Secure and Efficient Two-Party Quantum Scalar Product Protocol With Application to Privacy-Preserving Matrix Multiplication

被引:7
|
作者
Liu, Wen-Jie [1 ]
Li, Zi-Xian [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Software, Nanjing 210044, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum computation; quantum communication; secure multi-party computation; scalar product; matrix multiplication; COMPUTATION;
D O I
10.1109/TCSI.2023.3295891
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secure two-party scalar product (S2SP) is a promising research area within secure multiparty computation (SMC), which can solve a range of SMC problems, such as intrusion detection, data analysis, and geometric computations. However, existing quantum S2SP protocols are not efficient enough, and the complexity is usually close to exponential level. In this paper, a novel secure two-party quantum scalar product (S2QSP) protocol based on Fourier entangled states is proposed to achieve higher efficiency. Firstly, the definition of unconditional security under malicious models is given. And then, an honesty verification method called Entanglement Bondage is proposed, which is used in conjunction with the modular summation gate to resist malicious attacks. The property of Fourierentangled states is used to calculate the scalar product with polynomial complexity. The unconditional security of our protocol is proved, which guarantees the privacy of all parties. In addition, we design a privacy-preserving quantum matrix multiplication protocol based on S2QSP protocol. By transforming matrix multiplication into a series of scalar product processes, the product of two private matrices is calculated without revealing any privacy. Finally, we show our protocol's feasibility in IBM Qiskit simulator.
引用
收藏
页码:4456 / 4469
页数:14
相关论文
共 50 条
  • [31] Privacy-Preserving Two-Party Collaborative Filtering on Overlapped Ratings
    Memis, Burak
    Yakut, Ibrahim
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (08): : 2948 - 2966
  • [32] Private distributed scalar product protocol with application to privacy-preserving computation of trust
    Yao, Danfeng
    Tamassia, Roberto
    Proctor, Seth
    TRUST MANAGEMENT, 2007, 238 : 1 - +
  • [33] Scalar-product Based Secure Two-party Computation
    Shen, Chih-Hao
    Zhan, Justin
    Hsu, Tsan-Sheng
    Liau, Churn-Jung
    Wang, Da-Wei
    2008 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2008, : 556 - +
  • [34] Privacy Preserving n-Party Scalar Product Protocol
    van Daalen, Florian
    Ippel, Lianne
    Dekker, Andre
    Bermejo, Inigo
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (04) : 1060 - 1066
  • [35] Research of secure two-party quantum comparing protocol
    Liu Wen
    Wang Yong-Bin
    ACTA PHYSICA SINICA, 2011, 60 (03)
  • [36] VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication
    Hui, Liang
    Dong, Xiaolei
    Shen, Jiachen
    Cao, Zhenfu
    Chen, Hongyuan
    Liang, Yunong
    2018 THIRD INTERNATIONAL CONFERENCE ON SECURITY OF SMART CITIES, INDUSTRIAL CONTROL SYSTEM AND COMMUNICATIONS (SSIC), 2018,
  • [37] A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics
    Mehnaz, Shagufta
    Bellala, Gowtham
    Bertino, Elisa
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 219 - 230
  • [38] An efficient protocol for fair secure two-party computation
    Kiraz, Mehmet S.
    Schoenmakers, Berry
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
  • [39] Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity
    Beck, Martin
    Kerschbaum, Florian
    2013 IEEE INTERNATIONAL CONGRESS ON BIG DATA, 2013, : 31 - 37
  • [40] More Practical Privacy-Preserving Machine Learning as A Service via Efficient Secure Matrix Multiplication
    Lu, Wen-jie
    Sakuma, Jun
    WAHC'18: PROCEEDINGS OF THE 6TH WORKSHOP ON ENCRYPTED COMPUTING & APPLIED HOMOMORPHIC CRYPTOGRAPHY, 2018, : 25 - 36