secure multi-party computation (SMPC), and anonymization, account for roughly 18%. These mechanisms exhibit varying levels of privacy strength, utility preservation, latency, and energy cost. At the same time, evolving regulatory frameworks, including GDPR, PDPL, CCPA/CPRA, LGPD, and PIPL, increasingly extend privacy obligations to quasi-personal and aggregated data. Building on these findings, this paper proposes a unified taxonomy that clarifies the boundary between personal and non-personal data. It also provides a cross-layer mapping between PETs and compliance requirements across the Core/SBA, RAN, Edge/MEC, and NTN layers. Finally, this paper presents a forward-looking roadmap for 2025–2030, highlighting hybrid PET pipelines, post-quantum auditability, and AI-driven compliance automation as key directions for privacy-preserving 6G standardization. Full article
Show Figures

Figure 1

14 pages, 911 KB  
Article
Multiparty Quantum Private Comparison Protocol Using n-Particle GHZ State
by Min Hou, Yue Wu and Shibin Zhang
Mathematics 2025, 13(21), 3422; https://doi.org/10.3390/math13213422 - 27 Oct 2025
Viewed by 672
Abstract
Multiparty quantum private comparison (MQPC) aims to determine the equality relationship of inputs from multiple participants while maintaining the confidentiality of these inputs. Current MQPC protocols primarily focus on utilizing d-level quantum states, which limits feasible implementation. To address this issue, we [...] Read more.
Multiparty quantum private comparison (MQPC) aims to determine the equality relationship of inputs from multiple participants while maintaining the confidentiality of these inputs. Current MQPC protocols primarily focus on utilizing d-level quantum states, which limits feasible implementation. To address this issue, we introduce an MQPC protocol that utilizes n-particle Greenberger–Horne–Zeilinger (GHZ) state to enable private comparison while preserving the secrecy of individual inputs. A semi-honest third party (TP), adhering to protocol specifications but potentially curious about private data, generates and distributes GHZ state qubits to all participants. Each party encodes their secret input through rotation operations on their allocated qubits and returns the modified state to the TP, which then performs single-particle quantum measurements to derive the outcomes without accessing the raw inputs. The protocol’s sequence distribution method yields a high qubit efficiency of 1/n, outperforming many existing MQPC protocols. Security analysis confirms resilience against external adversaries employing quantum attack strategies and collusion attempts among participants. Simulations using IBM Qiskit validate the feasibility of the protocol, which relies on GHZ state preparation, single-qubit operations, and single-particle quantum measurements. Full article
(This article belongs to the Special Issue Applications of Cryptography Theory in Network Security)
Show Figures

Figure 1

14 pages, 596 KB  
Article
Quantum Security Multi-Party Extremum Protocol with Greenberger–Horne–Zeilinger States
by Ping Wang, Gong-De Guo, Shu-Xin Lin, Xin Zhang and Song Lin
Technologies 2025, 13(10), 431; https://doi.org/10.3390/technologies13100431 - 24 Sep 2025
Viewed by 1168
Abstract
Secure multi-party extremum, as a significant offshoot of secure multi-party computation, has extensive applications in various domains, including healthcare, financial transactions, market analysis, sports events, etc. Nevertheless, most existing secure multi-party extremum protocols rely on computational hard problems and are thus vulnerable to [...] Read more.
Secure multi-party extremum, as a significant offshoot of secure multi-party computation, has extensive applications in various domains, including healthcare, financial transactions, market analysis, sports events, etc. Nevertheless, most existing secure multi-party extremum protocols rely on computational hard problems and are thus vulnerable to quantum algorithms. This paper presents a quantum secure multi-party extremum protocol that is built upon the correlations of Greenberger–Horne–Zeilinger (GHZ) states. Within this protocol, multiple participants, with the aid of a semi-honest third party, can obtain the maximum and minimum values of their secret inputs. GHZ states act as the information carriers and are transmitted among the participants and the third party. Their unique correlations ensure the secure transmission of quantum particles. The analysis demonstrates that the proposed protocol is capable of not only warding off common external attacks but also resisting internal attacks launched by dishonest participants and the semi-honest third party. Moreover, the protocol boasts correctness and high scalability. Full article
(This article belongs to the Section Quantum Technologies)
Show Figures

