Skip to main content
Log in

A Voting Protocol Based on the Controlled Quantum Operation Teleportation

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Based on the controlled quantum operation teleportation, a secure voting protocol is proposed in this paper. Genuine four-qubit entangled state functions as the quantum channel. The eligible voter’s quantum operation which represents his vote information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Voter’s quantum identity authentication provides the anonymity of voters’ID, which is ensured by a zero-knowledge proof of the notary organization CA. Charlie’s supervision in the whole voting process can make the protocol satisfy verifiability and non-reusability so as to avoid Bob’s dishonest behaviour. The security analysis shows that the voting protocol satisfies unforgeability, and has great advantages over some relevant researches. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Gritzalis, D.: Secure Electronic Voting, 7 th Computer Security Incidents Response Teams Workshop Syros, Greece (2002)

  2. Hillerv, M.: Quantum voting and privacy ptotection:first steps. Int. Soc. Opt. Eng. (2006). doi:10.1117/2.1200610.0419

    Google Scholar 

  3. Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)

    Article  ADS  Google Scholar 

  4. Wen, X.J., Cai, X.J.: Secure quantum voting protocol. Shangdong Univ.(Natural Science) 46(9), 9–13 (2011)

    MathSciNet  Google Scholar 

  5. Yi, Z., He, G.Q., Zeng, G.H.: Quantum voting protocol using two-mode squeezed states. Acta Phys.Sin. 58(5), 3166–3172 (2009)

    Google Scholar 

  6. Horoshko, D., Kilin, S.: Quantum anonymous voting with anonymity check. Phys.Lett. A 375, 1172–1175 (2011)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  7. Bennett, C.H., Brassard, G., Crépeau, C., et al.: Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels. Phys. Rev. Lett. 70, 1895–1899 (1993)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  8. Huelga, S.F., Vaccaro, J.A., Chefles, A., et al.: Quantum remote control: Teleportation of unitary operations. Phys. Rev. A 63(4), 042303 (2001)

    Article  ADS  MATH  Google Scholar 

  9. Zhao, N.B., Wang, A.M.: Local implementation of nonlocal operations with block form. Phys.Rev. A 78(1), 014305 (2008)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  10. Yao, C.M., Cao, B.F.: Efficient implementation of a nonlocal gate with nonmaximal entanglement. Phys. Rev. A 373, 1011–1014 (2009)

    MathSciNet  MATH  Google Scholar 

  11. Zhang, Z.J., Cheung, C.Y.: Shared quantum remote control: quantum operation sharing. J. Phys. B 44(16), 165508 (2011)

    Article  ADS  Google Scholar 

  12. Wang, Y.W., Wei, X.H., Zhu, Z.H.: Quantum voting protocols based on the non-symmetric quantum channel with controlled quantum operation teleportation. Acta Phys. Sin. 62(16), 160302 (2013)

    Google Scholar 

  13. Tang, S.Q., Shan, C.J., Zhang, X.X.: Quantum teleportation of an unknown two-atom entangled state using foue-atom cluster state. Int. J. Theor. Phys. 49(8), 1899–1903 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  14. Tao, Y.H., Zheng, J.H.: Probabilistic controlled teleportation of two-particle entangled state via the optimal quantum state. Int. J. Theor. Phys. 52(6), 2001–2007 (2013)

    Article  MathSciNet  Google Scholar 

  15. Yuan, W., Guo, Q., Nie, L.P., et al.: Quantum teleportation of an arbitrary two-ion state by using a genuine four-ion entangled state in ion-trap systems. Int. J. Theor. Phys. 54(7), 2170–2174 (2015)

    Article  MATH  Google Scholar 

  16. Li, M.L., Liu, J.J., Hong, W.N.: Quantum information splitting of a single-qubit via genuine four-qubit entangled states. Acta Sinica Quantum Optica 19(2), 141–145 (2013)

    Google Scholar 

  17. Wang, Y.W., Zhan, Y.B.: A theoretical scheme for zero-knowledge proof quantum identity authentication. Acta Phys. Sin. 58(11), 7668–7671 (2009)

    MathSciNet  Google Scholar 

  18. Wen, X.J., Tian, Y., Niu, X.M.: A strong blind quantum signature scheme protocol based on secret sharing. Acta Electronic Sinica 38(3), 720–724 (2010)

    Google Scholar 

  19. Pati, A.K., Agrawal, P.: Probabilistic teleportation of a qudit. Phys. Lett. A 371, 185–189 (2007)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  20. Bennett, C.H., Brassard.G.: Quantum cryptography:public key distribution and coin tossing. In: Proceedings of the International Conference on Computers, IEEE, pp 175–179 (1984)

  21. Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)

    Article  ADS  Google Scholar 

  22. Mayers, D.: Unconditional security in quantum cryptography. J Assoc:Comput Math 48(1), 351–406 (2001)

    MathSciNet  MATH  Google Scholar 

  23. Inamon, H., Lutkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41(3), 599–627 (2007)

    Article  ADS  Google Scholar 

  24. Hillery, M., Ziman, M., Buzek, V., Bielikova, M.: Towards quantum-based privacy and voting. Phys. Lett. A 349(1–4), 75–81 (2006)

    Article  ADS  MATH  Google Scholar 

  25. Wang, T.Y., Cai, X.Q., Zhang, R.L.: Security of a sessional blind signature based on quantum cryptograph. Quantum Inf. Process. 13(8), 1677–1685 (2014)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  26. Wang, T.Y., Cai, X.Q., Ren, Y.L., et al.: Security of quantum digital signatures for classical messages. Sci. Rep. 5, 9231 (2015)

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant Nos.61402275, 61273311, 61202317), the Natural Science Foundation of Shaanxi Province (Grant No.2015JM6263), Scientific Research Plan Projects of Shaanxi Education Department(Grant No.2012JK1003), and the Fundamental Research Funds for the Central Universities(Grant No.GK201402004).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian-Zhong Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tian, JH., Zhang, JZ. & Li, YP. A Voting Protocol Based on the Controlled Quantum Operation Teleportation. Int J Theor Phys 55, 2303–2310 (2016). https://doi.org/10.1007/s10773-015-2868-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-015-2868-8

Keywords

Navigation