2015
DOI: 10.1007/s12652-015-0297-4
|View full text |Cite
|
Sign up to set email alerts
|

Big data quantum private comparison with the intelligent third party

Abstract: Big data is often thought as a large number of virous unstructured forms of data. Expensive intelligent computing engineering techniques of critical systems that are not cost-effective for non-critical systems may sometimes be used as a intelligent protection system. The private comparison is to compare the equality of the secret information of two parties privately, without disclosing any actual information. These secret information of two parties are big data that need to be analysed for comparison privately… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…The term IPS is commonly used in technical fields such as electricity, meaning systems used to protect electrical networks and equipment in specific areas such as power systems (Islam and Gabbar, 2012; Li et al , 2013; Yazdani-Asrami et al , 2015). IPSs are also proposed to protect water from radioactive pollution (Li et al , 2011), cars from accidents (Ezell et al , 2013; Deng and Jian, 2014), software privacy (Tan et al , 2015) and other technical equipment such as conveyor belt and operations that are personnel based from accidents and attacks (Xu et al , 2012; Yu and He, 2015). No papers are present in the literature that relate the IPS to BB protection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The term IPS is commonly used in technical fields such as electricity, meaning systems used to protect electrical networks and equipment in specific areas such as power systems (Islam and Gabbar, 2012; Li et al , 2013; Yazdani-Asrami et al , 2015). IPSs are also proposed to protect water from radioactive pollution (Li et al , 2011), cars from accidents (Ezell et al , 2013; Deng and Jian, 2014), software privacy (Tan et al , 2015) and other technical equipment such as conveyor belt and operations that are personnel based from accidents and attacks (Xu et al , 2012; Yu and He, 2015). No papers are present in the literature that relate the IPS to BB protection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Simulation is also adopted to reproduce the set of transaction activities. In Tan et al (2015), authors propose an artificial intelligence based approach to protect big data, which can be implemented in the command and control applications of critical systems. The presented solution can be used to analyze a very huge amount of data to detect unsafe schema.…”
mentioning
confidence: 99%