skip to main content
10.1145/509907.510000acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article

Secure multi-party quantum computation

Published: 19 May 2002 Publication History
  • Get Citation Alerts
  • Abstract

    Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation with quantum inputs and circuits. Our protocols are information-theoretically secure, i.e. no assumptions are made on the computational power of the adversary. For the weaker task of verifiable quantum secret sharing, we give a protocol which tolerates any t ξ n/4 cheating parties (out of n). This is shown to be optimal. We use this new tool to show how to perform any multi-party quantum computation as long as the number of dishonest players is less than n/6.

    References

    [1]
    Proc. of 20th STOC, Chicago, Illinois, 2--4 May 1988.
    [2]
    D. Aharonov and M. Ben-Or. Fault tolerant quantum computation with constant error rate. quant-ph/9906129. Preliminary version in STOC '97. Submitted to SIAM J. Comp., June 1999.
    [3]
    D. Beaver. Multiparty protocols tolerating half faulty processors. In G. Brassard, editor, Proc. of CRYPTO '89, volume 435 of LNCS, pages 560--572. IACR, Springer-Verlag, 1990, 20--24 Aug. 1989.
    [4]
    D. Beaver. Foundations of secure interactive computing. In Feigenbaum {12}, pages 377--391.
    [5]
    M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In ACM {1}, pages 1--10.
    [6]
    R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. of FOCS 2001, pages 136--147, 2001.
    [7]
    H. F. Chau. Quantum-classical complexity-security tradeoff in secure multiparty computations. Physical Review A, 61, March 2000.
    [8]
    D. Chaum, C. Crépeau, and I. Damgård. Multiparty unconditionally secure protocols (extended abstract). In ACM {1}, pages 11--19.
    [9]
    B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults (extended abstract). In Proc. of 26th FOCS, pages 383--395, Portland, Oregon, 21--23 Oct. 1985. ieee.
    [10]
    R. Cleve, D. Gottesman, and H.-K. Lo. How to share a quantum secret. Physical Review Letters, 83:648--651, 1999.
    [11]
    R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations with dishonest minority. In J. Stern, editor, Proc. of EUROCRYPT 99, volume 1592 of LNCS. IACR, Springer-Verlag, 1999.
    [12]
    J. Feigenbaum, editor. Proc. of CRYPTO '91}, volume 576 of LNCS. IACR, Springer-Verlag, 1992, 11--15 Aug. 1991.
    [13]
    O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In Proc. of 19th STOC, pages 218--229, New York City, 25--27 May 1987.
    [14]
    S. Goldwasser and L. A. Levin. Fair computation of general functions in presence of immoral majority. In A. J. Menezes and S. A. Vanstone, editors, Proc. of CRYPTO '90, volume 537 of LNCS, pages 77--93. IACR, Springer-Verlag, 1991.
    [15]
    D. Gottesman and C. H. Bennett. Unpublished work. 1998.
    [16]
    E. Knill and R. Laflamme. A theory of quantum error-correcting codes. Physical Review A, 55:900--911, 1997. quant-ph/9604034.
    [17]
    H.-K. Lo and H. F. Chau. Unconditional security of quantum key distribution over arbitrary long distances. Science, 283(5410):2050--2056, 26 March 1999}.
    [18]
    S. Micali and P. Rogaway. Secure computation (abstract). In Feigenbaum {12}, pages 392--404.
    [19]
    M. Nielsen and I. Chuang. Quantum Computation and Quantum Information. Cambridge University Press, 2000.
    [20]
    B. Pfitzmann and M. Waidner. Composition and integrity preservation of secure reactive systems. In Proc. of Computer and Communications Security, pages 245--254, 2000.
    [21]
    T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In Proc. of 21st STOC, pages 73--85, Seattle, Washington, 15--17 May 1989.
    [22]
    A. Smith. Multi-party quantum computation. Master's thesis, MIT, Aug. 2001. Available as quant-ph/0111030.

    Cited By

    View all
    • (2024)The Convergence of Quantum Computing and BlockchainApplications and Principles of Quantum Computing10.4018/979-8-3693-1168-4.ch021(418-436)Online publication date: 31-Jan-2024
    • (2024)NISQ Quantum Computing: A Security-Centric Tutorial and Survey [Feature]IEEE Circuits and Systems Magazine10.1109/MCAS.2024.334966524:1(14-32)Online publication date: Sep-2025
    • (2024)Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable AbortAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58751-1_5(119-148)Online publication date: 26-May-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC '02: Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
    May 2002
    840 pages
    ISBN:1581134959
    DOI:10.1145/509907
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 May 2002

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. distributed computing
    2. multi-party protocols
    3. quantum cryptography
    4. secure function evaluation

    Qualifiers

    • Article

    Conference

    STOC02
    Sponsor:
    STOC02: Symposium on the Theory of Computing
    May 19 - 21, 2002
    Quebec, Montreal, Canada

    Acceptance Rates

    STOC '02 Paper Acceptance Rate 91 of 287 submissions, 32%;
    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)82
    • Downloads (Last 6 weeks)14

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)The Convergence of Quantum Computing and BlockchainApplications and Principles of Quantum Computing10.4018/979-8-3693-1168-4.ch021(418-436)Online publication date: 31-Jan-2024
    • (2024)NISQ Quantum Computing: A Security-Centric Tutorial and Survey [Feature]IEEE Circuits and Systems Magazine10.1109/MCAS.2024.334966524:1(14-32)Online publication date: Sep-2025
    • (2024)Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable AbortAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58751-1_5(119-148)Online publication date: 26-May-2024
    • (2023)Quantum MetrologyPrinciples and Applications of Quantum Computing Using Essential Math10.4018/978-1-6684-7535-5.ch001(1-21)Online publication date: 15-Sep-2023
    • (2023)Robust Semi-Quantum Summation over a Collective-Dephasing Noise ChannelMathematics10.3390/math1106140511:6(1405)Online publication date: 14-Mar-2023
    • (2023)A Survey of Universal Quantum von Neumann ArchitectureEntropy10.3390/e2508118725:8(1187)Online publication date: 9-Aug-2023
    • (2023)Obfuscation of Pseudo-Deterministic Quantum CircuitsProceedings of the 55th Annual ACM Symposium on Theory of Computing10.1145/3564246.3585179(1567-1578)Online publication date: 2-Jun-2023
    • (2023)Time-Scheduled End-to-End Entanglement Establishment in Memory-Cells-Limited Quantum Networks2023 Asia Communications and Photonics Conference/2023 International Photonics and Optoelectronics Meetings (ACP/POEM)10.1109/ACP/POEM59049.2023.10368812(1-6)Online publication date: 4-Nov-2023
    • (2023)A feasible semi-quantum private comparison based on entanglement swapping of Bell statesPhysica A: Statistical Mechanics and its Applications10.1016/j.physa.2023.129023625(129023)Online publication date: Sep-2023
    • (2023)Quantum NETwork: from theory to practiceScience China Information Sciences10.1007/s11432-023-3773-466:8Online publication date: 5-Jul-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media