The fusion of secure multi-party computing and quantum information has created a new discipline——quantum secure multi-party computing.The performance of quantum secure multi-party computing is guaranteed by the principles of quantum mechanics,so it has greatly improved in security,robustness,communication efficiency,and other aspects.This article mainly focuses on quantum secure multi-party computing,and explores its branches.Although there are many related quantum protocols currently,these protocols have shortcomings in some aspects,such as the inability to achieve both efficiency and security,less research on applications,and high implementation costs.Therefore,based on multiple participants,this article studies the following four branches of quantum secure multi-party computing from the perspectives of theoretical formulation and application:1.Multi-party quantum sealed bidding.Based on the theoretical design of the Nobel Prize in Economics Vickrey auction,using the same properties of two particles in the Bell entangled state,the semi quantum bidder and the auction center perform operations such as single particle measurement,particle preparation,XOR,etc.One party encrypts the transmission information,and the other party decrypts it to obtain the bidding information.Finally,the auction center completes a round of auction by comparing the bids of all bidders.The protocol is semi quantum communication without additional classical communication and pre shared master key,which not only saves costs but also improves efficiency.2.Multi-party quantum key distribution.Using the properties of two identical particles and two opposite particles in Bell entangled states,a new encoding scheme is proposed.Firstly,the identity authentication of participants is performed based on the master key.Secondly,two participants negotiate a shared key through encoding.Finally,the shared key is shared to all participants in the same manner.Finally,the process of fair and collaborative calculation of shared keys by multiple participants is realized.This protocol transfers authentication information including shared keys between orderly participants,ensuring fairness and improving efficiency.3.Multi-party quantum key agreement.This part is a typical application that combines quantum encryption protocol with intelligent devices,and mainly solves the problem of many to many secure logins between users and intelligent devices.Using the property that a Pauli operator in the Bell state will change its state after being executed,the user and the smart device are divided into two groups to synchronously encrypt,decrypt,and convert information,ultimately allowing the user and the smart device to negotiate a login key.In this protocol,two groups of participants can cooperate and restrict each other,ensuring fairness while effectively resisting collusion attacks.4.Multi-party quantum secret sharing.Taking the two proposed conclusions on the properties of GHZ states as the core,we flexibly transform them and apply them to multi-party quantum secret sharing protocols.By measuring and converting GHZ state particles,and using the two conclusions obtained,simple integration and calculation of quantum resources can obtain shared secrets,provided that all participants contribute their private keys,which enables the protocol to ensure fairness,resist collusion attacks,and achieve identity authentication.It is worth mentioning that the two conclusions obtained can also be used for the design of other quantum protocols. |