Continuous variable controlled quantum dialogue and secure multiparty quantum computation

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Continuous-variable blind quantum computation.

Blind quantum computation is a secure delegated quantum computing protocol where Alice, who does not have sufficient quantum technology at her disposal, delegates her computation to Bob, who has a fully fledged quantum computer, in such a way that Bob cannot learn anything about Alice's input, output, and algorithm. Protocols of blind quantum computation have been proposed for several qudit mea...

متن کامل

Secure Multiparty Quantum Computation for Summation and Multiplication

As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to secu...

متن کامل

From Qubits to Continuous–Variable Quantum Computation

By encoding a qudit in a harmonic oscillator and investigating the d → ∞ limit, we give an entirely new realization of continuous–variable quantum computation. The generalized Pauli group is generated by number and phase operators for harmonic oscillators. The use of continuous–variable (CV) quantum computing allows information to be encoded and processed much more compactly and efficiently tha...

متن کامل

Secure assisted quantum computation

Suppose Alice wants to perform some computation that could be done quickly on a quantum computer, but she cannot do universal quantum computation. Bob can do universal quantum computation and claims he is willing to help, but Alice wants to be sure that Bob cannot learn her input, the result of her calculation, or perhaps even the function she is trying to compute. We describe a simple, efficie...

متن کامل

Secure Multiparty Computation

A function is private if there exists a protocol that is secure; that is, no party can learn any additional information about the other parties’ inputs other than what follows from their own input and the function’s output. Previous studies have investigated multiparty computation with broadcast communication, but broadcast communication does not fully capture all secure multiparty protocols. W...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Quantum Information

سال: 2020

ISSN: 0219-7499,1793-6918

DOI: 10.1142/s0219749920500094