DeepAI AI Chat
Log In Sign Up

Secure Multi-party Quantum Computation with a Dishonest Majority

by   Yfke Dulek, et al.

The cryptographic task of secure multi-party (classical) computation has received a lot of attention in the last decades. Even in the extreme case where a computation is performed between k mutually distrustful players, and security is required even for the single honest player if all other players are colluding adversaries, secure protocols are known. For quantum computation, on the other hand, protocols allowing arbitrary dishonest majority have only been proven for k=2. In this work, we generalize the approach taken by Dupuis, Nielsen and Salvail (CRYPTO 2012) in the two-party setting to devise a secure, efficient protocol for multi-party quantum computation for any number of players k, and prove security against up to k-1 colluding adversaries. The quantum round complexity of the protocol for computing a quantum circuit with g gates acting on w qubits is O((w+g)k). To achieve efficiency, we develop a novel public verification protocol for the Clifford authentication code, and a testing protocol for magic-state inputs, both using classical multi-party computation.


Secure Multi-Party Quantum Conference and Xor Computation

Quantum conference is a process of securely exchanging messages between ...

Oblivious Transfer is in MiniQCrypt

MiniQCrypt is a world where quantum-secure one-way functions exist, and ...

Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses

It is of folkloric belief that the security of classical cryptographic p...

Secure Error Correction using Multi-Party Computation

During recent years with the increase of data and data analysis needs, p...

a quantum secure multiparty computation protocol for least common multiple

In this paper, we present a secure multiparty computation (SMC) protocol...

Communication Efficient Semi-Honest Three-Party Secure Multiparty Computation with an Honest Majority

In this work, we propose a novel protocol for secure three-party computa...