27+10 pages, 5 figures. This work supersedes arXiv:2102.12949Secure multi-party computation (SMPC) protocols allow several parties that distrust each other to collectively compute a function on their inputs. In this paper, we introduce a protocol that lifts classical SMPC to quantum SMPC in a composably and statistically secure way, even for a single honest party. Unlike previous quantum SMPC protocols, our proposal only requires very limited quantum resources from all but one party; it suffices that the weak parties, i.e. the clients, are able to prepare single-qubit states in the X-Y plane. The novel quantum SMPC protocol is constructed in a naturally modular way, and relies on a new technique for quantum verification that is of independe...
The most general type of multi-party computation involves $n$ participants. Participant $i$ supplies...
International audienceBlind quantum computing (BQC) allows a client to have a server carry out a qua...
Using quantum networks to distribute symmetric keys has become a usable and commercial technology av...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
Quantum computing has seen tremendous progress in the past few years. However, due to limitations in...
Secure multi-party computing, also called "secure function evaluation", has been extensively studied...
Secure multi-party computing, also called secure func-tion evaluation, has been extensively studied ...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
International audienceThe universal blind quantum computation protocol (UBQC) enables an almost clas...
The universal blind quantum computation protocol (UBQC) enables an almost classical client to delega...
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental...
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental...
In this paper we suggest secure multi-party quantum computation (MPQC) protocol based on a sub-class...
The most general type of multi-party computation involves $n$ participants. Participant $i$ supplies...
International audienceBlind quantum computing (BQC) allows a client to have a server carry out a qua...
Using quantum networks to distribute symmetric keys has become a usable and commercial technology av...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
Quantum computing has seen tremendous progress in the past few years. However, due to limitations in...
Secure multi-party computing, also called "secure function evaluation", has been extensively studied...
Secure multi-party computing, also called secure func-tion evaluation, has been extensively studied ...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
The cryptographic task of secure multi-party (classical) computation has received a lot of attention...
International audienceThe universal blind quantum computation protocol (UBQC) enables an almost clas...
The universal blind quantum computation protocol (UBQC) enables an almost classical client to delega...
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental...
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental...
In this paper we suggest secure multi-party quantum computation (MPQC) protocol based on a sub-class...
The most general type of multi-party computation involves $n$ participants. Participant $i$ supplies...
International audienceBlind quantum computing (BQC) allows a client to have a server carry out a qua...
Using quantum networks to distribute symmetric keys has become a usable and commercial technology av...