An Investigative Study of Quantum-safe Secure Multi-party Computation

Year : 2024 | Volume :02 | Issue : 01 | Page : 39-44
By

Aiswarya Dwarampudi

Yamuna Mundru

Manas Kumar Yogi

  1. Assistant Professor Department of Computer Science & Engineering, Pragati Engineering College, Kakinada Andhra Pradesh India
  2. Assistant Professor Department of Computer Science & Engineering–Artificial Intelligence & Machine Learning (CSE–AI & ML), Pragati Engineering College, Kakinada Andhra Pradesh India
  3. Assistant Professor Department of Computer Science & Engineering, Pragati Engineering College, Kakinada Andhra Pradesh India

Abstract

This article represents the comprehensive investigation in the emerging field of quantum-safe secure multi-party computation (QSSMPC) and presents novel perspectives to address the impending threat posed by quantum computers to classical cryptographic systems. As the era of quantum computing approaches, traditional encryption methods become vulnerable to quantum algorithms, necessitating the development of quantum-resistant cryptographic protocols. In this context, the paper introduces innovative approaches to secure multi-party computation in a quantum-safe framework. It discusses the theoretical foundations of quantum-safe cryptography and its integration into multi-party computation protocols. The paper also explores practical implementations and potential applications of QSSMPC in real-world scenarios, emphasizing the importance of transitioning towards quantum-resistant cryptographic techniques to ensure the long-term security of sensitive data. The provided viewpoints seek to actively engage in the ongoing discussion surrounding quantum-safe cryptographic systems, providing valuable perspectives that guide the creation of resilient and secure computing frameworks in the post-quantum era.

Keywords: Quantum, secure multi-party computation (SMPC), security, privacy, encryption, private key

[This article belongs to International Journal of Computer Science Languages(ijcsl)]

How to cite this article: Aiswarya Dwarampudi, Yamuna Mundru, Manas Kumar Yogi. An Investigative Study of Quantum-safe Secure Multi-party Computation. International Journal of Computer Science Languages. 2024; 02(01):39-44.
How to cite this URL: Aiswarya Dwarampudi, Yamuna Mundru, Manas Kumar Yogi. An Investigative Study of Quantum-safe Secure Multi-party Computation. International Journal of Computer Science Languages. 2024; 02(01):39-44. Available from: https://journals.stmjournals.com/ijcsl/article=2024/view=145646

References

  1. Fernandez-Carames TM, Fraga-Lamas P. Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE Access. 2020; 8: 21091–21116.
  2. Kapourniotis T, Kashefi E, Leichtle D, Music L, Ollivier H. Asymmetric quantum secure multi-party computation with weak clients against dishonest majority. arXiv preprint arXiv:2303.08865. March 15, 2023. Available at https://eprint.iacr.org/2023/379
  3. Innocenzi A. Theoretical Analysis and Experimental Implementation of Quantum Oblivious Transfer. Magisterale Thesis. Milan, Italy: Politecnico Milano; 2021/2022. Available at https://www.politesi.polimi.it/handle/10589/210720
  4. Chen FL, Zhang H, Chen SG, Cheng WT. Novel two-party quantum private comparison via quantum walks on circle. Quantum Inform Process. 2021; 20 (5): 178.
  5. Kumar A, Garhwal S. State-of-the-art survey of quantum cryptography. Arch Comput Methods Eng. 2021; 28: 3831–3868.
  6. Jiang Y, Zhou Y, Feng T. A blockchain-based secure multi-party computation scheme with multi-key fully homomorphic proxy re-encryption. Information. 2022; 13 (10): 481.
  7. Srivastava T, Bhushan B, Bhatt S, Haque AB. Integration of quantum computing and blockchain technology: a cryptographic perspective. In: Kumar R, Sharma R, Pattnaik PK, editors. Multimedia Technologies in the Internet of Things Environment, Volume 3. Singapore: Springer; 2022. pp. 197–228.
  8. Prasad A, Sani A, Ong SY, Guntaguli N, Rampally S. Digital Client Identity and Management Using Blockchain. [Online]. November 2, 2023. Technical Disclosure Commons. Available at https://www.tdcommons.org/dpubs_series/6381/
  9. Cao Z, Huang C, Li Y. A study on the improvement of computation, communication and security in garbled circuits. In 2021 6th International Conference on Intelligent Computing and Signal Processing (ICSP), Xi’an, China, April 9–11, 2021. pp. 609–617.
  10. Kou TY, Che BC, Dou Z, Chen XB, Lai YP, Li J. Efficient quantum private comparison protocol utilizing single photons and rotational encryption. Chin Phys B. 2022; 31 (6): 060307.
  11. Zhang K, Ma C, Sun Z, Zhang X, Zhou B, Wang Y. Privacy-preserving decision protocols based on quantum oblivious key distribution. Computers Mater Continua. 2020; 64 (3): 1915–1928.
  12. Zhang Y, Gai K, Qiu M, Ding K. Understanding privacy-preserving techniques in digital cryptocurrencies. In: Qiu M, editor. Algorithms and Architectures for Parallel Processing: 20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2–4, 2020, Proceedings, Part III Cham, Switzerland, Springer International; 2020. pp. 3–18.
  13. Wallden P, Kashefi E. Cyber security in the quantum era. Commun ACM. 2019; 62 (4): 120–129.

Regular Issue Subscription Review Article
Volume 02
Issue 01
Received February 19, 2024
Accepted April 30, 2024
Published May 9, 2024