Figure 1

24 pages, 1050 KB  
Article
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme
by Zhanzhen Wei, Gongjian Lan, Hong Zhao, Zhaobin Li and Zheng Ju
Sensors 2025, 25(15), 4848; https://doi.org/10.3390/s25154848 - 6 Aug 2025
Cited by 1 | Viewed by 1587
Abstract
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access control. However, most existing proxy re-signature schemes, which are predominantly based on traditional [...] Read more.
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access control. However, most existing proxy re-signature schemes, which are predominantly based on traditional public-key cryptosystems, face security vulnerabilities and certificate management bottlenecks. While identity-based schemes alleviate some issues, they introduce key escrow concerns. Certificateless schemes effectively resolve both certificate management and key escrow problems but remain vulnerable to quantum computing threats. To address these limitations, this paper constructs an efficient post-quantum certificateless proxy re-signature scheme based on algebraic lattices. Building upon algebraic lattice theory and leveraging the Dilithium algorithm, our scheme innovatively employs a lattice basis reduction-assisted parameter selection strategy to mitigate the potential algebraic attack vectors inherent in the NTRU lattice structure. This ensures the security and integrity of multi-party communication in quantum-threat environments. Furthermore, the scheme significantly reduces computational overhead and optimizes signature storage complexity through structured compression techniques, facilitating deployment on resource-constrained devices like Internet of Things (IoT) terminals. We formally prove the unforgeability of the scheme under the adaptive chosen-message attack model, with its security reducible to the hardness of the corresponding underlying lattice problems. Full article
(This article belongs to the Special Issue IoT Network Security (Second Edition))
Show Figures

Figure 1

18 pages, 974 KB  
Article
Authenticated Multi-Party Quantum Private Set Intersection with Single Particles
by Gong-De Guo, Li-Qin Zheng, Kai Yu and Song Lin
Mathematics 2025, 13(12), 2019; https://doi.org/10.3390/math13122019 - 18 Jun 2025
Cited by 2 | Viewed by 1299
Abstract
As an important branch of secure multi-party computation, privacy set intersection enables multiple parties to input their private sets and jointly compute the intersection of these sets without revealing any information other than the intersection itself. With the increasing demand for privacy protection [...] Read more.
As an important branch of secure multi-party computation, privacy set intersection enables multiple parties to input their private sets and jointly compute the intersection of these sets without revealing any information other than the intersection itself. With the increasing demand for privacy protection of user data, privacy set intersection has been widely used in privacy computing and other fields. In this paper, we utilize the properties of mutually unbiased bases to propose a multi-party quantum private set intersection protocol that incorporates identity authentication mechanisms. A semi-honest third party (TP) is introduced to facilitate the secure execution of this task among the multiple participating parties. The TP establishes a shared master key with each party, which serves as the basis for authenticating the identity of each participant throughout the protocol. Single-particle quantum states, prepared by the TP, act as the information carriers and are sequentially transmitted among the participating parties. Each party performs a local unitary operation on the circulating particle, thereby encoding their private data within the quantum state. At the end of the protocol, the TP announces his measurement result, by which all participants can concurrently ascertain the intersection of their private data sets. Notably, the proposed protocol eliminates the need for long-term storage of single-particle quantum states, thereby rendering it feasible with existing quantum technological capabilities. Furthermore, a comprehensive security analysis demonstrates that the protocol effectively resists some common external and internal attacks, thereby ensuring its theoretical security. Full article
(This article belongs to the Special Issue Quantum Cryptography and Applications)
Show Figures

Figure 1

16 pages, 2001 KB  
Review
Cryptographic Techniques in Artificial Intelligence Security: A Bibliometric Review
by Hamed Taherdoost, Tuan-Vinh Le and Khadija Slimani
Cryptography 2025, 9(1), 17; https://doi.org/10.3390/cryptography9010017 - 7 Mar 2025
Cited by 19 | Viewed by 9687
Abstract
With the rise in applications of artificial intelligence (AI) across various sectors, security concerns have become paramount. Traditional AI systems often lack robust security measures, making them vulnerable to adversarial attacks, data breaches, and privacy violations. Cryptography has emerged as a crucial component [...] Read more.
With the rise in applications of artificial intelligence (AI) across various sectors, security concerns have become paramount. Traditional AI systems often lack robust security measures, making them vulnerable to adversarial attacks, data breaches, and privacy violations. Cryptography has emerged as a crucial component in enhancing AI security by ensuring data confidentiality, authentication, and integrity. This paper presents a comprehensive bibliometric review to understand the intersection between cryptography, AI, and security. A total of 495 journal articles and reviews were identified using Scopus as the primary database. The results indicate a sharp increase in research interest between 2020 and January 2025, with a significant rise in publications in 2023 and 2024. The key application areas include computer science, engineering, and materials science. Key cryptographic techniques such as homomorphic encryption, secure multiparty computation, and quantum cryptography have gained prominence in AI security. Blockchain has also emerged as an essential technology for securing AI-driven applications, particularly in data integrity and secure transactions. This paper highlights the crucial role of cryptography in safeguarding AI systems and provides future research directions to strengthen AI security through advanced cryptographic solutions. Full article
Show Figures

