Skip to main content
Log in

Quantum anonymous ranking and selection with verifiability

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Anonymous ranking allows each user to perfectly know the position of his/her private datum in the ascending or descending sequence of all ranking data, while anonymous selection focuses on particular items. Both of them disclose each user’s input and hide the accurate link between users and ranking data. Mature solutions of anonymous ranking and selection are usually crucial components of solving complex problems and are also extensively applied to many fields in daily life, such as auctions and commercial enterprises. In this paper, we propose two protocols of quantum anonymous ranking and selection with verifiability, in which each user can verify whether his/her ranking datum has been modified in a manner without detection and obtain the corresponding output with the property of anonymity. Furthermore, we demonstrate in detail that our protocols achieve security against outside eavesdroppers and inside malicious users under ideal or practical environment assumptions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1

Similar content being viewed by others

References

  1. Qiu, M., Luo, S.S., Liu, W., Chen, P.: A solution of secure multi-party multi-data ranking problem based on RSA encryption scheme. Chin. J. Electron. 37(5), 1119–1123 (2009)

    Google Scholar 

  2. Xiao, Q., Luo, S.S., Chen, P., Wu, B.: Research on the problem of secure multi-party ranking under semi-honest model. Chin. J. Electron. 36(4), 709–714 (2008)

    Google Scholar 

  3. Cheng, C., Luo, Y.L., Chen, C.X., Zhao, X.K.: Research on secure multi-party ranking problem and secure selection problem. In: Proceedings of WISM ’10, pp. 79–84, Washington (2010)

  4. Huang, W., Wen, Q.Y., Liu, B., Su, Q., Qin, S.J., Gao, F.: Quantum anonymous ranking. Phys. Rev. A 89(3), 032325 (2014)

    Article  ADS  Google Scholar 

  5. Lin, S., Guo, G.D., Huang, F., Liu, X.F.: Quantum anonymous ranking based on the Chinese remainder theorem. Phys. Rev. A 93(1), 012318 (2016)

    Article  ADS  Google Scholar 

  6. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer Systems and Signal Processing, p. 17, Bangalore (1984)

  7. Deng, F.G., Long, G.L.: Controlled order rearrangement encryption for quantum key distribution. Phys. Rev. A 68(4), 042315 (2003)

    Article  ADS  Google Scholar 

  8. Chen, X.B., Wen, Q.Y., Guo, F.Z., Sun, Y., Xu, G., Zhu, F.C.: Controlled quantum secure direct communication with W state. Int. J. Quant. Inf. 6(4), 899–906 (2008)

    Article  Google Scholar 

  9. Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 18241829 (1999)

    Article  ADS  MathSciNet  Google Scholar 

  10. Yang, Y.G., Wen, Q.Y., Zhang, X.: Multiparty simultaneous quantum identity authentication with secret sharing. Sci. China G Phys. Mech. Astron. 51(3), 321327 (2008)

    MATH  Google Scholar 

  11. Jia, H.Y., Wen, Q.Y., Gao, F., Qin, S.J., Guo, F.Z.: Dynamic quantum secret sharing. Phys. Lett. A 376(10), 1035–1041 (2012)

    Article  ADS  MathSciNet  Google Scholar 

  12. Christandl, M., Wehner, S.: Quantum anonymous transmissions. In: ASIACRYPT 2005, pp. 217-235, Berlin (2005)

  13. Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Economical quantum anonymous transmissions. J. Phys. B At. Mol. Opt. Phys. 43(24), 245501 (2010)

    Article  ADS  Google Scholar 

  14. Shi, R.H., Su, Q., Guo, Y., Huang, D.: The dining cryptographer problem-based anonymous quantum communication via non-maximally entanglement state analysis. Int. J. Theor. Phys. 376(10), 1035–1041 (2012)

    MATH  Google Scholar 

  15. Shi, R.H., Mu, Y., Zhong, H., Cui, J., Zhang, S.: Secure multiparty quantum computation for summation and multiplication. Sci. Rep. 6(1), 19655 (2016)

