Secure multi-party computation with a quantum manner
From MaRDI portal
Publication:5876429
DOI10.1088/1751-8121/AB9AEAOpenAlexW3035057842MaRDI QIDQ5876429FDOQ5876429
Authors: Changbin Lu, Fuyou Miao, Junpeng Hou, Zhaofeng Su, Yan Xiong
Publication date: 1 February 2023
Published in: Journal of Physics A: Mathematical and Theoretical (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1088/1751-8121/ab9aea
Recommendations
- Quantum secure multi-party summation based on entanglement swapping
- Multiparty quantum computation for summation and multiplication with mutually unbiased bases
- Secure multi-party quantum computation with a dishonest majority
- A cost-effective quantum protocol for secure multi-party multiplication
- Secure multi-party quantum summation based on quantum Fourier transform
quantum cryptographysecret sharingsecure multi-party computationpolynomial functionsinformation theoretical security
Cites Work
- Title not available (Why is that?)
- Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?
- An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement
- Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels
- Quantum secret sharing
- An explication of secret sharing schemes
- Secure multi-party quantum computation
- Secure multi-party quantum summation based on quantum Fourier transform
- Multi-party computation with conversion of secret sharing
- Rational protocol of quantum secure multi-party computation
- Multidimensional quantum entanglement with large-scale integrated optics
Cited In (16)
- Improved secure multiparty computation with a dishonest majority via quantum means
- Rational protocol of quantum secure multi-party computation
- Secure two-party computation via measurement-based quantum computing
- Secure multi-party quantum computation with a dishonest majority
- Quantum security computation on shared secrets
- Quantum communication and quantum multivariate polynomial interpolation
- Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform
- Feasible private set intersection in quantum domain
- Title not available (Why is that?)
- Enhancing distributed functional monitoring with quantum protocols
- Secure two-party computation in a quantum world
- Quantum protocols for untrusted computations
- Actively secure two-party evaluation of any quantum operation
- A generic quantum protocol for one-sided secure two-party classical computations
- Two quantum protocols for secure Hamming distance computation
- Multi-party quantum key agreement protocol secure against collusion attacks
This page was built for publication: Secure multi-party computation with a quantum manner
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5876429)