计算机科学 ›› 2022, Vol. 49 ›› Issue (5): 311-317.doi: 10.11896/jsjkx.210300058

• 信息安全 • 上一篇    下一篇

基于量子傅里叶变换求和的量子投票协议

冯雁1,3, 王蕊聪1,2   

  1. 1 北京电子科技学院网络空间安全系 北京100070
    2 西安电子科技大学计算机科学与技术学院 西安710126
    3 中国科技大学网络空间安全学院 合肥230026
  • 收稿日期:2021-03-05 修回日期:2021-07-03 出版日期:2022-05-15 发布日期:2022-05-06
  • 通讯作者: 王蕊聪(1193238657@qq.com)
  • 作者简介:(fengy@besti.edu)
  • 基金资助:
    国家重点研发计划(2018YFE0200600);安徽省量子通信与量子计算机重大项目引导性项目课题(AHY180500)

Quantum Voting Protocol Based on Quantum Fourier Transform Summation

FENG Yan1,3, WANG Rui-cong1,2   

  1. 1 Department of Cyberspace Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China
    2 School of Computer Science and Technology,Xidian University,Xi’an 710126,China
    3 School of Cyber Science and Technology,University of Science and Technology of China,Hefei 230026,China
  • Received:2021-03-05 Revised:2021-07-03 Online:2022-05-15 Published:2022-05-06
  • About author:FENG Yan,born in 1979,postgraduate,associate professor.Her main research interests include cryptography,network security,and quantum communication network security system.
    WANG Rui-cong,born in 1995,postgraduate.Her main research interests include network security and quantum cryptography.
  • Supported by:
    National Key R & D Program of China(2018YFE0200600) and Anhui Province Guidance Project of Quantum Communication and Quantum Computer Major Projects(AHY180500).

摘要: 针对传统电子投票存在用户信息易被窃取,而现有量子投票普遍计算效率较低的问题,提出了一种基于量子傅里叶变换求和与向量编码结合的量子投票协议,各方通过量子傅里叶变换将自己的保密数值以单粒子态的形式纠缠叠加到发起方手中进行投票,并通过向量编码实现对候选者票数的保密排序,由获胜者公布票数及排名。通过IBM提供的量子计算模拟器对协议量子傅里叶变换求和的正确性进行了验证。通过理论分析证明了协议在面对截取-重发攻击、纠缠测量攻击、共谋攻击以及监听方-候选者攻击这4类攻击时均有较好的安全性,且与现有同类型量子投票方案相比,协议的效率较高。

关键词: IBM Q Experience, 电子投票, 量子傅里叶变换求和, 量子投票, 向量编码

Abstract: To solve the problem that the user information is easy to be stolen in the traditional electronic voting,and the existing quantum voting generally has low computational efficiency,a quantum voting protocol based on the combination of quantum Fourier transform summation and vector coding is proposed.In the protocol,each particpant uses quantum Fourier transform to entangle their secret values into the hands of the initiator in the form of a single particle state to vote,and the secret ranking of candidates’ votes is realized by vector coding,finally the winner announces the number of votes and ranking.The correctness of the quantum Fourier transform summation in the protocol is verified by the quantum computing simulator provided by IBM.Through theoretical analysis,it is proved that the protocol has good security against four kinds of attacks which are intercept-resend attack,entanglement measurement attack,collusion attack,monitor and candidate attack,and the efficiency of the protocol is higher than the existing quantum voting schemes of the same type.

Key words: Electronic voting, IBM Q Experience, Quantum Fourier transform summation, Quantum voting, Vector coding

中图分类号: 

