“…Subsequently, in order to enhance the realizability, Kumar [22] introduced a feasible quantum private set intersection protocol with single photons using the flexible oblivious quantum key distribution (OQKD) [23]. Based on the quantum PSI protocol [22], Debnath et al [24] presented an efficient quantum PSI protocol, which reduced communication complexity. However, a multi feasible OQKD protocol [25] was broken by the protocol [26] using the man-in-the-middle attack.…”
Section: Quantum Psi Protocolmentioning
confidence: 99%
“…However, a multi feasible OQKD protocol [25] was broken by the protocol [26] using the man-in-the-middle attack. Therefore, the security of protocols [22,24] may not be guaranteed.…”
Section: Quantum Psi Protocolmentioning
confidence: 99%
“…The computation complexity of this protocol is O(τ). Similarly, we analyze that the communication complexity of the protocol [24] should be O(ς)-qubit (N ς q), because the OQKD protocol [23] that they cite needs to transmit ω(ς + q)-qubit, where a security parameter is ω ≈ log (ς + q). The communication complexity of the protocol [22] should be O(N)-qubit (N ς q) because the OQKD protocol [23] that they cite needs to transmit ω(N + q)-qubit, where a security parameter is ω ≈ log (N + q).…”
The rapid development of the Internet of Things (IoT), big data and artificial intelligence (AI) technology has brought extensive IoT services to entities. However, most IoT services carry the risk of leaking privacy. Privacy-preserving set intersection in IoT is used for a wide range of basic services, and its privacy protection issues have received widespread attention. The traditional candidate protocols to solve the privacy-preserving set intersection are classical encryption protocols based on computational difficulty. With the emergence of quantum computing, some advanced quantum algorithms may undermine the security and reliability of traditional protocols. Therefore, it is important to design more secure privacy-preserving set intersection protocols. In addition, identity information is also very important compared to data security. To this end, we propose a quantum privacy-preserving set intersection protocol for IoT scenarios, which has higher security and linear communication efficiency. This protocol can protect identity anonymity while protecting private data.
“…Subsequently, in order to enhance the realizability, Kumar [22] introduced a feasible quantum private set intersection protocol with single photons using the flexible oblivious quantum key distribution (OQKD) [23]. Based on the quantum PSI protocol [22], Debnath et al [24] presented an efficient quantum PSI protocol, which reduced communication complexity. However, a multi feasible OQKD protocol [25] was broken by the protocol [26] using the man-in-the-middle attack.…”
Section: Quantum Psi Protocolmentioning
confidence: 99%
“…However, a multi feasible OQKD protocol [25] was broken by the protocol [26] using the man-in-the-middle attack. Therefore, the security of protocols [22,24] may not be guaranteed.…”
Section: Quantum Psi Protocolmentioning
confidence: 99%
“…The computation complexity of this protocol is O(τ). Similarly, we analyze that the communication complexity of the protocol [24] should be O(ς)-qubit (N ς q), because the OQKD protocol [23] that they cite needs to transmit ω(ς + q)-qubit, where a security parameter is ω ≈ log (ς + q). The communication complexity of the protocol [22] should be O(N)-qubit (N ς q) because the OQKD protocol [23] that they cite needs to transmit ω(N + q)-qubit, where a security parameter is ω ≈ log (N + q).…”
The rapid development of the Internet of Things (IoT), big data and artificial intelligence (AI) technology has brought extensive IoT services to entities. However, most IoT services carry the risk of leaking privacy. Privacy-preserving set intersection in IoT is used for a wide range of basic services, and its privacy protection issues have received widespread attention. The traditional candidate protocols to solve the privacy-preserving set intersection are classical encryption protocols based on computational difficulty. With the emergence of quantum computing, some advanced quantum algorithms may undermine the security and reliability of traditional protocols. Therefore, it is important to design more secure privacy-preserving set intersection protocols. In addition, identity information is also very important compared to data security. To this end, we propose a quantum privacy-preserving set intersection protocol for IoT scenarios, which has higher security and linear communication efficiency. This protocol can protect identity anonymity while protecting private data.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.