    Article  ADS  Google Scholar 

  16. Wang, Q.L., Sun, H.X., Huang, W.: Multi-party quantum private comparison protocol with \(n\)-level entangled statesg. Quantum Inf. Proc. 13(11), 23752389 (2014)

    Article  Google Scholar 

  17. Wang, Q.L., Yu, C.H., Gao, F., Qi, H.Y., Wen, Q.Y.: Self-tallying quantum anonymous voting. Phys. Rev. A 94(2), 022333 (2016)

    Article  ADS  Google Scholar 

  18. Li, D., Yang, Y.G., Bi, J.L., Yuan, J.B., Xu, J.: Controlled alternate quantum walks based quantum hash function. Sci. Rep. 8(1), 225 (2018)

    Article  ADS  Google Scholar 

  19. Zhou, Y.Q., Gao, F., Li, D.D., Li, X.H., Wen, Q.Y.: Semi-device-independent randomness expansion with partially free random sources using \(3\rightarrow 1\) quantum random access code. Phys. Rev. A 94(3), 032318 (2016)

    Article  ADS  Google Scholar 

  20. Zhang, Z.C., Gao, F., Cao, Y., Qin, S.J., Wen, Q.Y.: Local indistinguishability of orthogonal product states. Phys. Rev. A 93(1), 012314 (2016)

    Article  ADS  MathSciNet  Google Scholar 

  21. Jiang, D.H., Xu, Y.L., Xu, G.B.: Arbitrary quantum signature based on local indistinguishability of orthogonal product states. Int. J. Theor. Phys. 58(3), 10361045 (2019)

    MathSciNet  Google Scholar 

  22. Aaronson, S., Christiano, P.: Quantum money from hidden subspaces. In: Proceedings of STOC 12 Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing, p. 4160, New York (2012)

  23. Moulick, S.R., Panigrahi, P.K.: Quantum cheques. Quantum Inf. Proc. 15, 2475 (2016). https://doi.org/10.1007/s11128-016-1273-4

    Article  ADS  MathSciNet  MATH  Google Scholar 

  24. Gavinsky, D.: Quantum money with classical verification. In: Proceedings of IEEE 27th Conference on Computational Complexity, p. 4252, Porto (2012)

  25. Behera, A., Paul, G.: Quantum to classical one-way function and its applications in quantum money authentication. Quantum Inf. Proc. 17, 200 (2018). https://doi.org/10.1007/s11128-018-1965-z

    Article  ADS  MathSciNet  MATH  Google Scholar 

  26. Cabello, A.: \(N\)-particle \(N\)-level singlet states: some properties and applications. Phys. Rev. Lett. 89(10), 100402 (2002)

    Article  ADS  MathSciNet  Google Scholar 

  27. Broadbent, A., Tapp, A.: Information-theoretic security without an honest majority. In: ASIACRYPT 2005, pp. 410–426, Heidelberg (2007)

  28. Hevia, A., Micciancio, D.: Simultaneous broadcast revisited. In: Proceedings of the Twenty-Fourth annual ACM Symposium on Principles of Distributed Computing, pp. 324–333, New York (2005)

  29. Wang, Q.L., Yu, C.H., Li, Y.C., He, H., Zhou, Y.Q.: Quantum random draw and application in picking at random problems (in generation)

  30. Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the Br\(\acute{a}\)dler-Du\(\check{s}\)ek protocol. Quantum Inf. Comput. 7(4), 329–334 (2007)

    MathSciNet  Google Scholar 

Download references

Acknowledgements

This work was supported by NSFC (Grant No. 61801126), Open project of CAS Key Laboratory of Quantum Information, University of Science and Technology of China (Grant No. KQI201902), Research and Application of Key Technologies for Open Source Software Security Monitoring (Grant No. SGFJXT00YJJS1800074).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuancheng Li.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, Q., Li, Y., Yu, C. et al. Quantum anonymous ranking and selection with verifiability. Quantum Inf Process 19, 166 (2020). https://doi.org/10.1007/s11128-020-02664-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-020-02664-y

Keywords

Navigation