Figure 1

13 pages, 1405 KB  
Article
Quantum Private Set Intersection Scheme Based on Bell States
by Min Hou, Yue Wu and Shibin Zhang
Axioms 2025, 14(2), 120; https://doi.org/10.3390/axioms14020120 - 7 Feb 2025
Cited by 5 | Viewed by 1418
Abstract
In this paper, we introduce a quantum private set intersection (QPSI) scheme that leverages Bell states as quantum information carriers. Our approach involves encoding private sets into Bell states using unitary operations, enabling the computation of the intersection between two private sets from [...] Read more.
In this paper, we introduce a quantum private set intersection (QPSI) scheme that leverages Bell states as quantum information carriers. Our approach involves encoding private sets into Bell states using unitary operations, enabling the computation of the intersection between two private sets from different users while keeping their individual sets undisclosed to anyone except for the intersection result. In our scheme, a semi-honest third party (TP) distributes the first and second qubits of the Bell states to the two users. Each user encodes their private sets by applying unitary operations on the received qubits according to predefined encoding rules. The modified sequence is encrypted and then sent back to TP, who can compute the set intersection without learning any information about the users’ private inputs. The simulation outcomes on the IBM quantum platform substantiate the viability of our scheme. We analyze the security and privacy aspects of the sets, showing that both external attacks and internal threats do not compromise the security of the private inputs. Furthermore, our scheme exhibits better practicality by utilizing easily implementable Bell states and unitary operations, rather than relying on multiple encoded states for set intersection calculations. Full article
(This article belongs to the Special Issue Recent Advances in Quantum Mechanics and Mathematical Physics)
Show Figures

Figure 1

12 pages, 408 KB  
Article
Privacy-Preserving Data Sharing in Telehealth Services
by Ammar Odeh, Eman Abdelfattah and Walid Salameh
Appl. Sci. 2024, 14(23), 10808; https://doi.org/10.3390/app142310808 - 22 Nov 2024
Cited by 26 | Viewed by 7692
Abstract
In today’s healthcare industry, safeguarding patient data is critical due to the increasing digitization of medical records, which makes them vulnerable to cyber threats. Telehealth services, while providing immense benefits in terms of accessibility and efficiency, introduce complex challenges in maintaining data privacy [...] Read more.
In today’s healthcare industry, safeguarding patient data is critical due to the increasing digitization of medical records, which makes them vulnerable to cyber threats. Telehealth services, while providing immense benefits in terms of accessibility and efficiency, introduce complex challenges in maintaining data privacy and security. This paper proposes a privacy-preserving framework for secure data sharing within telehealth services, employing blockchain technology and advanced cryptographic techniques. The framework ensures that all patient health data are encrypted using homomorphic encryption before storage on the blockchain, guaranteeing confidentiality and protecting data from unauthorized access. Secure multi-party computation (SMPC) is integrated for encrypted data computations, maintaining data confidentiality even during operations. Smart contracts enforce access control, ensuring that patient preferences and regulatory requirements such as the HIPAA and the GDPR are met. Furthermore, the framework includes auditing and verifying data integrity mechanisms, making it resilient against cyber threats such as impersonation, replay, and Man-In-The-Middle attacks. The analysis demonstrates the framework’s superior performance in addressing these challenges compared to that of existing systems. Future work suggests integrating AI-driven threat detection and quantum-resistant cryptographic techniques to enhance security further and adapt to the evolving telehealth landscape. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

