The Journal of China Universities of Posts and Telecommunications ›› 2022, Vol. 29 ›› Issue (4): 51-68.doi: 10.19682/j.cnki.1005-8885.2022.2019

• Special Topic: Quantum Science and Technology • Previous Articles     Next Articles

Nearly universal and efficient quantum secure multi-party computation protocol

Han Yushan, Che Bichen, Liu Jiali, Dou Zhao, Di Junyu   

  1. 1. State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    2. School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2021-09-01 Revised:2021-12-15 Accepted:2022-06-29 Online:2022-08-31 Published:2022-08-31
  • Contact: Dou Zhao, E-mail:
  • Supported by:
    This work was supported by the National Key Research and Development Program of China (2020YFB1805405), the 111
    Project (B21049), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (2019BDKFJJ014) and the
    Fundamental Research Funds for the Central Universities (2020RC38).

Abstract: Universality is an important property in software and hardware design. This paper concentrates on the universality of quantum secure multi-party computation (SMC) protocol. First of all, an in-depth study of universality has been onducted, and then a nearly universal protocol is proposed by using the Greenberger-Horne-Zeilinger (GHZ)-like state and stabilizer formalism. The protocol can resolve the quantum SMC problem which can be deduced as modulo subtraction, and the steps are simple and effective. Secondly, three quantum SMC protocols based on the proposed universal protocol: Quantum private comparison (QPC) protocol, quantum millionaire (QM) protocol, and quantum multi-party summation (QMS) protocol are presented. These protocols are given as examples to explain universality. Thirdly, analyses of the example protocols are shown. Concretely, the correctness, fairness, and efficiency are confirmed. And the proposed universal protocol meets security from the perspective of preventing inside attacks and outside attacks. Finally, the experimental results of the example protocols on the International Business Machines (IBM) quantum platform are consistent with the theoretical results. Our research indicates that our protocol is universal to a certain degree and easy to perform.

Key words: universality, quantum secure multi-party computation, security, Greenberger-Horne-Zeilinger-like state, simple operation

CLC Number: