4.7 Article

Secure and Efficient Two-Party Quantum Scalar Product Protocol With Application to Privacy-Preserving Matrix Multiplication

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Electrical & Electronic

Quantum Private Set Intersection Cardinality Protocol With Application to Privacy-Preserving Condition Query

Run-Hua Shi et al.

Summary: This paper introduces a novel quantum PSI-CA protocol that ensures nearly perfect security and linear communication complexity, while also addressing the issue of privacy-preserving condition queries.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2022)

Article Engineering, Electrical & Electronic

Quantum Protocol for Secure Multiparty Logical AND With Application to Multiparty Private Set Intersection Cardinality

Run-Hua Shi et al.

Summary: In this paper, the importance of logical AND in scientific computing is discussed. A new privacy-preserving problem is defined and a novel quantum protocol is proposed to address this problem. The proposed protocol ensures information-theoretical security and reduces the communicational complexity. Additionally, an application of the protocol is investigated and a feasible quantum protocol for private set intersection cardinality is designed based on the improved quantum protocol.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2022)

Article Quantum Science & Technology

Secure two-party integer comparison protocol without any third party

Run-hua Shi et al.

Summary: This paper introduces a novel and efficient quantum protocol for secure two-party integer comparison without any third party involvement. By adopting the concept of quantum private query, the protocol achieves a significant reduction in communication complexity, with only O(1) communication cost required.

QUANTUM INFORMATION PROCESSING (2021)

Article Quantum Science & Technology

A cost-effective quantum protocol for secure multi-party multiplication

Kartick Sutradhar et al.

Summary: This paper proposes a secure multi-party quantum multiplication protocol based on the (t, n) threshold approach, where t out of n participants can efficiently execute it. The protocol is more cost-effective and secure compared to existing protocols, as secrets are shared among players using secret sharing.

QUANTUM INFORMATION PROCESSING (2021)

Article Quantum Science & Technology

Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform

Xin Yi et al.

Summary: The proposed protocol utilizes blind matrix method and quantum Fourier transform to achieve secure multi-party quantum summation and sorting, showing advantages of high security and efficiency.

QUANTUM INFORMATION PROCESSING (2021)

Article Multidisciplinary Sciences

Hybrid Quantum Protocols for Secure Multiparty Summation and Multiplication

Kartick Sutradhar et al.

Scientific Reports (2020)

Article Engineering, Electrical & Electronic

A Generalized Quantum Protocol for Secure Multiparty Summation

Kartick Sutradhar et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS (2020)

Article Engineering, Electrical & Electronic

On Improved DV-Hop Localization Algorithm for Accurate Node Localization in Wireless Sensor Networks

Shen Shikai et al.

CHINESE JOURNAL OF ELECTRONICS (2019)

Article Quantum Science & Technology

Quantum protocols for secure multi-party summation

ZhaoXu Ji et al.

QUANTUM INFORMATION PROCESSING (2019)

Article Physics, Multidisciplinary

A Novel and Efficient Quantum Private Comparison Scheme

Li Li et al.

JOURNAL OF THE KOREAN PHYSICAL SOCIETY (2019)

Article Physics, Multidisciplinary

Strong Privacy-preserving Two-party Scalar Product Quantum Protocol

Run-hua Shi et al.

INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS (2019)

Proceedings Paper Computer Science, Information Systems

Improved Multiplication Triple Generation over Rings via RLWE-Based AHE

Deevashwer Rathee et al.

CRYPTOLOGY AND NETWORK SECURITY (CANS 2019) (2019)

Article Computer Science, Information Systems

Privacy-Preserving Quantum Two-Party Geometric Intersection

Wenjie Liu et al.

CMC-COMPUTERS MATERIALS & CONTINUA (2019)

Article Computer Science, Information Systems

Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications

Hui Zhu et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Quantum Science & Technology

Secure multi-party quantum summation based on quantum Fourier transform

Hui-Yi Yang et al.

QUANTUM INFORMATION PROCESSING (2018)

Article Computer Science, Information Systems

Secure Two-Party Distance Computation Protocol Based on Privacy Homomorphism and Scalar Product in Wireless Sensor Networks

Haiping Huang et al.

TSINGHUA SCIENCE AND TECHNOLOGY (2016)

Article Multidisciplinary Sciences

Secure Multiparty Quantum Computation for Summation and Multiplication

Run-hua Shi et al.

SCIENTIFIC REPORTS (2016)

Proceedings Paper Computer Science, Information Systems

MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer

Marcel Keller et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Quantum Science & Technology

Secret sharing based on quantum Fourier transform

Wei Yang et al.

QUANTUM INFORMATION PROCESSING (2013)

Article Physics, Multidisciplinary

A protocol for the secure two-party quantum scalar product

Li-Bao He et al.

PHYSICS LETTERS A (2012)

Article Optics

Entanglement swapping of generalized cat states and secret sharing

V Karimipour et al.

PHYSICAL REVIEW A (2002)