Publication | Closed Access
Secure multi-party quantum computation
155
Citations
24
References
2002
Year
Unknown Venue
Hardware SecurityQuantum ScienceQuantum CryptographyQuantum SecuritySecure Function EvaluationQuantum ComputingEngineeringSecure Multi-party ComputationInformation SecurityPost-quantum CryptographyData PrivacyComputer ScienceSecure Multi-party ComputingQuantum EntanglementClassical CryptographyData SecurityCryptographyQuantum Key Distribution
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation with quantum inputs and circuits. Our protocols are information-theoretically secure, i.e. no assumptions are made on the computational power of the adversary. For the weaker task of verifiable quantum secret sharing, we give a protocol which tolerates any t ξ n/4 cheating parties (out of n). This is shown to be optimal. We use this new tool to show how to perform any multi-party quantum computation as long as the number of dishonest players is less than n/6.
| Year | Citations | |
|---|---|---|
Page 1
Page 1