Computer Science ›› 2022, Vol. 49 ›› Issue (5): 311-317.doi: 10.11896/jsjkx.210300058

• Information Security • Previous Articles     Next Articles

Quantum Voting Protocol Based on Quantum Fourier Transform Summation

FENG Yan1,3, WANG Rui-cong1,2   

  1. 1 Department of Cyberspace Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China
    2 School of Computer Science and Technology,Xidian University,Xi’an 710126,China
    3 School of Cyber Science and Technology,University of Science and Technology of China,Hefei 230026,China
  • Received:2021-03-05 Revised:2021-07-03 Online:2022-05-15 Published:2022-05-06
  • About author:FENG Yan,born in 1979,postgraduate,associate professor.Her main research interests include cryptography,network security,and quantum communication network security system.
    WANG Rui-cong,born in 1995,postgraduate.Her main research interests include network security and quantum cryptography.
  • Supported by:
    National Key R & D Program of China(2018YFE0200600) and Anhui Province Guidance Project of Quantum Communication and Quantum Computer Major Projects(AHY180500).

Abstract: To solve the problem that the user information is easy to be stolen in the traditional electronic voting,and the existing quantum voting generally has low computational efficiency,a quantum voting protocol based on the combination of quantum Fourier transform summation and vector coding is proposed.In the protocol,each particpant uses quantum Fourier transform to entangle their secret values into the hands of the initiator in the form of a single particle state to vote,and the secret ranking of candidates’ votes is realized by vector coding,finally the winner announces the number of votes and ranking.The correctness of the quantum Fourier transform summation in the protocol is verified by the quantum computing simulator provided by IBM.Through theoretical analysis,it is proved that the protocol has good security against four kinds of attacks which are intercept-resend attack,entanglement measurement attack,collusion attack,monitor and candidate attack,and the efficiency of the protocol is higher than the existing quantum voting schemes of the same type.

Key words: Electronic voting, IBM Q Experience, Quantum Fourier transform summation, Quantum voting, Vector coding

CLC Number: 

  • TN918.1
[1]DAVID C.Untraceable electronic mail,return addresses,anddigital pseudonyms[J].Communications of the ACM,1981,24(2):84-90.
[2]CHRISTANDL M,WEHNER S.Quantum Anonymous Trans-missions[C]//Proceedings of 11th ASIACRYPT.Berlin:Springer,2005:217-235.
[3]HILLERY M.Quantum voting and privacy protection:firststeps[J].SPIENewsroom,2006,10:1117.
[4]VACCARO J A,SPRING J,CHEFLES A.Quantum protocols for anonymous voting and surveying[J].Physical Review A,2005,75(1):10064-10070.
[5]DU G,ZHOU B M,MA C G,et al.A Secure Quantum Voting Scheme Based on Orthogonal Product States[J].International Journal of Theoretical Physics,2021,60(4):1374-1383.
[6]WANG Q.Application of blind signature in electronic votingsystem based on coding[J].Digital World,2020,179(9):5-6.
[7]YANG Y T,ZHAO Y,ZHANG Q L,et al.HomomorphicWeighted Electronic Voting System Based on SEAL Library[J].Chinese Journal of Computers,2020,43(4):711-723.
[8]HOROSHKO D,KILIN S.Quantum anonymous voting withanonymity check[J].Physics Letters A,2011,375(8):1172-1175.
[9]YAN P L,ZHOU F X,WANG T Y,et al.Novel Quantum Vo-ting Protocol with Eight-Qubit Cluster Entangled State[J].International Journal of Theoretical Physics,2020,59(9):2671-2680.
[10]WANG J,XU G B,JIANG D H.Quantum Voting Scheme with Greenberger-Horne-Zeilinger States[J].International Journal of Theoretical Physics,2020,59(8):2599-2605.
[11]LIU X H,WEN X J,FAN X C,et al.A Secure Quantum Voting Protocol Based on Four-particle GHz State[J].Chinese Journal of Quantum Electronics,2017,34(6):721-726.
[12]SONG X L,CAO Y F,YANG S.Quantum voting scheme based on D-dimensional three-particle entangled states[J].Acta Electronica Sinica,2020,48(7):1355-1360.
[13]QIAN X Q.Research on secure multiparty sorting[D].Hefei:Anhui University,2013.
[14]SHI R H,MU Y,ZHONG H,et al.Secure Multiparty Quantum Computation for Summation and Multiplication[J].Scientific Reports,2016,6(1):1-9.
[15]YANG H Y,YE T Y.Secure multi-party quantum summation based on quantum Fourier transform[J].Quantum Information Processing,2018,17(6):1-17.
[16]DU J Z,CHEN X B,WEN Q Y,et al.Secure multiparty quantum summation[J].Acta physica Sinica,2007,56(11):6214-6219.
[17]YE T Y,HU J L.Quantum Safe Multiparty Sum Based on the Mutual Unbiased Basis of D-order Quantum Systems and Its Applications[J].Science China:Physics,Mechanics and Astronomy,2021,51 (2):88-95.
[18]OVERILL R E.Review:Foundations of Cryptography,Volume II:Basic Applications[J].Journal of Logic and Computation,2005,15(3):405-405.
[19]WANG R C,FENG Y.Secure multi-party quantum sorting protocol based on quantum summation[J].Chinese Journal of Quantum Electronics,2021,38(3):354-364.
[20]QIN J Q.Design and analysis of quantum voting protocol based on multi-body entangled states[D].Hefei:Anhui University,2019.
[21]TIAN J H,ZHANG J Z,LI Y P.A Voting Protocol Based on the Controlled Quantum Operation Teleportation[J].International Journal of Theoretical Physics,2016,55(5):2303-2310.
[22]THAPLIYAL K,SHARMAR D,PATHAK A.Analysis and improvement of Tian-Zhang-Li voting protocol based on controlled quantum teleportation[J].arXiv:2016,1602.00791.
[1] PU Hong-quan, CUI Zhe, LIU Ting,RAO Jin-tao. Comprehensive Review of Secure Electronic Voting Schemes [J]. Computer Science, 2020, 47(9): 275-282.
[2] LUO Fen-fen, LIN Chang-lu, ZHANG Sheng-yuan and LIU Yi-ning. Receipt-freeness Electronic Voting Scheme Based on FOO Voting Protocol [J]. Computer Science, 2015, 42(8): 180-184.
[3] . Threshold-based Electronic Voting Scheme [J]. Computer Science, 2012, 39(7): 39-43.
[4] . [J]. Computer Science, 2006, 33(8): 113-117.
[5] YAO Qian, CHEN Shun ,XIE Li (Department of Computer Science, Nanjing University, Nanjing 210008). [J]. Computer Science, 2006, 33(2): 112-113.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!