A privacy preserving quantum aggregating technique with simulation

被引:2
|
作者
Sutradhar, Kartick [1 ]
Venkatesh, Ranjitha [2 ]
机构
[1] Indian Inst Informat Technol Sri City, Dept Comp Sci & Engn, Sri City, India
[2] GITAM Univ, Dept Comp Sci & Engn, Bengaluru, India
关键词
quantum cryptography; information security; multiparty quantum computation; aggregation; SUMMATION; COMPUTATION; PROTOCOL;
D O I
10.1088/1402-4896/ad368e
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum aggregation is a basic operation of secure multiparty quantum computation. All the existing techniques are based on the (n,n) threshold, where n is the total number of players. If any of them is corrupted then these techniques cannot execute correctly. However, the proposed technique is based on the (t,n) threshold. If the players are honest then this technique can perform the aggregation. This technique is based on the monotone span program, access structure, linear secret sharing, control-NOT gate, quantum Fourier transform, blind matrix, and Pauli operator. The proposed technique can aggregate the secrets securely and efficiently. We also simulate the proposed technique using IBM quantum computer to verify the correctness and feasibility.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Quantum Split Learning for Privacy-Preserving Information Management
    Park, Soohyun
    Baek, Hankyul
    Kim, Joongheon
    PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 4239 - 4243
  • [32] Privacy-preserving computation in the post-quantum era
    Yu, Yu
    Xie, Xiang
    NATIONAL SCIENCE REVIEW, 2021, 8 (09)
  • [33] Quantum Privacy-Preserving Price E-Negotiation
    Wen-Jie Liu
    Chun-Tang Li
    Yu Zheng
    Yong Xu
    Yin-Song Xu
    International Journal of Theoretical Physics, 2019, 58 : 3259 - 3270
  • [34] Privacy Exposure Measure: A Privacy-Preserving Technique for Health-Related Web Search
    Khan, Rafiullah
    Islam, Muhammad Arshad
    Ullah, Mohib
    Aleem, Muhammad
    Iqbal, Muhammad Azhar
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2019, 9 (06) : 1196 - 1204
  • [35] Privacy Preserving Using Video Encryption Technique-the Hybrid Approach
    Chaudhary, Karishma
    Pandi , Gayatri
    COMPUTING AND NETWORK SUSTAINABILITY, 2017, 12 : 29 - 37
  • [36] A Novel Privacy Preserving Search Technique for Stego Data in Untrusted Cloud
    Rahman, Mohammad Saidur
    Khalil, Ibrahim
    Yi, Xun
    Gu, Tao
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 4246 - 4255
  • [37] Token Based Privacy Preserving and Authentication Technique for Wireless Mobile Networks
    Fatahpour, Saman
    2018 4TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2018, : 155 - 161
  • [38] Privacy Preserving Technique in Data Mining by Using Chinease Remainder Theorem
    Rajesh, P.
    Narasimha, G.
    Rupa, Ch.
    ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2012, 305 : 434 - +
  • [39] Privacy Preserving Data Mining Technique to Secure Distributed Client Data
    Dani, Virendra
    Kokate, Priyanka
    Kushwah, Surbhi
    Waghela, Swapnil
    HYBRID INTELLIGENT SYSTEMS, HIS 2021, 2022, 420 : 565 - 574
  • [40] Hybrid Cart-Anfis Approach for Privacy Preserving Anonymization Technique
    Desai, Niyanta
    Kharwar, Ankit
    Naik, Chandni
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,