2015
DOI: 10.1002/cpe.3490
|View full text |Cite
|
Sign up to set email alerts
|

Quantum private comparison protocol with cloud quantum computing

Abstract: Because privacy problems with big data impede progress at all phases of the pipeline that can create value from data, Alice and Bob have to perform private queries in order to obtain the private comparison results of big data. Suppose that the cloud devices are with the capacity of conventional and quantum computation, an efficient quantum private comparison protocol with ring-trip transmission by safe cloud quantum computing in the quantum Internet is proposed. Two participant parties Alice and Bob, with the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…The security of quantum cryptography relies on the fundamental laws of quantum mechanics instead of the complex mathematical problems involved in classical cryptography. In the prospect of quantum cryptography, many branches have been established, such as quantum key distribution (QKD), [1][2][3] quantum secure direct communication (QSDC), 4,5 quantum private comparison protocol, 6 quantum teleportation, [7][8][9] quantum digital signature, 10,11 quantum image encryption, [12][13][14] and quantum visual secret sharing. 15,16 Similarly, quantum secret sharing (QSS) is one of the crucial research problems in secure communication.…”
Section: Introductionmentioning
confidence: 99%
“…The security of quantum cryptography relies on the fundamental laws of quantum mechanics instead of the complex mathematical problems involved in classical cryptography. In the prospect of quantum cryptography, many branches have been established, such as quantum key distribution (QKD), [1][2][3] quantum secure direct communication (QSDC), 4,5 quantum private comparison protocol, 6 quantum teleportation, [7][8][9] quantum digital signature, 10,11 quantum image encryption, [12][13][14] and quantum visual secret sharing. 15,16 Similarly, quantum secret sharing (QSS) is one of the crucial research problems in secure communication.…”
Section: Introductionmentioning
confidence: 99%
“…SMQC can provide the unconditional security because some physical principles of quantum mechanics (e.g., quantum noncloning theorem and Heisenbergs uncertainty principle) are adopted. Since the pioneering work of quantum cryptography was proposed by Bennett and Brassard [5] in 1984, various SMQC protocols have been proposed, such as quantum secret sharing [6], quantum anonymous voting and surveying [7] and quantum private comparison (QPC) [8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25].…”
Section: Introductionmentioning
confidence: 99%
“…We encourage the readers to review to gain insight into the latest innovations in the platform in the context of big data, such as fog computing , a new paradigm that extends cloud computing and services to the edge of the network, and private comparison in quantum cloud computing .…”
mentioning
confidence: 99%