11 pages, 909 KB  
Article
Efficient Quantum Private Comparison with Unitary Operations
by Min Hou and Yue Wu
Mathematics 2024, 12(22), 3541; https://doi.org/10.3390/math12223541 - 13 Nov 2024
Cited by 12 | Viewed by 1304
Abstract
Quantum private comparison (QPC) is a crucial component of quantum multiparty computing (QMPC), allowing parties to compare their private inputs while ensuring that no sensitive information is disclosed. Many existing QPC protocols that utilize Bell states encounter efficiency challenges. In this paper, we [...] Read more.
Quantum private comparison (QPC) is a crucial component of quantum multiparty computing (QMPC), allowing parties to compare their private inputs while ensuring that no sensitive information is disclosed. Many existing QPC protocols that utilize Bell states encounter efficiency challenges. In this paper, we present a novel and efficient QPC protocol that capitalizes on the distinct characteristics of Bell states to enable secure comparisons. Our method transforms private inputs into unitary operations on shared Bell states, which are then returned to a third party to obtain the comparison results. This approach enhances efficiency and decreases the reliance on complex quantum resources. A single Bell state can compare two classical bits, achieving a qubit efficiency of 100%. We illustrate the feasibility of the protocol through a simulation on the IBM Quantum Cloud Platform. The security analysis confirms that our protocol is resistant to both eavesdropping and attacks from participants. Full article
(This article belongs to the Section E4: Mathematical Physics)
Show Figures

Figure 1

25 pages, 1829 KB  
Review
Privacy-Preserving Techniques in Generative AI and Large Language Models: A Narrative Review
by Georgios Feretzakis, Konstantinos Papaspyridis, Aris Gkoulalas-Divanis and Vassilios S. Verykios
Information 2024, 15(11), 697; https://doi.org/10.3390/info15110697 - 4 Nov 2024
Cited by 84 | Viewed by 36214
Abstract
Generative AI, including large language models (LLMs), has transformed the paradigm of data generation and creative content, but this progress raises critical privacy concerns, especially when models are trained on sensitive data. This review provides a comprehensive overview of privacy-preserving techniques aimed at [...] Read more.
Generative AI, including large language models (LLMs), has transformed the paradigm of data generation and creative content, but this progress raises critical privacy concerns, especially when models are trained on sensitive data. This review provides a comprehensive overview of privacy-preserving techniques aimed at safeguarding data privacy in generative AI, such as differential privacy (DP), federated learning (FL), homomorphic encryption (HE), and secure multi-party computation (SMPC). These techniques mitigate risks like model inversion, data leakage, and membership inference attacks, which are particularly relevant to LLMs. Additionally, the review explores emerging solutions, including privacy-enhancing technologies and post-quantum cryptography, as future directions for enhancing privacy in generative AI systems. Recognizing that achieving absolute privacy is mathematically impossible, the review emphasizes the necessity of aligning technical safeguards with legal and regulatory frameworks to ensure compliance with data protection laws. By discussing the ethical and legal implications of privacy risks in generative AI, the review underscores the need for a balanced approach that considers performance, scalability, and privacy preservation. The findings highlight the need for ongoing research and innovation to develop privacy-preserving techniques that keep pace with the scaling of generative AI, especially in large language models, while adhering to regulatory and ethical standards. Full article
(This article belongs to the Special Issue Editorial Board Members’ Collection Series: "Information Processes")
Show Figures

Graphical abstract

58 pages, 52497 KB  
Article
Hybrid-Blockchain-Based Electronic Voting Machine System Embedded with Deepface, Sharding, and Post-Quantum Techniques
by Sohel Ahmed Joni, Rabiul Rahat, Nishat Tasnin, Partho Ghose, Md. Ashraf Uddin and John Ayoade
Blockchains 2024, 2(4), 366-423; https://doi.org/10.3390/blockchains2040017 - 30 Sep 2024
Cited by 4 | Viewed by 9003
Abstract
The integrity of democratic processes relies on secure and reliable election systems, yet achieving this reliability is challenging. This paper introduces the Post-Quantum Secured Multiparty Computed Hierarchical Authoritative Consensus Blockchain (PQMPCHAC-Bchain), a novel e-voting system designed to overcome the limitations of current Biometric [...] Read more.
The integrity of democratic processes relies on secure and reliable election systems, yet achieving this reliability is challenging. This paper introduces the Post-Quantum Secured Multiparty Computed Hierarchical Authoritative Consensus Blockchain (PQMPCHAC-Bchain), a novel e-voting system designed to overcome the limitations of current Biometric Electronic Voting Machine (EVM) systems, which suffer from trust issues due to closed-source designs, cyber vulnerabilities, and regulatory concerns. Our primary objective is to develop a robust, scalable, and secure e-voting framework that enhances transparency and trust in electoral outcomes. Key contributions include integrating hierarchical authorization and access control with a novel consensus mechanism for proper electoral governance. We implement blockchain sharding techniques to improve scalability and propose a multiparty computed token generation system to prevent fraudulent voting and secure voter privacy. Post-quantum cryptography is incorporated to safeguard against potential quantum computing threats, future-proofing the system. Additionally, we enhance authentication through a deep learning-based face verification model for biometric validation. Our performance analysis indicates that the PQMPCHAC-Bchain e-voting system offers a promising solution for secure elections. By addressing critical aspects of security, scalability, and trust, our proposed system aims to advance the field of electronic voting. This research contributes to ongoing efforts to strengthen the integrity of democratic processes through technological innovation. Full article
(This article belongs to the Special Issue Feature Papers in Blockchains)
Show Figures

