Computer Science ›› 2022, Vol. 49 ›› Issue (5): 311-317.doi: 10.11896/jsjkx.210300058

• Information Security • Previous Articles     Next Articles

Quantum Voting Protocol Based on Quantum Fourier Transform Summation

FENG Yan1,3, WANG Rui-cong1,2   

  1. 1 Department of Cyberspace Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China
    2 School of Computer Science and Technology,Xidian University,Xi’an 710126,China
    3 School of Cyber Science and Technology,University of Science and Technology of China,Hefei 230026,China
  • Received:2021-03-05 Revised:2021-07-03 Online:2022-05-15 Published:2022-05-06
  • About author:FENG Yan,born in 1979,postgraduate,associate professor.Her main research interests include cryptography,network security,and quantum communication network security system.
    WANG Rui-cong,born in 1995,postgraduate.Her main research interests include network security and quantum cryptography.
  • Supported by:
    National Key R & D Program of China(2018YFE0200600) and Anhui Province Guidance Project of Quantum Communication and Quantum Computer Major Projects(AHY180500).

Abstract: To solve the problem that the user information is easy to be stolen in the traditional electronic voting,and the existing quantum voting generally has low computational efficiency,a quantum voting protocol based on the combination of quantum Fourier transform summation and vector coding is proposed.In the protocol,each particpant uses quantum Fourier transform to entangle their secret values into the hands of the initiator in the form of a single particle state to vote,and the secret ranking of candidates’ votes is realized by vector coding,finally the winner announces the number of votes and ranking.The correctness of the quantum Fourier transform summation in the protocol is verified by the quantum computing simulator provided by IBM.Through theoretical analysis,it is proved that the protocol has good security against four kinds of attacks which are intercept-resend attack,entanglement measurement attack,collusion attack,monitor and candidate attack,and the efficiency of the protocol is higher than the existing quantum voting schemes of the same type.

Key words: Electronic voting, Quantum Fourier transform summation, Vector coding, Quantum voting, IBM Q Experience

CLC Number: 

