Secure and Efficient Two-Party Quantum Scalar Product Protocol With Application to Privacy-Preserving Matrix Multiplication

被引:7
|
作者
Liu, Wen-Jie [1 ]
Li, Zi-Xian [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Software, Nanjing 210044, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum computation; quantum communication; secure multi-party computation; scalar product; matrix multiplication; COMPUTATION;
D O I
10.1109/TCSI.2023.3295891
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secure two-party scalar product (S2SP) is a promising research area within secure multiparty computation (SMC), which can solve a range of SMC problems, such as intrusion detection, data analysis, and geometric computations. However, existing quantum S2SP protocols are not efficient enough, and the complexity is usually close to exponential level. In this paper, a novel secure two-party quantum scalar product (S2QSP) protocol based on Fourier entangled states is proposed to achieve higher efficiency. Firstly, the definition of unconditional security under malicious models is given. And then, an honesty verification method called Entanglement Bondage is proposed, which is used in conjunction with the modular summation gate to resist malicious attacks. The property of Fourierentangled states is used to calculate the scalar product with polynomial complexity. The unconditional security of our protocol is proved, which guarantees the privacy of all parties. In addition, we design a privacy-preserving quantum matrix multiplication protocol based on S2QSP protocol. By transforming matrix multiplication into a series of scalar product processes, the product of two private matrices is calculated without revealing any privacy. Finally, we show our protocol's feasibility in IBM Qiskit simulator.
引用
收藏
页码:4456 / 4469
页数:14
相关论文
共 50 条
  • [21] Quantum Privacy-preserving Two-party Circle Intersection Protocol Based on Phase-encoded Query
    Zi-Xian Li
    Qi Yang
    Bao Feng
    Wen-Jie Liu
    International Journal of Theoretical Physics, 62
  • [22] Two-party privacy-preserving agglomerative document clustering
    Su, Chunhua
    Zhou, Jianying
    Bao, Feng
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 193 - +
  • [23] Secure Two-Party Distance Computation Protocol Based on Privacy Homomorphism and Scalar Product in Wireless Sensor Networks
    Huang, Haiping
    Gong, Tianhe
    Chen, Ping
    Malekian, Reza
    Chen, Tao
    TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (04) : 385 - 396
  • [24] Two-Party Privacy-Preserving Set Intersection with FHE
    Cai, Yunlu
    Tang, Chunming
    Xu, Qiuxia
    ENTROPY, 2020, 22 (12) : 1 - 15
  • [25] Secure Two-Party Distance Computation Protocol Based on Privacy Homomorphism and Scalar Product in Wireless Sensor Networks
    Haiping Huang
    Tianhe Gong
    Ping Chen
    Reza Malekian
    Tao Chen
    TsinghuaScienceandTechnology, 2016, 21 (04) : 385 - 396
  • [27] Experimental analysis of a privacy-preserving scalar product protocol
    Yang, ZQ
    Wright, RN
    Subramaniam, H
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (01): : 47 - 52
  • [28] A Privacy-Preserving Ranking Protocol Based on Secure Multiparty Multiplication
    Zhong, Hong
    Qian, Xiaoqiang
    Zhang, Dalei
    Luo, Yonglong
    INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING BIOMEDICAL ENGINEERING, AND INFORMATICS (SPBEI 2013), 2014, : 1040 - 1050
  • [29] ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols
    Niksefat, Salman
    Sadeghiyan, Babak
    Mohassel, Payman
    Sadeghian, Saeed
    COMPUTER JOURNAL, 2014, 57 (04): : 494 - 509
  • [30] Privacy-preserving two-party computation of line segment intersection
    Sheidani, Sorour
    Zarei, Alireza
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (05) : 3415 - 3432