From Auditable Quantum Authentication to Best-of-Both-Worlds Multiparty Quantum Computation with Public Verifiable Identifiable Abort

11/03/2022
by   Mi-Ying Huang, et al.
0

We construct the first secure multiparty quantum computation with public verifiable identifiable abort (MPQC-PVIA) protocol, where PVIA security enables outside observers with only classical computational power to agree on the identity of a malicious party in case of an abort. Moreover, our MPQC is the first quantum setting to provide Best-of-Both-Worlds (BoBW) security, which attains full security with an honest majority and is secure with abort if the majority is dishonest. At the heart of our construction is a generic transformation called Auditable Quantum Authentication (AQA) that publicly identifies the malicious sender with overwhelming probability. Our approach comes with several advantages over the traditional way of building MPQC protocols. First, instead of following the Clifford code paradigm, our protocol can be based on a variety of authentication codes. Second, the online phase of our MPQC requires only classical communications. Third, our construction can achieve distributed computation via a carefully crafted protocol design, which can be adjusted to an MPQC that conditionally guarantees output delivery.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/30/2019

Secure Multi-party Quantum Computation with a Dishonest Majority

The cryptographic task of secure multi-party (classical) computation has...
research
12/08/2021

A short review on quantum identity authentication protocols: How would Bob know that he is talking with Alice?

Secure communication has achieved a new dimension with the advent of the...
research
11/18/2019

Secure Quantum Extraction Protocols

Knowledge extraction, typically studied in the classical setting, is at ...
research
03/15/2023

Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority

Secure multi-party computation (SMPC) protocols allow several parties th...
research
04/06/2018

Quantum ciphertext authentication and key recycling with the trap code

We investigate quantum authentication schemes constructed from quantum e...
research
06/05/2019

Security in Asynchronous Interactive Systems

Secure function computation has been thoroughly studied and optimized in...
research
09/19/2022

A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse

Metaverse is a vast virtual environment parallel to the physical world i...

Please sign up or login with your details

Forgot password? Click here to reset