  • TN918.1
[1]DAVID C.Untraceable electronic mail,return addresses,anddigital pseudonyms[J].Communications of the ACM,1981,24(2):84-90.
[2]CHRISTANDL M,WEHNER S.Quantum Anonymous Trans-missions[C]//Proceedings of 11th ASIACRYPT.Berlin:Springer,2005:217-235.
[3]HILLERY M.Quantum voting and privacy protection:firststeps[J].SPIENewsroom,2006,10:1117.
[4]VACCARO J A,SPRING J,CHEFLES A.Quantum protocols for anonymous voting and surveying[J].Physical Review A,2005,75(1):10064-10070.
[5]DU G,ZHOU B M,MA C G,et al.A Secure Quantum Voting Scheme Based on Orthogonal Product States[J].International Journal of Theoretical Physics,2021,60(4):1374-1383.
[6]WANG Q.Application of blind signature in electronic votingsystem based on coding[J].Digital World,2020,179(9):5-6.
[7]YANG Y T,ZHAO Y,ZHANG Q L,et al.HomomorphicWeighted Electronic Voting System Based on SEAL Library[J].Chinese Journal of Computers,2020,43(4):711-723.
[8]HOROSHKO D,KILIN S.Quantum anonymous voting withanonymity check[J].Physics Letters A,2011,375(8):1172-1175.
[9]YAN P L,ZHOU F X,WANG T Y,et al.Novel Quantum Vo-ting Protocol with Eight-Qubit Cluster Entangled State[J].International Journal of Theoretical Physics,2020,59(9):2671-2680.
[10]WANG J,XU G B,JIANG D H.Quantum Voting Scheme with Greenberger-Horne-Zeilinger States[J].International Journal of Theoretical Physics,2020,59(8):2599-2605.
[11]LIU X H,WEN X J,FAN X C,et al.A Secure Quantum Voting Protocol Based on Four-particle GHz State[J].Chinese Journal of Quantum Electronics,2017,34(6):721-726.
[12]SONG X L,CAO Y F,YANG S.Quantum voting scheme based on D-dimensional three-particle entangled states[J].Acta Electronica Sinica,2020,48(7):1355-1360.
[13]QIAN X Q.Research on secure multiparty sorting[D].Hefei:Anhui University,2013.
[14]SHI R H,MU Y,ZHONG H,et al.Secure Multiparty Quantum Computation for Summation and Multiplication[J].Scientific Reports,2016,6(1):1-9.
[15]YANG H Y,YE T Y.Secure multi-party quantum summation based on quantum Fourier transform[J].Quantum Information Processing,2018,17(6):1-17.
[16]DU J Z,CHEN X B,WEN Q Y,et al.Secure multiparty quantum summation[J].Acta physica Sinica,2007,56(11):6214-6219.
[17]YE T Y,HU J L.Quantum Safe Multiparty Sum Based on the Mutual Unbiased Basis of D-order Quantum Systems and Its Applications[J].Science China:Physics,Mechanics and Astronomy,2021,51 (2):88-95.
[18]OVERILL R E.Review:Foundations of Cryptography,Volume II:Basic Applications[J].Journal of Logic and Computation,2005,15(3):405-405.
[19]WANG R C,FENG Y.Secure multi-party quantum sorting protocol based on quantum summation[J].Chinese Journal of Quantum Electronics,2021,38(3):354-364.
[20]QIN J Q.Design and analysis of quantum voting protocol based on multi-body entangled states[D].Hefei:Anhui University,2019.
[21]TIAN J H,ZHANG J Z,LI Y P.A Voting Protocol Based on the Controlled Quantum Operation Teleportation[J].International Journal of Theoretical Physics,2016,55(5):2303-2310.
[22]THAPLIYAL K,SHARMAR D,PATHAK A.Analysis and improvement of Tian-Zhang-Li voting protocol based on controlled quantum teleportation[J].arXiv:2016,1602.00791.
[1] PU Hong-quan, CUI Zhe, LIU Ting,RAO Jin-tao. Comprehensive Review of Secure Electronic Voting Schemes [J]. Computer Science, 2020, 47(9): 275-282.
[2] LUO Fen-fen, LIN Chang-lu, ZHANG Sheng-yuan and LIU Yi-ning. Receipt-freeness Electronic Voting Scheme Based on FOO Voting Protocol [J]. Computer Science, 2015, 42(8): 180-184.
[3] . Threshold-based Electronic Voting Scheme [J]. Computer Science, 2012, 39(7): 39-43.
[4] . [J]. Computer Science, 2006, 33(8): 113-117.
[5] YAO Qian, CHEN Shun ,XIE Li (Department of Computer Science, Nanjing University, Nanjing 210008). [J]. Computer Science, 2006, 33(2): 112-113.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] XUE Shan-liang, YANG Pei-ru and ZHOU Xi. WSN Wireless Data Transceiver Unit Fault Diagnosis with Fuzzy Neural Network[J]. Computer Science, 2018, 45(5): 38 -43 .
[2] ZHANG Yong-gang, CHENG Zhu-yuan. Research Progress on Max Restricted Path Consistency Constraint Propagation Algorithms[J]. Computer Science, 2018, 45(6A): 41 -45 .
[3] ZHANG Chao,JIN Long-bin,HAN Cheng. Method of Facial Motion Capture and Data Virtual Reusing Based on Clue Guided[J]. Computer Science, 2018, 45(6A): 198 -201 .
[4] LIU Chun-yang, WU Ze-min, HU Lei, LIU Xi. Pedestrian Detection Based on Objectness and Sapce-Time Covariance Features[J]. Computer Science, 2018, 45(6A): 210 -214 .
[5] HAN Jie, SONG Xiao-qin, DONG Li and JIN hui. Suboptimal Dynamic Resource Allocation Algorithm in OFDM Based Cognitive Radio Network[J]. Computer Science, 2017, 44(5): 48 -52 .
[6] ZHANG Yu-xia. Study on Bug-fixed Traceability of Mozilla Project[J]. Computer Science, 2017, 44(4): 21 -23 .
[7] LIN Wei-lan, XIAO Jin-chao and ZI Shuang-fei. Route-radius-based Adaptive Protocol for Long-chain Wireless Sensor Networks[J]. Computer Science, 2017, 44(3): 97 -104 .
[8] YANG Lu and YE Xiao-jun. Key Management Issues and Challenges in Cloud[J]. Computer Science, 2017, 44(3): 3 -9 .
[9] WANG Jun-lu, WANG Ling, WANG Yan and SONG Bao-yan. Missing Data Imputation Approach Based on Tuple Similarity[J]. Computer Science, 2017, 44(2): 98 -102 .
[10] XU Jing-jing, ZHANG Xin-hui, XU Bi-xiao and SUN Zhi-xin. Survey of Clustering Algorithms for Wireless Sensor Networks[J]. Computer Science, 2017, 44(2): 31 -37 .