A privacy-preserving publicly verifiable quantum random number generator

被引:1
|
作者
Islam, Tanvirul [1 ]
Banerji, Anindya [1 ]
Boon, Chin Jia [1 ]
Rui, Wang [1 ]
Reezwana, Ayesha [1 ]
Grieve, James A. [1 ,2 ]
Piera, Rodrigo [2 ]
Ling, Alexander [1 ,3 ]
机构
[1] Natl Univ Singapore, Ctr Quantum Technol, 3 Sci Dr 2, Singapore 117543, Singapore
[2] Technol Innovat Inst, Quantum Res Ctr, Abu Dhabi, U Arab Emirates
[3] Natl Univ Singapore, Dept Phys, Blk S12,2 Sci Dr 3, Singapore 117542, Singapore
来源
SCIENTIFIC REPORTS | 2024年 / 14卷 / 01期
基金
新加坡国家研究基金会;
关键词
D O I
10.1038/s41598-024-61552-y
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Verifying the quality of a random number generator involves performing computationally intensive statistical tests on large data sets commonly in the range of gigabytes. Limitations on computing power can restrict an end-user's ability to perform such verification. There are also random number-based applications where an honest user needs to publicly demonstrate that the random bits they are using pass the statistical tests without the bits being revealed. Here, we report the implementation of an entanglement-based protocol that allows a third party to publicly perform statistical tests without compromising the privacy of the random bits.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Privacy-Preserving Publicly Verifiable Databases
    Wang, Qiang
    Zhou, Fucai
    Zhou, Boyang
    Xu, Jian
    Chen, Chunyu
    Wang, Qi
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1639 - 1654
  • [2] Privacy-Preserving and Publicly Verifiable Matrix Multiplication
    Liu, Jing
    Zhang, Liang Feng
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2059 - 2071
  • [3] Publicly Verifiable Privacy-Preserving Group Decryption
    Qin, Bo
    Wu, Qianhong
    Susilo, Willy
    Mu, Yi
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 72 - +
  • [4] Privacy-preserving Revocation of Verifiable Credentials with Verifiable Random Functions
    Papathanasiou, Athanasia Maria
    Polyzos, George C.
    [J]. 38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 391 - 394
  • [5] Publicly verifiable privacy-preserving aggregation and its application in IoT
    Li, Tong
    Gao, Chongzhi
    Jiang, Liaoliang
    Pedrycz, Witold
    Shen, Jian
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 126 : 39 - 44
  • [6] Privacy-Preserving Verifiable CNNs
    Attrapadung, Nuttapong
    Hanaoaka, Goichiro
    Hiromasa, Ryo
    Koseki, Yoshihiro
    Matsuda, Takahiro
    Nishida, Yutaro
    Sakai, Yusuke
    Schuldt, Jacob C. N.
    Yasuda, Satoshi
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT II, 2024, 14584 : 373 - 402
  • [7] Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud
    Xie, Dawei
    Yang, Haining
    Qin, Jing
    Ma, Jixin
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2019, 11 (04) : 14 - 27
  • [8] Verifiable Privacy-Preserving Scheme Based on Vertical Federated Random Forest
    Hou, Jinpeng
    Su, Mang
    Fu, Anmin
    Yu, Yan
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22) : 22158 - 22172
  • [9] Privacy-Preserving and Verifiable Data Aggregation
    Tran, Hieu N.
    Deng, Robert H.
    Pang, HweeHwa
    [J]. PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN, 2016, 14 : 115 - 122
  • [10] A Note on Verifiable Privacy-Preserving Tries
    Kissel, Zachary A.
    Wang, Jie
    [J]. 2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 942 - 943