Abstract
In 2014, Zhang et al. (Int J Theor Phys:53:933–941, 2014) proposed a secure multi-party quantum summation protocol based on single photons in both polarization and spatial-mode degrees of freedom. They claimed that the proposed protocol can efficiently help the involved participants to sum their secrets, and at the same time, each participant’s secret can be kept from being known by others. However, this study shows that Zhang et al.’s protocol suffers from the intercept-resend attack. To solve this problem, a modification is proposed here.
Similar content being viewed by others
References
Jian-Zhong, D., Xiu-Bo, C., Qiao-Yan, W., Fu-Chen, Z.: Secure multiparty quantum summation. Acta Phys. Sin. 56, 11 (2007)
Chen, X.-B., Xu, G., Yang, Y.-X., Wen, Q.-Y.: An efficient protocol for the secure multi-party quantum summation. Int. J. Theor. Phys. 49(11), 2793–2804 (2010)
Zhang, C., Sun, Z., Huang, Y., Long, D.: High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 53(3), 933–941 (2014)
Shi, R.-H., Mu, Y., Zhong, H., Cui, J., Zhang, S.: Secure multiparty quantum computation for summation and multiplication. Sci. Rep. 6, 19655 (2016)
Ayan Majumder, Santanu Mohapatra, and Anil Kumar, Experimental Realization of Secure Multiparty Quantum Summation Using Five-Qubit IBM Quantum Computer on Cloud. arXiv preprint arXiv:1707.07460, 2017
Zhang, C., Sun, Z.-W., Huang, X., Long, D.-Y.: Three-party quantum summation without a trusted third party. Int. J. Quantum Information. 13(02), 1550011 (2015)
Liu, W., Wang, Y.-B., Fan, W.-Q.: An novel protocol for the quantum secure multi-party summation based on two-particle bell states. Int. J. Theor. Phys. 56(9), 2783–2791 (2017)
Zhang, C., Situ, H., Huang, Q., Yang, P.: Multi-party quantum summation without a trusted third party based on single particles. Int. J. Quantum Information. 15(02), 1750010 (2017)
Xin Tang, Gang Xu, Kun-Chang Li, Xiu-Bo Chen, and Yi-Xian Yang, Secure Multiparty Quantum Summation Based on d-Level Single Particles. in International Conference on Cloud Computing and Security, 2018, pp. 680–690: Springer
Shih-Min Hung, Sheng-Liang Hwang, Tzonelih Hwang, and Shih-hung Kao, multiparty quantum private comparison with almost dishonest third parties for strangers. Quantum Inf. Process, vol. 16, no. 2, p. 36, 2017
Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94(23), 230504 (2005)
Lo, H.-K., Curty, M., Tamaki, K.: Secure quantum key distribution. Nat. Photonics. 8(8), 595–604 (2014)
Bennett, C.H., Brassard, G., David Mermin, N.: Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68(5), 557–559 (1992)
Acknowledgements
We would like to thank the Ministry of Science and Technology of the Republic of China, Taiwan for partially supporting this research in finance under the Contract No. 107-2221-E-006 -077 -; No. 107-2218-E-218-004-MY2; No. 107-2627-E-006 -001 -; No. MOST 107-2627-E-002-002-.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Gu, J., Hwang, T. & Tsai, CW. Improving the Security of ‘High-Capacity Quantum Summation with Single Photons in both Polarization and Spatial-Mode Degrees of Freedom’. Int J Theor Phys 58, 2213–2217 (2019). https://doi.org/10.1007/s10773-019-04110-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-019-04110-x