Quantum Secret Aggregation Utilizing a Network of Agents

نویسندگان

چکیده

Suppose that the renowned spymaster Alice controls a network of spies who all happen to be deployed in different geographical locations. Let us further assume have managed get their hands on small, albeit incomplete by itself, secret, which actually is just part bigger secret. In this work, we consider following problem: given above situation, it possible for securely transmit these partial secrets so they can combined together order reveal big secret Alice? We call problem, which, best our knowledge, novel one relevant literature, quantum aggregation problem. propose protocol, form game, addresses problem complete generality. Our protocol relies use maximally entangled GHZ tuples, shared among and her spies. It power entanglement makes secure transmission small from agents spymaster. As an additional bonus, guarantees security making statistically improbable notorious eavesdropper Eve steal

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A quantum secret ballot

Boaz Tamir Department of Philosophy of Science, Bar-Ilan University, Ramat-Gan, Israel.‡ Abstract The paper concerns the protection of the secrecy of ballots, so that the identity of the voters cannot be matched with their vote. To achieve this we use an entangled quantum state to represent the ballots. Each ballot includes the identity of the voter, explicitly marked on the ”envelope” containi...

متن کامل

Experimental circular quantum secret sharing over telecom fiber network.

We present a robust single photon circular quantum secret sharing (QSS) scheme with phase encoding over 50 km single mode fiber network using a circular QSS protocol. Our scheme can automatically provide a perfect compensation of birefringence and remain stable for a long time. A high visibility of 99.3% is obtained. Furthermore, our scheme realizes a polarization insensitive phase modulators. ...

متن کامل

Utilizing a new feed-back fuzzy neural network for solving a system of fuzzy equations

This paper intends to offer a new iterative method based on articial neural networks for finding solution of a fuzzy equations system. Our proposed fuzzied neural network is a ve-layer feedback neural network that corresponding connection weights to output layer are fuzzy numbers. This architecture of articial neural networks, can get a real input vector and calculates its corresponding fuzzy o...

متن کامل

Privacy Preserving Aggregation of Secret Classifiers

In this paper, we address the issue of privacy preserving data-mining. Specifically, we consider a scenario where each member j of T parties has its own private database. The party j builds a private classifier hj for predicting a binary class variable y. The aim of this paper consists of aggregating these classifiers hj in order to improve individual predictions. More precisely, the parties wi...

متن کامل

Secret quantum communication of a reference frame.

We propose quantum-cryptographic protocols to secretly communicate a reference frame--unspeakable information in the sense it cannot be encoded into a string of bits. Two distant parties can secretly align their Cartesian axes by exchanging N spin-1/2 particles, achieving the optimal accuracy 1/N. A possible eavesdropper cannot gain any information without being detected.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cryptography

سال: 2023

ISSN: ['2410-387X']

DOI: https://doi.org/10.3390/cryptography7010005