An Improved Quantum Private Set Intersection Protocol Based on Hadamard
Gates
- URL: http://arxiv.org/abs/2311.11951v1
- Date: Sun, 1 Oct 2023 16:21:44 GMT
- Title: An Improved Quantum Private Set Intersection Protocol Based on Hadamard
Gates
- Authors: Wenjie Liu, Wenbo Li, Haibin Wang
- Abstract summary: We find the participant can deduce the other party's private information, which violates the security requirement of private set computation.
In order to solve this problem, an improved private set intersection protocol based on Hadamard gate is proposed.
- Score: 22.0983572289132
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Recently, Liu and Yin (Int. J. Theor. Phys. 60, 2074-2083 (2021)) proposed a
two-party private set intersection protocol based on quantum Fourier transform.
We find the participant can deduce the other party's private information, which
violates the security requirement of private set computation. In order to solve
this problem, an improved private set intersection protocol based on Hadamard
gate is proposed. Firstly, the more feasible Hadamard gates are used to perform
on the original n qubits instead of the quantum Fourier transform, which may
reduce the difficulty of implementation. In addition, through the exclusive OR
calculation, the participant's private information is randomly chosen and
encoded on the additional n qubits, which prevents participants from obtaining
the result of the difference set S-diff , and then avoids the internal leakage
of private information. Finally, the correctness and security analysis are
conducted to show the proposed protocol can guarantee the correctness of
computation result as well as resist outside attacks and participant internal
attacks.
Related papers
- Optimal Private Discrete Distribution Estimation with One-bit Communication [63.413106413939836]
We consider a private discrete distribution estimation problem with one-bit communication constraint.
We characterize the first-orders of the worst-case trade-off under the one-bit communication constraint.
These results demonstrate the optimal dependence of the privacy-utility trade-off under the one-bit communication constraint.
arXiv Detail & Related papers (2023-10-17T05:21:19Z) - A unifying framework for differentially private quantum algorithms [0.0]
We propose a novel and general definition of neighbouring quantum states.
We demonstrate that this definition captures the underlying structure of quantum encodings.
We also investigate an alternative setting where we are provided with multiple copies of the input state.
arXiv Detail & Related papers (2023-07-10T17:44:03Z) - Secure multi-party quantum summation based on quantum Fourier transform [0.0]
The proposed protocol can resist both the outside attacks and the participant attacks.
One party cannot obtain other parties' private integer strings; and it is secure for the colluding attack performed by at most n-2 parties, where n is the number of parties.
arXiv Detail & Related papers (2022-05-12T14:36:18Z) - Optimal Algorithms for Mean Estimation under Local Differential Privacy [55.32262879188817]
We show that PrivUnit achieves the optimal variance among a large family of locally private randomizers.
We also develop a new variant of PrivUnit based on the Gaussian distribution which is more amenable to mathematical analysis and enjoys the same optimality guarantees.
arXiv Detail & Related papers (2022-05-05T06:43:46Z) - Differential Secrecy for Distributed Data and Applications to Robust
Differentially Secure Vector Summation [32.004283989604154]
We present a protocol for vector summation that verifies that the Euclidean norm of each contribution is approximately bounded.
Unlike SMC algorithms that inevitably cast integers to elements of a large finite field, our algorithms work over integers/reals, which may allow for additional efficiencies.
arXiv Detail & Related papers (2022-02-22T02:06:42Z) - Software mitigation of coherent two-qubit gate errors [55.878249096379804]
Two-qubit gates are important components of quantum computing.
But unwanted interactions between qubits (so-called parasitic gates) can degrade the performance of quantum applications.
We present two software methods to mitigate parasitic two-qubit gate errors.
arXiv Detail & Related papers (2021-11-08T17:37:27Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Graph-Homomorphic Perturbations for Private Decentralized Learning [64.26238893241322]
Local exchange of estimates allows inference of data based on private data.
perturbations chosen independently at every agent, resulting in a significant performance loss.
We propose an alternative scheme, which constructs perturbations according to a particular nullspace condition, allowing them to be invisible.
arXiv Detail & Related papers (2020-10-23T10:35:35Z) - Private Reinforcement Learning with PAC and Regret Guarantees [69.4202374491817]
We design privacy preserving exploration policies for episodic reinforcement learning (RL)
We first provide a meaningful privacy formulation using the notion of joint differential privacy (JDP)
We then develop a private optimism-based learning algorithm that simultaneously achieves strong PAC and regret bounds, and enjoys a JDP guarantee.
arXiv Detail & Related papers (2020-09-18T20:18:35Z) - An Accurate, Scalable and Verifiable Protocol for Federated
Differentially Private Averaging [0.0]
We tackle challenges regarding the privacy guarantees provided to participants and the correctness of the computation in the presence of malicious parties.
Our first contribution is a scalable protocol in which participants exchange correlated Gaussian noise along the edges of a network graph.
Our second contribution enables users to prove the correctness of their computations without compromising the efficiency and privacy guarantees of the protocol.
arXiv Detail & Related papers (2020-06-12T14:21:10Z) - Bounding, Concentrating, and Truncating: Unifying Privacy Loss
Composition for Data Analytics [2.614355818010333]
We provide strong privacy loss bounds when an analyst may select pure DP, bounded range (e.g. exponential mechanisms) or concentrated DP mechanisms in any order.
We also provide optimal privacy loss bounds that apply when an analyst can select pure DP and bounded range mechanisms in a batch.
arXiv Detail & Related papers (2020-04-15T17:33:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.