2015
DOI: 10.1007/s11128-015-1165-z
|View full text |Cite
|
Sign up to set email alerts
|

An efficient quantum scheme for Private Set Intersection

Abstract: Private Set Intersection allows a client to privately compute set intersection with the collaboration of the server, which is one of the most fundamental and key problems within the multiparty collaborative computation of protecting the privacy of the parties. In this paper, we first present a cheat-sensitive quantum scheme for Private Set Intersection. Compared with classical schemes, our scheme has lower communication complexity, which is independent of the size of the server's set. Therefore, it is very sui… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
24
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 38 publications
(24 citation statements)
references
References 23 publications
0
24
0
Order By: Relevance
“…3. Any type of deviation of Alice in steps 12,13,14,15,16,17 and 18 such as avoiding error checking, operating U swap and U cnot improperly or conveying wrong values of t and q t to Bob will lead her to wrong values of the functionality. So she should have no incentive to deviate in those rounds of the protocol Π.…”
Section: Atmentioning
confidence: 99%
See 2 more Smart Citations
“…3. Any type of deviation of Alice in steps 12,13,14,15,16,17 and 18 such as avoiding error checking, operating U swap and U cnot improperly or conveying wrong values of t and q t to Bob will lead her to wrong values of the functionality. So she should have no incentive to deviate in those rounds of the protocol Π.…”
Section: Atmentioning
confidence: 99%
“…In this regard, we like to point out that the procedure described in [12,13] to detect measure and resend attack by Bob, requires a more detailed analysis and certain revision. In [12], to detect the attack, the author inserted l − 1 decoy states encoded as 1 √ 2 (|0 + |j i ), where j i ∈ Z * N .…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…However, in current phase-encoded QPQ protocols [4][5][6] as long as the returned system is in state…”
Section: Analysis Of Phase-encoded Qpqmentioning
confidence: 99%
“…In comparison with the original QPQ protocol [3], the phase-encoded QPQ protocol displays two prominent advantages: lower communication cost and better implementability. Due to its good properties, there are lots of important applications of phase-encoded QPQ especially in some privacy-preserving settings, such as oblivious setmember decision [5], private set intersection [6], secure data mining [7], and so on.…”
Section: Introductionmentioning
confidence: 99%