A novel quantum scheme for secure two-party distance computation

被引:12
|
作者
Peng, Zhen-wan [1 ]
Shi, Run-hua [1 ]
Zhong, Hong [1 ]
Cui, Jie [1 ]
Zhang, Shun [1 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230601, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure multiparty computation; Computational geometry; Quantum private query; Secure two-party distance; PROTOCOL;
D O I
10.1007/s11128-017-1766-9
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.
引用
收藏
页数:12
相关论文
共 50 条
  • [11] Geometry of Secure Two-party Computation
    Basu, Saugata
    Khorasgani, Hamidreza Amini
    Maji, Hemanta K.
    Nguyen, Hai H.
    2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
  • [12] Secure Two-Party Computation Is Practical
    Pinkas, Benny
    Schneider, Thomas
    Smart, Nigel P.
    Williams, Stephen C.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
  • [13] Secrecy of two-party secure computation
    Chiang, YT
    Wang, DW
    Liau, CJ
    Hsu, TS
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 114 - 123
  • [14] On the Power of Secure Two-Party Computation
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429
  • [15] LEGO for Two-Party Secure Computation
    Nielsen, Jesper Buus
    Orlandi, Claudio
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 368 - 386
  • [16] On the Power of Secure Two-Party Computation
    Carmit Hazay
    Muthuramakrishnan Venkitasubramaniam
    Journal of Cryptology, 2020, 33 : 271 - 318
  • [17] On the Power of Secure Two-Party Computation
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    JOURNAL OF CRYPTOLOGY, 2020, 33 (01) : 271 - 318
  • [18] A PASSWORD-AUTHENTICATION SCHEME BASED ON SECURE TWO-PARTY COMPUTATION
    Sun, Qibo
    Wang, Wenbin
    Yang, Fangchun
    Xiao, Qian
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 275 - +
  • [19] Quantum secure two-party computation for set intersection with rational players
    Arpita Maitra
    Quantum Information Processing, 2018, 17
  • [20] Quantum secure two-party computation for set intersection with rational players
    Maitra, Arpita
    QUANTUM INFORMATION PROCESSING, 2018, 17 (08)