2020
DOI: 10.1007/s10773-020-04471-8
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Secure Multi-party Private Set Intersection Cardinality

Abstract: As we know that data sharing, a critical element in social networks, has the benefits of exploring important information, while also has the disadvantage of information leakage. Therefore, without the reliable third party arbitration agency, it is impossible to share information privately by distrustful multi-party. In this paper, we proposed a protocol called Quantum Secure Multi-party Private Set Intersection Cardinality (QSMS-IC), which has the capability of resisting quantum attacks. QSMS-IC, the extension… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…In the quantum setting, previous work considered the two-party and multi-party PSI scenario [9][10][11][12][13]. Instead, to the best of our knowledge, the server-aided one has not been considered so far.…”
Section: Related Workmentioning
confidence: 99%
“…In the quantum setting, previous work considered the two-party and multi-party PSI scenario [9][10][11][12][13]. Instead, to the best of our knowledge, the server-aided one has not been considered so far.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, quantum authentication protocol 28 , quantum protocols for secure multi-party summation 29 , quantum digital signature 30 , identity-based quantum signature 31 and quantum private query protocols 32 , 33 . Of course, there are some quantum protocols for PSI cardinality which are proposed 34 , 35 in recently. However, we need more practical and high-efficiency PSI cardinality protocols to fit the application in real world.…”
Section: Introductionmentioning
confidence: 99%
“…And the same method in Ref. 3 was later used to develop a PSI-CA protocol for multiple parties 12 . For easy implementation of a protocol, Shi et al 13 leveraged Bell states to construct another protocol for PSI-CA and PSU-CA problems that was more practical than that in Ref.…”
Section: Introductionmentioning
confidence: 99%
“…Although Ref. 12 works for multiple parties, it only solves the PSI-CA problem and requires multi-qubit entangled states, complicated oracle operators, and measurements. It then interests us that how we could design a more practical protocol for multiple parties to simultaneously solve PSI-CA and PSU-CA problems.…”
Section: Introductionmentioning
confidence: 99%