Big data quantum private comparison with the intelligent third party

被引:0
|
作者
Xiaoqing Tan
Xiaoqian Zhang
Jin Li
机构
[1] Jinan University,Department of Mathematics
[2] Guangzhou University,School of Computer Science and Educational Software
关键词
Big data; Quantum private comparison; Entanglement swapping; Bell measurement; Intelligent robot;
D O I
暂无
中图分类号
学科分类号
摘要
Big data is often thought as a large number of virous unstructured forms of data. Expensive intelligent computing engineering techniques of critical systems that are not cost-effective for non-critical systems may sometimes be used as a intelligent protection system. The private comparison is to compare the equality of the secret information of two parties privately, without disclosing any actual information. These secret information of two parties are big data that need to be analysed for comparison privately in critical system. Quantum private comparison is more safer than classic private comparison based on the theory of quantum mechanics. In this paper, a big data quantum private comparison scheme with intelligent third party is proposed. Two distrustful parties Alice and Bob compare the equivalence of big data information by quantum computing with the help of the intelligent robot belonged to a semi-honest third party Calvin. The participants including the intelligent robot are just required having the ability to prepare photons and perform measurement, which makes the presented protocol be more feasible in technique. The transmitted particles is in the anticlockwise order with a circle that make the transferred private information to be more safe. The technique of entanglement swapping makes the comparison be achieved with the help of the intelligent robot. Due to the photon transmission is a one-way distribution, the Trojan horse attack can be automatically avoided. It is secure against the various well-known attacks.
引用
收藏
页码:797 / 806
页数:9
相关论文
共 50 条
  • [1] Big data quantum private comparison with the intelligent third party
    Tan, Xiaoqing
    Zhang, Xiaoqian
    Li, Jin
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (06) : 797 - 806
  • [2] Quantum private comparison with a malicious third party
    Zhiwei Sun
    Jianping Yu
    Ping Wang
    Lingling Xu
    Chunhui Wu
    Quantum Information Processing, 2015, 14 : 2125 - 2133
  • [3] Quantum private comparison with a malicious third party
    Sun, Zhiwei
    Yu, Jianping
    Wang, Ping
    Xu, Lingling
    Wu, Chunhui
    QUANTUM INFORMATION PROCESSING, 2015, 14 (06) : 2125 - 2133
  • [4] Quantum Private Comparison Protocol without a Third Party
    WanQing Wu
    XiaoXue Ma
    International Journal of Theoretical Physics, 2020, 59 : 1854 - 1865
  • [5] Quantum private comparison protocol without a third party
    He, Guang Ping
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2017, 15 (02)
  • [6] Quantum Private Comparison Protocol without a Third Party
    Wu, WanQing
    Ma, XiaoXue
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (06) : 1854 - 1865
  • [7] Quantum private comparison of equality protocol without a third party
    Lin, Jason
    Yang, Chun-Wei
    Hwang, Tzonelih
    QUANTUM INFORMATION PROCESSING, 2014, 13 (02) : 239 - 247
  • [8] New Quantum Private Comparison Protocol Without a Third Party
    Wu, WanQing
    Zhou, GuoLong
    Zhao, YongXin
    Zhang, HuanGuo
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (06) : 1866 - 1875
  • [9] New Quantum Private Comparison Protocol Without a Third Party
    WanQing Wu
    GuoLong Zhou
    YongXin Zhao
    HuanGuo Zhang
    International Journal of Theoretical Physics, 2020, 59 : 1866 - 1875
  • [10] Quantum private comparison of equality protocol without a third party
    Jason Lin
    Chun-Wei Yang
    Tzonelih Hwang
    Quantum Information Processing, 2014, 13 : 239 - 247