Quantum Privacy-preserving Two-party Circle Intersection Protocol Based on Phase-encoded Query

被引:0
|
作者
Zi-Xian Li
Qi Yang
Bao Feng
Wen-Jie Liu
机构
[1] Nanjing University of Information Science and Technology,School of Software
[2] NARI Information & Communication Technology Co.,Engineering Research Center of Digital Forensics
[3] Ltd.,undefined
[4] Ministry of Education,undefined
来源
International Journal of Theoretical Physics | / 62卷
关键词
Quantum computing; Quantum communication; Quantum security multi-party computing; Privacy-preserving circle intersection; Phase-encoded query; Oracle operator;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy-preserving geometric intersection (PGI) is an important issue in Secure multiparty computation (SMC). The existing quantum PGI protocols are mainly based on grid coding, which requires a lot of computational complexity. The phase-encoded query method which has been used in some Quantum SMC protocols is suitable to solve the decision problem, but it needs to apply high dimensional Oracle operators. In this paper, we use the principle of phase-encoded query to solve an important PGI problem, namely privacy-preserving two-party circle intersection. We study the implementation of Oracle operator in detail, and achieve polynomial computational complexity by decompsing it into quantum arithmetic operations. Performance analysis shows that our protocol is correct and efficient, and can protect the privacy of all participants against internal and external attacks.
引用
收藏
相关论文
共 50 条
  • [11] Consensus Control Based on Privacy-Preserving Two-Party Relationship Test Protocol
    Wang, Hanzhou
    Li, Dongyu
    Guan, Zhenyu
    Liu, Yizhong
    Liu, Jianwei
    IEEE CONTROL SYSTEMS LETTERS, 2023, 7 : 2185 - 2190
  • [12] A Novel Privacy-Preserving Two-Party Vector Dominance Statistic Protocol
    Liu, Jie
    Long, Xiaoli
    Chen, Changpin
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 195 - 196
  • [13] TPOT: a Two-party Privacy-preserving Ownership Transfer Protocol for RFID Tags
    Yin, Xi
    An, Zhulin
    Xu, Yongjun
    Long, Hua
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [14] A Secure Two-Party Bartering Protocol Using Privacy-Preserving Interval Operations
    Foerg, Fabian
    Mayer, Daniel
    Wetzel, Susanne
    Wueller, Stefan
    Meyer, Ulrike
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 57 - 66
  • [15] Secure and Efficient Two-Party Quantum Scalar Product Protocol With Application to Privacy-Preserving Matrix Multiplication
    Liu, Wen-Jie
    Li, Zi-Xian
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 70 (11) : 4456 - 4469
  • [16] Two-party privacy-preserving agglomerative document clustering
    Su, Chunhua
    Zhou, Jianying
    Bao, Feng
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 193 - +
  • [17] Quantum Private Set Intersection Cardinality Protocol With Application to Privacy-Preserving Condition Query
    Shi, Run-Hua
    Li, Yi-Fei
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022, 69 (06) : 2399 - 2411
  • [18] Privacy-Preserving Range Query for High-dimensional Uncertain Data in A Two-party Scenario
    Su Shenghao
    Guo Cheng
    Tian Pengxu
    Tang Xinyu
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [20] A two-party privacy preserving set intersection protocol against malicious users in cloud computing
    Cao, Xuefei
    Li, Hui.
    Dang, Lanjun
    Lin, Yin
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 41 - 45