2018
DOI: 10.1007/s11128-018-1911-0
|View full text |Cite
|
Sign up to set email alerts
|

A novel quantum solution to secure two-party distance computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…, t, so the communication complexity of this protocol is O (t), which is only proportional to t. Note that t is the minimum number of TP required to recover secrets, which can be adjusted according to needs. The results computed by previous protocols [13,14,25] are estimated values, and their accuracy has positive correlation with the size of the database, while the results in our protocol are accurate. In previous protocols, the space of the participants' coordinates was evenly divided into N cells.…”
Section: ) Performancementioning
confidence: 59%
See 2 more Smart Citations
“…, t, so the communication complexity of this protocol is O (t), which is only proportional to t. Note that t is the minimum number of TP required to recover secrets, which can be adjusted according to needs. The results computed by previous protocols [13,14,25] are estimated values, and their accuracy has positive correlation with the size of the database, while the results in our protocol are accurate. In previous protocols, the space of the participants' coordinates was evenly divided into N cells.…”
Section: ) Performancementioning
confidence: 59%
“…The communication complexity can be defined as the total number of communication times. Under this definition, the complexities of the existing protocols are O (log N) and O (N log N), which are mentioned in [13,14,25]. This is because all three protocols are based on QPQs, and quantum messages need to be exchanged during QPQ.…”
Section: ) Performancementioning
confidence: 99%
See 1 more Smart Citation
“…In our protocol, each player knows only his share, even the reconstructor knows only his share. In this protocol, we use some basic operations i.e., protocol-I of Shi et al [51], CN OT gate [37], secure communication [72,6,55,50,61,46,38,75,21,73,64,63,65], entangle state [71,53,54,7,45,52,59,58,57,49,47,42,48,56], Quantum Fourier Transform (QF T ) [19] and Inverse Quantum Fourier Transform (QF T −1 ) [19], to transform the particles. We use a quantum approach in classical secret sharing to combine the benefits of both classical and quantum secret sharing, preventing attacks such as Intercept-Resend (IR), Intercept, Entangle-Measure (EM), Forgery, Collision, and Collusion.…”
Section: Introductionmentioning
confidence: 99%