Big data quantum private comparison with the intelligent third party

被引:0
|
作者
Xiaoqing Tan
Xiaoqian Zhang
Jin Li
机构
[1] Jinan University,Department of Mathematics
[2] Guangzhou University,School of Computer Science and Educational Software
关键词
Big data; Quantum private comparison; Entanglement swapping; Bell measurement; Intelligent robot;
D O I
暂无
中图分类号
学科分类号
摘要
Big data is often thought as a large number of virous unstructured forms of data. Expensive intelligent computing engineering techniques of critical systems that are not cost-effective for non-critical systems may sometimes be used as a intelligent protection system. The private comparison is to compare the equality of the secret information of two parties privately, without disclosing any actual information. These secret information of two parties are big data that need to be analysed for comparison privately in critical system. Quantum private comparison is more safer than classic private comparison based on the theory of quantum mechanics. In this paper, a big data quantum private comparison scheme with intelligent third party is proposed. Two distrustful parties Alice and Bob compare the equivalence of big data information by quantum computing with the help of the intelligent robot belonged to a semi-honest third party Calvin. The participants including the intelligent robot are just required having the ability to prepare photons and perform measurement, which makes the presented protocol be more feasible in technique. The transmitted particles is in the anticlockwise order with a circle that make the transferred private information to be more safe. The technique of entanglement swapping makes the comparison be achieved with the help of the intelligent robot. Due to the photon transmission is a one-way distribution, the Trojan horse attack can be automatically avoided. It is secure against the various well-known attacks.
引用
收藏
页码:797 / 806
页数:9
相关论文
共 50 条
  • [41] Control of Our Personal Data in the Big Data Era: The Case of Third Party Web Tracking
    Gonzalez Guerrero, Laura Daniela
    REVISTA ESTUDIOS SOCIO-JURIDICOS, 2019, 21 (01): : 209 - 244
  • [42] A Third Party vs. Big Money
    Reich, Robert B.
    NATION, 2016, 303 (5-6) : 15 - 15
  • [43] Multiparty quantum private comparison with almost dishonest third parties for strangers
    Hung, Shih-Min
    Hwang, Sheng-Liang
    Hwang, Tzonelih
    Kao, Shih-Hung
    QUANTUM INFORMATION PROCESSING, 2017, 16 (02)
  • [44] Multiparty quantum private comparison with almost dishonest third parties for strangers
    Shih-Min Hung
    Sheng-Liang Hwang
    Tzonelih Hwang
    Shih-Hung Kao
    Quantum Information Processing, 2017, 16
  • [45] Multi-party quantum private comparison of size relationship with two third parties based on d-dimensional Bell states
    Lian, Jiang-Yuan
    Li, Xia
    Ye, Tian-Yu
    PHYSICA SCRIPTA, 2023, 98 (03)
  • [46] Two-party Private Set Intersection with an Untrusted Third Party
    Le, Phi Hung
    Ranellucci, Samuel
    Gordon, S. Dov
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 2403 - 2420
  • [47] Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
    Hou, Min
    Wu, Yue
    APPLIED SCIENCES-BASEL, 2025, 15 (02):
  • [48] Efficient private bidding and auctions with an oblivious third party
    Cachin, C
    6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 1999, : 120 - 127
  • [49] OverDrive & Big (Private) Data
    Kelley, Michael
    LIBRARY JOURNAL, 2013, 138 (04) : 8 - 8
  • [50] Enabling Architecture for Third Party Applications in Intelligent Network
    Froloshki, Hristo
    Pencheva, Evelina
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2007, 7 (01) : 33 - 44