Quantum secure circuit evaluation
Quantum secure circuit evaluation
摘要
In order to solve the problem of classical secure circuit evaluation, this paper proposes a quantum approach. In this approach, the method of inserting redundant entangled particles and quantum signature has been employed to strengthen the security of the system. Theoretical analysis shows that our solution is secure against classical and quantum attacks.
参考文献25
-
1[1]Yao, A., How to generate and exchange secrets, IEEE FOCS, 1986, 162-167.
-
2[2]Goldreich, O., Micali, S., Wigderson, A., How to play any mental game, STOC 87, 1987, 218-229.
-
3[3]Galil, Z., Haber, S., Yung, M., Cryptographic computation: Secure fault-tolerant protocols and the public-key model, Advances in Cryptology - CRYPTO '87, Proceedings, 1988, 135-155.
-
4[4]Goldreich, O., Vainish, R., How to solve any protocol problem - An efficiency improvement, Advances in Cryptology - CRYPTO '87, Proceedings, 1988, 73-86.
-
5[5]Kilian, J., Uses of Randomness in Algorithms and Protocols, Cambridge: MIT Press, 1990.
-
6[6]Ben-Or, M., Goldwasser, S., Wigderson, A., Completeness theorems for non-cryptographic fault-tolerant distributed computation, ACM STOC, 1988, 1-9.
-
7[7]Chaum, D., Cr′epeau, C., Damgaard, I., Multiparty unconditionally secure protocols, ACM STOC, 1988, 11-19.
-
8[8]Sander, T., Young, A., Yung, M., Non-interactive crypto-computation for NC1, Annual Symposium on Foundations of Computer Science - Proceedings, 1999, 554-566.
-
9[9]Bennett, C. H., Shor, P. W., Quantum information theory, IEEE Transactions on Information Theory, 1998, 44: 2724-2742.
-
10[10]Schumacher, B., Westmoreland, M. D., Quantum privacy and quantum coherence, Phys. Rev. Lett., 1998, 80: 5695.
-
1XIONGYan CHENHuanhuan GUNaijie MIAOFuyou.Quantum Mobile Crypto-Computation[J].Chinese Journal of Electronics,2005,14(2):249-252.
-
2WANG Pengjun ZHANG Yuejun ZHANG Xuelong.Design of Two-phase SABL Flip-flop for Resistant DPA Attacks[J].Chinese Journal of Electronics,2013,22(4):833-837. 被引量:3
-
3魏强.如何玩好CLASSIC Model3前级[J].高保真音响,1999(5):11-14.
-
4德州仪器电源管理技术提高手机充电的系统安全性[J].电源技术应用,2007,10(10):64-64.
-
5诺德SK 200E系列变频器可提供SIL3认证的安全技术应用[J].现代零部件,2012(11):13-13.
-
6王莹.电路保护产品繁多,力特线上工具新增ESD选型[J].电子产品世界,2015,22(5):75-75.
-
7HE YAFEI.China & U.S. to Strengthen Cooperation under the G20 Framework[J].China Today,2016,65(9):27-30.
-
8A.El Allati,Y.Hassouni,N.Metwally.Dynamics of a multi-mode maximum entangled coherent state over an amplitude damping channel[J].Chinese Physics B,2011,20(11):67-73.
-
9Liang Yongming,Luo Hanwen,Wu Yadong,Huang Jianguo.Blind channel estimation for redundant precoded OFDM systems[J].Journal of Systems Engineering and Electronics,2007,18(4):692-697.
-
10音乐大师CLASSIC-15音响[J].视听前线,2009(11):68-68.