Quantum Privacy-Preserving Price E-Negotiation
- URL: http://arxiv.org/abs/2309.13668v1
- Date: Sun, 24 Sep 2023 15:31:55 GMT
- Title: Quantum Privacy-Preserving Price E-Negotiation
- Authors: Wen-Jie Liu, Chun-Tang Li, Yu Zheng, Yong Xu, Yin-Song Xu
- Abstract summary: A novel and efficient quantum solution to the 3PEN problem is proposed.
We show that our solution not only guarantees the correctness and the privacy of 3PEN, but also has lower communication complexity than those classical ones.
- Score: 17.29641055860513
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Privacy-preserving price e-negotiation (3PEN) is an important topic of secure
multi-party computation (SMC) in the electronic commerce field, and the key
point of its security is to guarantee the privacy of seller's and buyer's
prices. In this study, a novel and efficient quantum solution to the 3PEN
problem is proposed, where the oracle operation and the qubit comparator are
utilized to obtain the comparative results of buyer's and seller's prices, and
then quantum counting is executed to summarize the total number of products
which meets the trading conditions. Analysis shows that our solution not only
guarantees the correctness and the privacy of 3PEN, but also has lower
communication complexity than those classical ones.
Related papers
- Quantum Scheme for Private Set Intersection and Union Cardinality based on Quantum Homomorphic Encryption [8.715631190576067]
A novel quantum private set intersection and union cardinality protocol is proposed, accompanied by the corresponding quantum circuits.
Based on quantum homomorphic encryption, the protocol allows the intersection and union cardinality of users' private sets to be computed on quantum-encrypted data.
arXiv Detail & Related papers (2024-12-02T01:31:06Z) - Convergent Differential Privacy Analysis for General Federated Learning: the $f$-DP Perspective [57.35402286842029]
Federated learning (FL) is an efficient collaborative training paradigm with a focus on local privacy.
differential privacy (DP) is a classical approach to capture and ensure the reliability of private protections.
arXiv Detail & Related papers (2024-08-28T08:22:21Z) - A Primal-Dual Online Learning Approach for Dynamic Pricing of Sequentially Displayed Complementary Items under Sale Constraints [54.46126953873298]
We address the problem of dynamically pricing complementary items that are sequentially displayed to customers.
Coherent pricing policies for complementary items are essential because optimizing the pricing of each item individually is ineffective.
We empirically evaluate our approach using synthetic settings randomly generated from real-world data, and compare its performance in terms of constraints violation and regret.
arXiv Detail & Related papers (2024-07-08T09:55:31Z) - Privacy-Preserving Billing for Local Energy Markets [1.1823918493146686]
We propose a privacy-preserving billing protocol for local energy markets (PBP-LEM) that takes into account market participants' energy volume deviations from their bids.
PBP-LEM enables a group of market entities to jointly compute participants' bills in a decentralized and privacy-preserving manner without sacrificing correctness.
arXiv Detail & Related papers (2024-04-24T14:12:56Z) - Private Optimal Inventory Policy Learning for Feature-based Newsvendor with Unknown Demand [13.594765018457904]
This paper introduces a novel approach to estimate a privacy-preserving optimal inventory policy within the f-differential privacy framework.
We develop a clipped noisy gradient descent algorithm based on convolution smoothing for optimal inventory estimation.
Our numerical experiments demonstrate that the proposed new method can achieve desirable privacy protection with a marginal increase in cost.
arXiv Detail & Related papers (2024-04-23T19:15:43Z) - Cost of quantum secret key [4.3012765978447565]
We study the properties of a quantum state and device through the lens of a quantity that we call the key of formation.
The main result of our paper is that the regularized key of formation is an upper bound on the key cost of a quantum state.
We show that the key cost is bounded from below by the regularized relative entropy of entanglement.
arXiv Detail & Related papers (2024-02-26T20:22:06Z) - TernaryVote: Differentially Private, Communication Efficient, and
Byzantine Resilient Distributed Optimization on Heterogeneous Data [50.797729676285876]
We propose TernaryVote, which combines a ternary compressor and the majority vote mechanism to realize differential privacy, gradient compression, and Byzantine resilience simultaneously.
We theoretically quantify the privacy guarantee through the lens of the emerging f-differential privacy (DP) and the Byzantine resilience of the proposed algorithm.
arXiv Detail & Related papers (2024-02-16T16:41:14Z) - Quantum Communication Complexity of Classical Auctions [3.78737122317863]
We ask whether using quantum communication can be more efficient than classical communication.
We first study the expected communication complexity of approximately optimal auctions.
We then study the worst-case communication complexity of exactly optimal auctions in an extremely simple setting.
arXiv Detail & Related papers (2023-11-21T08:56:23Z) - A Randomized Approach for Tight Privacy Accounting [63.67296945525791]
We propose a new differential privacy paradigm called estimate-verify-release (EVR)
EVR paradigm first estimates the privacy parameter of a mechanism, then verifies whether it meets this guarantee, and finally releases the query output.
Our empirical evaluation shows the newly proposed EVR paradigm improves the utility-privacy tradeoff for privacy-preserving machine learning.
arXiv Detail & Related papers (2023-04-17T00:38:01Z) - Breaking the Communication-Privacy-Accuracy Tradeoff with
$f$-Differential Privacy [51.11280118806893]
We consider a federated data analytics problem in which a server coordinates the collaborative data analysis of multiple users with privacy concerns and limited communication capability.
We study the local differential privacy guarantees of discrete-valued mechanisms with finite output space through the lens of $f$-differential privacy (DP)
More specifically, we advance the existing literature by deriving tight $f$-DP guarantees for a variety of discrete-valued mechanisms.
arXiv Detail & Related papers (2023-02-19T16:58:53Z) - Privacy-Preserving Joint Edge Association and Power Optimization for the
Internet of Vehicles via Federated Multi-Agent Reinforcement Learning [74.53077322713548]
We investigate the privacy-preserving joint edge association and power allocation problem.
The proposed solution strikes a compelling trade-off, while preserving a higher privacy level than the state-of-the-art solutions.
arXiv Detail & Related papers (2023-01-26T10:09:23Z) - Privacy-Friendly Peer-to-Peer Energy Trading: A Game Theoretical
Approach [0.0]
We propose a decentralized, privacy-friendly energy trading platform (PFET) based on game theoretical approach - specifically Stackelberg competition.
It uses homomorphic encryption cryptosystem to encrypt sensitive information of buyers and sellers such as sellers$'$ prices and buyers$'$ demands.
arXiv Detail & Related papers (2022-01-05T20:41:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.