Author:
Liu Bai,Ruan Ou,Shi Runhua,Zhang Mingwu
Abstract
AbstractPrivate Set Intersection Cardinality that enable Multi-party to privately compute the cardinality of the set intersection without disclosing their own information. It is equivalent to a secure, distributed database query and has many practical applications in privacy preserving and data sharing. In this paper, we propose a novel quantum private set intersection cardinality based on Bloom filter, which can resist the quantum attack. It is a completely novel constructive protocol for computing the intersection cardinality by using Bloom filter. The protocol uses single photons, so it only need to do some simple single-photon operations and tests. Thus it is more likely to realize through the present technologies. The validity of the protocol is verified by comparing with other protocols. The protocol implements privacy protection without increasing the computational complexity and communication complexity, which are independent with data scale. Therefore, the protocol has a good prospects in dealing with big data, privacy-protection and information-sharing, such as the patient contact for COVID-19.
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Reference41 articles.
1. Wu, M. E., Chang, S. Y., Lu, C. J. & Sun, H. M. A communicationefficient private matching scheme in Client–Server model. Inf. Sci. 275, 348–359 (2014).
2. Wen, Y. M., Gong, Z., Huang, Z. G. & Qiu, W. D. A new efficient authorized private set intersection protocol from Schnorr signature and its applications. Clust. Comput. 1, 287–297 (2018).
3. Vaidya, J., Shafiq, B., Fan, W., Mehmood, D. & Lorenzi, D. A random decision tree framework for privacy-preserving data mining. IEEE Trans. Dependable Secure Comput. 11(5), 399–411 (2014).
4. Cristofaro, E. D., Lu, Y. B. & Tsudik, G. Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information 239–253 (Springer, 2011).
5. Baldi, P., Baronio, R., Cristofaro, E. D., Gasti, P., & Tsudik, G. Countering gattaca: Efficient and secure testing of fully-sequenced human genomes. In ACM Conference on Computer and Communications Security 691–702 (2011).
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献