Secure and Efficient Two-Party Quantum Scalar Product Protocol With Application to Privacy-Preserving Matrix Multiplication

被引:7
|
作者
Liu, Wen-Jie [1 ]
Li, Zi-Xian [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Software, Nanjing 210044, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum computation; quantum communication; secure multi-party computation; scalar product; matrix multiplication; COMPUTATION;
D O I
10.1109/TCSI.2023.3295891
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secure two-party scalar product (S2SP) is a promising research area within secure multiparty computation (SMC), which can solve a range of SMC problems, such as intrusion detection, data analysis, and geometric computations. However, existing quantum S2SP protocols are not efficient enough, and the complexity is usually close to exponential level. In this paper, a novel secure two-party quantum scalar product (S2QSP) protocol based on Fourier entangled states is proposed to achieve higher efficiency. Firstly, the definition of unconditional security under malicious models is given. And then, an honesty verification method called Entanglement Bondage is proposed, which is used in conjunction with the modular summation gate to resist malicious attacks. The property of Fourierentangled states is used to calculate the scalar product with polynomial complexity. The unconditional security of our protocol is proved, which guarantees the privacy of all parties. In addition, we design a privacy-preserving quantum matrix multiplication protocol based on S2QSP protocol. By transforming matrix multiplication into a series of scalar product processes, the product of two private matrices is calculated without revealing any privacy. Finally, we show our protocol's feasibility in IBM Qiskit simulator.
引用
收藏
页码:4456 / 4469
页数:14
相关论文
共 50 条
  • [41] Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks
    Liu, Zhusen
    Wang, Luyao
    Bao, Haiyong
    Cao, Zhenfu
    Zhou, Lu
    Liu, Zhe
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (05) : 8007 - 8018
  • [42] Coded Computing for Resilient, Secure, and Privacy-Preserving Distributed Matrix Multiplication
    Yu, Qian
    Avestimehr, A. Salman
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (01) : 59 - 72
  • [43] Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems
    Rahulamathavan, Yogachandran
    Dogan, Safak
    Shi, Xiyu
    Lu, Rongxing
    Rajarajan, Muttukrishnan
    Kondoz, Ahmet
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03) : 1417 - 1427
  • [44] Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing
    Jiang, Zoe L.
    Guo, Ning
    Jin, Yabin
    Lv, Jiazhuo
    Wu, Yulin
    Liu, Zechao
    Fang, Junbin
    Yiu, S. M.
    Wang, Xuan
    INFORMATION SCIENCES, 2020, 518 : 168 - 180
  • [45] IDPriU: A two-party ID-private data union protocol for privacy-preserving machine learning
    Yan, Jianping
    Wei, Lifei
    Qian, Xiansong
    Zhang, Lei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 88
  • [46] Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communication
    Xiong, Hu
    Beznosov, Konstantin
    Qin, Zhiguang
    Ripeanu, Matei
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [47] Privacy preserving sequential pattern mining based on secure two-party computation
    Ouyang, Wei-Min
    Huang, Qin-Hua
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1227 - +
  • [48] An Efficient Secure Two-Party Approximate Pattern Matching Protocol
    Xu L.
    Wei X.
    Cai G.
    Wang H.
    Zheng Z.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (08): : 1819 - 1830
  • [49] Privacy preserving association rules mining based on secure two-party computation
    Ouyang, Weimin
    Huang, Qinhua
    INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 969 - 975
  • [50] Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data
    Chen, Ling
    Yu, Ting
    Chirkova, Rada
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016, 2016, 9895 : 187 - 203