A privacy preserving quantum aggregating technique with simulation

被引:2
|
作者
Sutradhar, Kartick [1 ]
Venkatesh, Ranjitha [2 ]
机构
[1] Indian Inst Informat Technol Sri City, Dept Comp Sci & Engn, Sri City, India
[2] GITAM Univ, Dept Comp Sci & Engn, Bengaluru, India
关键词
quantum cryptography; information security; multiparty quantum computation; aggregation; SUMMATION; COMPUTATION; PROTOCOL;
D O I
10.1088/1402-4896/ad368e
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum aggregation is a basic operation of secure multiparty quantum computation. All the existing techniques are based on the (n,n) threshold, where n is the total number of players. If any of them is corrupted then these techniques cannot execute correctly. However, the proposed technique is based on the (t,n) threshold. If the players are honest then this technique can perform the aggregation. This technique is based on the monotone span program, access structure, linear secret sharing, control-NOT gate, quantum Fourier transform, blind matrix, and Pauli operator. The proposed technique can aggregate the secrets securely and efficiently. We also simulate the proposed technique using IBM quantum computer to verify the correctness and feasibility.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] A privacy preserving quantum aggregating technique
    Kartick Sutradhar
    Ranjitha Venkatesh
    Quantum Information Processing, 23
  • [2] A privacy preserving quantum aggregating technique
    Sutradhar, Kartick
    Venkatesh, Ranjitha
    QUANTUM INFORMATION PROCESSING, 2024, 23 (04)
  • [3] Shock: Aggregating Information While Preserving Privacy
    Eytan Adar
    Rajan Lukose
    Caesar Sengupta
    Josh Tyler
    Nathaniel Good
    Information Systems Frontiers, 2003, 5 : 15 - 28
  • [4] Shock: Aggregating information while preserving privacy
    Adar, E
    Lukose, R
    Sengupta, C
    Tyler, J
    Good, N
    INFORMATION SYSTEMS FRONTIERS, 2003, 5 (01) : 15 - 28
  • [5] A Privacy-Preserving Quantum Blockchain Technique for Electronic Medical Records
    Venkatesh R.
    Hanumantha B.S.
    IEEE Engineering Management Review, 2023, 51 (04): : 137 - 144
  • [6] Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing
    Debnath, Sumit Kumar
    Srivastava, Vikas
    Mohanty, Tapaswini
    Kundu, Nibedita
    Sakurai, Kouichi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [7] Privacy-preserving quantum machine learning using differential privacy
    Senekane, Makhamisa
    Mafu, Mhlambululi
    Taele, Benedict Molibeli
    2017 IEEE AFRICON, 2017, : 1432 - 1435
  • [8] NOVEL PRIVACY PRESERVING TECHNIQUE USING SOFT ENIGMA
    VidyaBanu, R.
    Nagaveni, N.
    Ananth, C. M.
    GRAPH ALGORITHMS, HIGH PERFORMANCE IMPLEMENTATIONS AND ITS APPLICATIONS (ICGHIA 2014), 2015, 47 : 486 - 490
  • [9] A novel technique of Privacy Preserving Association Rule Mining
    Mohammed, Rana Saad
    Hussien, Enas Mohammed
    Mutter, Jinan Redha
    2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA), 2016,
  • [10] Privacy Preserving Data Storage Technique in Cloud Computing
    Kartheeban, K.
    Murugan, A. Durai
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING (INCOS), 2017,