Secure and Efficient Two-Party Quantum Scalar Product Protocol With Application to Privacy-Preserving Matrix Multiplication

被引:7
|
作者
Liu, Wen-Jie [1 ]
Li, Zi-Xian [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Software, Nanjing 210044, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum computation; quantum communication; secure multi-party computation; scalar product; matrix multiplication; COMPUTATION;
D O I
10.1109/TCSI.2023.3295891
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secure two-party scalar product (S2SP) is a promising research area within secure multiparty computation (SMC), which can solve a range of SMC problems, such as intrusion detection, data analysis, and geometric computations. However, existing quantum S2SP protocols are not efficient enough, and the complexity is usually close to exponential level. In this paper, a novel secure two-party quantum scalar product (S2QSP) protocol based on Fourier entangled states is proposed to achieve higher efficiency. Firstly, the definition of unconditional security under malicious models is given. And then, an honesty verification method called Entanglement Bondage is proposed, which is used in conjunction with the modular summation gate to resist malicious attacks. The property of Fourierentangled states is used to calculate the scalar product with polynomial complexity. The unconditional security of our protocol is proved, which guarantees the privacy of all parties. In addition, we design a privacy-preserving quantum matrix multiplication protocol based on S2QSP protocol. By transforming matrix multiplication into a series of scalar product processes, the product of two private matrices is calculated without revealing any privacy. Finally, we show our protocol's feasibility in IBM Qiskit simulator.
引用
收藏
页码:4456 / 4469
页数:14
相关论文
共 50 条
  • [1] Strong Privacy-preserving Two-party Scalar Product Quantum Protocol
    Run-hua Shi
    Mingwu Zhang
    International Journal of Theoretical Physics, 2019, 58 : 4249 - 4257
  • [2] Strong Privacy-preserving Two-party Scalar Product Quantum Protocol
    Shi, Run-hua
    Zhang, Mingwu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (12) : 4249 - 4257
  • [3] A protocol for the secure two-party quantum scalar product
    He, Li-Bao
    Huang, Liu-Sheng
    Yang, Wei
    Xu, Rui
    PHYSICS LETTERS A, 2012, 376 (16) : 1323 - 1327
  • [4] Application of Secure Two-Party Computation in a Privacy-Preserving Android App
    De Vincenzi, Marco
    Martinelli, Fabio
    Matteucci, Ilaria
    Sebastio, Stefano
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [5] A Secure Two-Party Bartering Protocol Using Privacy-Preserving Interval Operations
    Foerg, Fabian
    Mayer, Daniel
    Wetzel, Susanne
    Wueller, Stefan
    Meyer, Ulrike
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 57 - 66
  • [6] Efficient scalar product protocol and its privacy-preserving application
    Zhu, Youwen
    Takagi, Tsuyoshi
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (01) : 1 - 19
  • [7] Privacy-Preserving Quantum Two-Party Geometric Intersection
    Liu, Wenjie
    Xu, Yong
    Yang, James C. N.
    Yu, Wenbin
    Chi, Lianhua
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (03): : 1237 - 1250
  • [8] A new efficient privacy-preserving scalar product protocol
    Amirbekyan, Artak
    Estivill-Castro, Vladimir
    Conferences in Research and Practice in Information Technology Series, 2007, 70 : 209 - 214
  • [9] Privacy-preserving Two-party Rational Set Intersection Protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2012, 36 (03): : 277 - 286
  • [10] Privacy-preserving two-party rational set intersection protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    Informatica (Slovenia), 2012, 36 (03): : 277 - 286