  • TN918.1
[1]DAVID C.Untraceable electronic mail,return addresses,anddigital pseudonyms[J].Communications of the ACM,1981,24(2):84-90.
[2]CHRISTANDL M,WEHNER S.Quantum Anonymous Trans-missions[C]//Proceedings of 11th ASIACRYPT.Berlin:Springer,2005:217-235.
[3]HILLERY M.Quantum voting and privacy protection:firststeps[J].SPIENewsroom,2006,10:1117.
[4]VACCARO J A,SPRING J,CHEFLES A.Quantum protocols for anonymous voting and surveying[J].Physical Review A,2005,75(1):10064-10070.
[5]DU G,ZHOU B M,MA C G,et al.A Secure Quantum Voting Scheme Based on Orthogonal Product States[J].International Journal of Theoretical Physics,2021,60(4):1374-1383.
[6]WANG Q.Application of blind signature in electronic votingsystem based on coding[J].Digital World,2020,179(9):5-6.
[7]YANG Y T,ZHAO Y,ZHANG Q L,et al.HomomorphicWeighted Electronic Voting System Based on SEAL Library[J].Chinese Journal of Computers,2020,43(4):711-723.
[8]HOROSHKO D,KILIN S.Quantum anonymous voting withanonymity check[J].Physics Letters A,2011,375(8):1172-1175.
[9]YAN P L,ZHOU F X,WANG T Y,et al.Novel Quantum Vo-ting Protocol with Eight-Qubit Cluster Entangled State[J].International Journal of Theoretical Physics,2020,59(9):2671-2680.
[10]WANG J,XU G B,JIANG D H.Quantum Voting Scheme with Greenberger-Horne-Zeilinger States[J].International Journal of Theoretical Physics,2020,59(8):2599-2605.
[11]LIU X H,WEN X J,FAN X C,et al.A Secure Quantum Voting Protocol Based on Four-particle GHz State[J].Chinese Journal of Quantum Electronics,2017,34(6):721-726.
[12]SONG X L,CAO Y F,YANG S.Quantum voting scheme based on D-dimensional three-particle entangled states[J].Acta Electronica Sinica,2020,48(7):1355-1360.
[13]QIAN X Q.Research on secure multiparty sorting[D].Hefei:Anhui University,2013.
[14]SHI R H,MU Y,ZHONG H,et al.Secure Multiparty Quantum Computation for Summation and Multiplication[J].Scientific Reports,2016,6(1):1-9.
[15]YANG H Y,YE T Y.Secure multi-party quantum summation based on quantum Fourier transform[J].Quantum Information Processing,2018,17(6):1-17.
[16]DU J Z,CHEN X B,WEN Q Y,et al.Secure multiparty quantum summation[J].Acta physica Sinica,2007,56(11):6214-6219.
[17]YE T Y,HU J L.Quantum Safe Multiparty Sum Based on the Mutual Unbiased Basis of D-order Quantum Systems and Its Applications[J].Science China:Physics,Mechanics and Astronomy,2021,51 (2):88-95.
[18]OVERILL R E.Review:Foundations of Cryptography,Volume II:Basic Applications[J].Journal of Logic and Computation,2005,15(3):405-405.
[19]WANG R C,FENG Y.Secure multi-party quantum sorting protocol based on quantum summation[J].Chinese Journal of Quantum Electronics,2021,38(3):354-364.
[20]QIN J Q.Design and analysis of quantum voting protocol based on multi-body entangled states[D].Hefei:Anhui University,2019.
[21]TIAN J H,ZHANG J Z,LI Y P.A Voting Protocol Based on the Controlled Quantum Operation Teleportation[J].International Journal of Theoretical Physics,2016,55(5):2303-2310.
[22]THAPLIYAL K,SHARMAR D,PATHAK A.Analysis and improvement of Tian-Zhang-Li voting protocol based on controlled quantum teleportation[J].arXiv:2016,1602.00791.
[1] 蒲泓全, 崔喆, 刘霆, 饶金涛.
安全性电子投票方案研究综述
Comprehensive Review of Secure Electronic Voting Schemes
计算机科学, 2020, 47(9): 275-282. https://doi.org/10.11896/jsjkx.190900125
[2] 罗芬芬,林昌露,张胜元,刘忆宁.
基于FOO投票协议的无收据电子投票方案
Receipt-freeness Electronic Voting Scheme Based on FOO Voting Protocol
计算机科学, 2015, 42(8): 180-184.
[3] 付鹏,蒋夏军,皮德常.
一种新的支持XML文档更新的编码方法
Novel Labeling Scheme for XML Update-supporting
计算机科学, 2014, 41(3): 193-197.
[4] 刘淳,张建学.
RFID技术电子投票应用的探讨
Review on E-voting System Using RFID Technology and its Security
计算机科学, 2011, 38(Z10): 440-443.
[5] 孟凡超,初佃辉,战德臣,徐晓飞.
一种服务质量驱动的企业应用软件构件组装方法
Approach to QoS Driven Component Composition of Enterprise Software and Application
计算机科学, 2009, 36(7): 135-140. https://doi.org/10.11896/j.issn.1002-137X.2009.07.032
[6] .
基于投票的P2P文件真实性认证协议

计算机科学, 2006, 33(8): 113-117.
[7] 姚前 陈舜 谢立.
一种基于证书的电子投票协议

计算机科学, 2006, 33(2): 112-113.
[8] 张恩德 王国仁 宁博 王斌.
DVBB:基于Dewey向量的B+树索引结构连接算法

计算机科学, 2005, 32(11): 94-98.
[9] 赖瑾 范玉顺.
一种新的安全、实用的电子投票方案

计算机科学, 2003, 30(1): 142-144.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!