Figure 1

27 pages, 615 KB  
Article
A Multiparty Quantum Private Equality Comparison Scheme Relying on |GHZ3⟩ States
by Theodore Andronikos and Alla Sirokofskich
Future Internet 2024, 16(9), 309; https://doi.org/10.3390/fi16090309 - 27 Aug 2024
Cited by 8 | Viewed by 4591
Abstract
In this work, we present a new protocol that accomplishes multiparty quantum private comparison leveraging maximally entangled |GHZ3 triplets. Our intention was to develop a protocol that can be readily executed by contemporary quantum computers. This is possible [...] Read more.
In this work, we present a new protocol that accomplishes multiparty quantum private comparison leveraging maximally entangled |GHZ3 triplets. Our intention was to develop a protocol that can be readily executed by contemporary quantum computers. This is possible because the protocol uses only |GHZ3 triplets, irrespective of the number n of millionaires. Although it is feasible to prepare multiparticle entangled states of high complexity, this is overly demanding on a contemporary quantum apparatus, especially in situations involving multiple entities. By relying exclusively on |GHZ3 states, we avoid these drawbacks and take a decisive step toward the practical implementation of the protocol. An important quantitative characteristic of the protocol is that the required quantum resources are linear both in the number of millionaires and the amount of information to be compared. Additionally, our protocol is suitable for both parallel and sequential execution. Ideally, its execution is envisioned to take place in parallel. Nonetheless, it is also possible to be implemented sequentially if the quantum resources are insufficient. Notably, our protocol involves two third parties, as opposed to a single third party in the majority of similar protocols. Trent, commonly featured in previous multiparty protocols, is now accompanied by Sophia. This dual setup allows for the simultaneous processing of all n millionaires’ fortunes. The new protocol does not rely on a quantum signature scheme or pre-shared keys, reducing complexity and cost. Implementation wise, uniformity is ensured as all millionaires use similar private circuits composed of Hadamard and CNOT gates. Lastly, the protocol is information-theoretically secure, preventing outside parties from learning about fortunes or inside players from knowing each other’s secret numbers. Full article
Show Figures

Figure 1

19 pages, 1642 KB  
Article
A Lightweight Secure Scheme for Underwater Wireless Acoustic Network
by Jia Shi, Jinqiu Wu, Zhiwei Zhao, Xiaofei Qi, Wenbo Zhang, Gang Qiao and Dahong Zuo
J. Mar. Sci. Eng. 2024, 12(5), 831; https://doi.org/10.3390/jmse12050831 - 16 May 2024
Cited by 9 | Viewed by 2964
Abstract
Due to the open underwater channels and untransparent network deployment environments, underwater acoustic networks (UANs) are more vulnerable to hostile environments. Security research is also being conducted in cryptography, including authentication based on asymmetric algorithms and key distribution based on symmetric algorithms. In [...] Read more.
Due to the open underwater channels and untransparent network deployment environments, underwater acoustic networks (UANs) are more vulnerable to hostile environments. Security research is also being conducted in cryptography, including authentication based on asymmetric algorithms and key distribution based on symmetric algorithms. In recent years, the advancement of quantum computing has made anti-quantum attacks an important issue in the field of security. Algorithms such as lattice and SPHINCS+ have become a research topic of interest in the field of security. However, within the past five years, few papers have discussed security algorithms for UANs to resist quantum attacks, especially through classical algorithms. Some existing classical asymmetric and symmetric algorithms are considered to have no prospects. From the perspective of easy deployment in engineering and anti-quantum attacks, our research focuses on a comprehensive lightweight security framework for data protection, authentication, and malicious node detection through the Elliptic Curve and Hash algorithms. Our mechanism is suitable for ad hoc scenarios with limited underwater resources. Meanwhile, we have designed a multi-party bit commitment to build a security framework for the system. A management scheme is designed by combining self-certifying with the threshold sharing algorithm. All schemes are designed based on certificate-less and ad hoc features. The proposed scheme ensures that the confidentiality, integrity, and authentication of the system are well considered. Moreover, the scheme is proven to be of unconditional security and immune to channel eavesdropping. The resource and delay issues are also taken into consideration. The simulations considered multiple variables like number of nodes, attackers, and message length to calculate proper values that can increase the efficiency of this scheme. The results in terms of delay, delivery ratio, and consumption demonstrate the suitability of the proposal in terms of security, especially for malicious node detection. Meanwhile, the computational cost has also been controlled at the millisecond level. Full article
(This article belongs to the Special Issue Safety and Reliability of Ship and Ocean Engineering Structures)
Show Figures

Figure 1

27 pages, 1120 KB  
Article
Quantum Secure Multi-Party Summation with Graph State
by Yaohua Lu and Gangyi Ding
Entropy 2024, 26(1), 80; https://doi.org/10.3390/e26010080 - 17 Jan 2024
Cited by 11 | Viewed by 3276
Abstract
Quantum secure multi-party summation (QSMS) is a fundamental problem in quantum secure multi-party computation (QSMC), wherein multiple parties compute the sum of their data without revealing them. This paper proposes a novel QSMS protocol based on graph state, which offers enhanced security, usability, [...] Read more.
Quantum secure multi-party summation (QSMS) is a fundamental problem in quantum secure multi-party computation (QSMC), wherein multiple parties compute the sum of their data without revealing them. This paper proposes a novel QSMS protocol based on graph state, which offers enhanced security, usability, and flexibility compared to existing methods. The protocol leverages the structural advantages of graph state and employs random graph state structures and random encryption gate operations to provide stronger security. Additionally, the stabilizer of the graph state is utilized to detect eavesdroppers and channel noise without the need for decoy bits. The protocol allows for the arbitrary addition and deletion of participants, enabling greater flexibility. Experimental verification is conducted to demonstrate the security, effectiveness, and practicality of the proposed protocols. The correctness and security of the protocols are formally proven. The QSMS method based on graph state introduces new opportunities for QSMC. It highlights the potential of leveraging quantum graph state technology to securely and efficiently solve various multi-party computation problems. Full article
(This article belongs to the Special Issue Quantum and Classical Physical Cryptography)
Show Figures

Figure 1

26 pages, 1036 KB  
Review
Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey
by Jingyu Chen, Haitao Deng, Huachang Su, Minghao Yuan and Yongjun Ren
Electronics 2024, 13(2), 287; https://doi.org/10.3390/electronics13020287 - 8 Jan 2024
Cited by 7 | Viewed by 8657
Abstract
As the most popular cryptographic scheme in the post-quantum field, lattices have received extensive attention and research. Not only do they provide quantum-resistant security, they also enable the construction of complex applications. Currently, lattice cryptography schemes based on different difficult problems have been [...] Read more.
As the most popular cryptographic scheme in the post-quantum field, lattices have received extensive attention and research. Not only do they provide quantum-resistant security, they also enable the construction of complex applications. Currently, lattice cryptography schemes based on different difficult problems have been applied in different fields. The threshold secret sharing (TSS) scheme is an important field of cryptography and has important application value and development prospects in key protection, secure multi-party computation, privacy protection, etc. However, with the rapid development of quantum computing, many existing cryptography-underlying technologies are facing huge difficulties and challenges. Therefore, post-quantum TSS has important research significance and value for the future development of cryptography. In this paper, we summarize the existing secret sharing schemes based on lattice-hard problems and the relevant applications of these schemes in the post-quantum realm. We classify existing lattice-based TSS according to different functions and introduce typical solutions. To the best of our knowledge, this is the first review paper on lattice-based TSS schemes. Full article
(This article belongs to the Special Issue Novel Methods Applied to Security and Privacy Problems)
Show Figures

Figure 1

Back to TopTop