Quantum Privacy-preserving Two-party Circle Intersection Protocol Based on Phase-encoded Query

被引:0
|
作者
Zi-Xian Li
Qi Yang
Bao Feng
Wen-Jie Liu
机构
[1] Nanjing University of Information Science and Technology,School of Software
[2] NARI Information & Communication Technology Co.,Engineering Research Center of Digital Forensics
[3] Ltd.,undefined
[4] Ministry of Education,undefined
来源
International Journal of Theoretical Physics | / 62卷
关键词
Quantum computing; Quantum communication; Quantum security multi-party computing; Privacy-preserving circle intersection; Phase-encoded query; Oracle operator;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy-preserving geometric intersection (PGI) is an important issue in Secure multiparty computation (SMC). The existing quantum PGI protocols are mainly based on grid coding, which requires a lot of computational complexity. The phase-encoded query method which has been used in some Quantum SMC protocols is suitable to solve the decision problem, but it needs to apply high dimensional Oracle operators. In this paper, we use the principle of phase-encoded query to solve an important PGI problem, namely privacy-preserving two-party circle intersection. We study the implementation of Oracle operator in detail, and achieve polynomial computational complexity by decompsing it into quantum arithmetic operations. Performance analysis shows that our protocol is correct and efficient, and can protect the privacy of all participants against internal and external attacks.
引用
收藏
相关论文
共 50 条
  • [31] Privacy-Preserving Medical Data Sharing Scheme Based on Two-Party Cloud-Assisted PSI
    Lai, Chengzhe
    Zhang, Hanyue
    Lu, Rongxing
    Zheng, Dong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 15855 - 15868
  • [32] Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing
    Kim, Hyeong-Jin
    Lee, Hyunjo
    Kim, Yong-Ki
    Chang, Jae-Woo
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (07): : 9245 - 9284
  • [33] Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing
    Hyeong-Jin Kim
    Hyunjo Lee
    Yong-Ki Kim
    Jae-Woo Chang
    The Journal of Supercomputing, 2022, 78 : 9245 - 9284
  • [34] Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments
    Ye, Chong-Qiang
    Li, Jian
    Chen, Xiao-Yu
    SENSORS, 2024, 24 (22)
  • [35] Privacy-Preserving Two-Party Distributed Association Rules Mining on Horizontally Partitioned Data
    Zhang, Feng
    Rong, Chunming
    Zhao, Gansen
    Wu, Jinxia
    Wu, Xiangning
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 633 - 640
  • [36] Privacy-preserving skyline query protocol in two-tiered sensor networks
    Zuo, Kai-Zhong
    Hu, Peng
    Wang, Tao-Chun
    Luo, Yong-Long
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 : 113 - 121
  • [37] An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast
    Costantino, Gianpiero
    Martinelli, Fabio
    Santi, Paolo
    Amoruso, Dario
    2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012, 2012, : 9 - 16
  • [38] ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols
    Niksefat, Salman
    Sadeghiyan, Babak
    Mohassel, Payman
    Sadeghian, Saeed
    COMPUTER JOURNAL, 2014, 57 (04): : 494 - 509
  • [39] Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks
    Liu, Zhusen
    Wang, Luyao
    Bao, Haiyong
    Cao, Zhenfu
    Zhou, Lu
    Liu, Zhe
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (05) : 8007 - 8018
  • [40] A Cryptographic Solution to Privacy-Preserving Two-Party Sign Test Computation on Vertically Partitioned Data
    Liu, Meng-chang
    Zhang, Ning
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 1249 - +