首页> 外文期刊>Concurrency and computation: practice and experience >Quantum private comparison protocol with cloud quantum computing
【24h】

Quantum private comparison protocol with cloud quantum computing

机译:具有云量子计算的量子私有比较协议

获取原文
获取原文并翻译 | 示例

摘要

Because privacy problems with big data impede progress at all phases of the pipeline that can create value from data, Alice and Bob have to perform private queries in order to obtain the private comparison results of big data. Suppose that the cloud devices are with the capacity of conventional and quantum computation, an efficient quantum private comparison protocol with ring-trip transmission by safe cloud quantum computing in the quantum Internet is proposed. Two participant parties Alice and Bob, with the help of a semi-trusted third party and cloud device by simple quantum measurements and mathematical operation, can compare the equality of their secret information without revealing the content of secret information. We show that our protocol can resist the eavesdropper Eve's intercept–resend attack, entangle–measure attack, and Trojan horse attack to cloud device, participant's intercept–measure–resend attack, and third party's attack. The qubit efficiency of our protocol approaches to 100%. We also analyze the connection between Eve's obtained information and the fidelity of secret information in detail. Copyright © 2015 John Wiley & Sons, Ltd.
机译:由于大数据的隐私问题阻碍了可以从数据中创造价值的管道各个阶段的进展,因此Alice和Bob必须执行私有查询才能获得大数据的私有比较结果。假设云设备具有常规计算能力和量子计算能力,提出了一种通过量子互联网中安全的云量子计算进行环行传输的有效量子私有比较协议。两个参与方Alice和Bob在半信任的第三方和云设备的帮助下,通过简单的量子测量和数学运算,可以比较其秘密信息的相等性,而无需透露秘密信息的内容。我们证明了我们的协议可以抵抗窃听者夏娃的拦截-重发攻击,纠缠-措施攻击以及对云设备的特洛伊木马攻击,参与者的拦截-措施发送攻击和第三方的攻击。我们协议的qubit效率接近100%。我们还将详细分析夏娃获得的信息与秘密信息的保真度之间的联系。版权所有©2015 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号