999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Privacy-Preserving Quantum Two-Party Geometric Intersection

2019-11-25 10:22:52WenjieLiuYongXuJamesYangWenbinYuandLianhuaChi
Computers Materials&Continua 2019年9期

Wenjie Liu ,Yong XuJames C.N.Yang,Wenbin Yu and Lianhua Chi

Abstract:Privacy-preserving computational geometry is the research area on the intersection of the domains of secure multi-party computation (SMC) and computational geometry.As an important field,the privacy-preserving geometric intersection (PGI)problem is when each of the multiple parties has a private geometric graph and seeks to determine whether their graphs intersect or not without revealing their private information.In this study,through representing Alice’s (Bob’s) private geometric graph as the set of numbered grids S A (S B ),an efficient privacy-preserving quantum two-party geometric intersection (PQGI) protocol is proposed.In the protocol,the oracle operation O A (O B ) is firstly utilized to encode the private elements of S A = (a 0, a 1,…,a M -1) into the quantum states,and then the oracle operation O f is applied to obtain a new quantum state which includes the XOR results between each element of and S B.Finally,the quantum counting is introduced to get the amount (t ) of the statesequaling to and the intersection result can be obtained by judging t >0 or not.Compared with classical PGI protocols,our proposed protocol not only has higher security,but also holds lower communication complexity.

Keywords:Privacy-preserving computational geometry,quantum two-party geometric intersection,oracle,quantum counting.

1 Introduction

The problem of privacy-preserving computational geometry is an important research area on the intersection of the domains of secure multi-party computation (SMC) [Oleshchuk and Zadorozhny (2007)] and computational geometry [Preparata and Shamos (2012)].It focuses on how cooperative users can use their own private geometric information as inputs in collaborative computing in the distributed systems,and they can obtain the correct results while ensuring their privacy.Since the privacy-preserving computational geometry is firstly proposed by Atallah et al.[Atallah and Du (2001)],the other researchers have drawn extensive attention on some related problems,such as point inclusion [Troncoso-Pastoriza,Katzenbeisser,Celik et al.(2007);Luo,Huang and Zhong (2007)],geometric intersection[Erlebach,Jansen and Seidel (2005);Paw lik,Kozik,Krawczyk et al.(2013)],nearest points or closest pair [Li and Ni (2002);Tao,Yi,Sheng et al.(2010)],and convex hull[Huang,Luo and Wang (2008);L?ffler and van Kreveld (2010);Assarf,Gaw rilow,Herr et al.(2017)],which have been applied to many important military and commercial fields.Consider the following scenario,two countries A and B intend to build a railway in an of fshore area.Before the completion of the railway,the construction route is confidential.In order to prevent future collisionsoftrains,countries A and B hope to determine if there are any two disjoint routes without revealing their own routes,and to negotiate with the location of the intersection.The above problem is a typical application of privacypreserving geometric intersection (PGI).Different from the protocols based on circuit evaluation schemes,recently Qin et al.[Qin,Duan,Zhao et al.(2014)] proposed the Lagrange multiplier method to solve the intersection of the two private curves,and this method is suitable for solving general geometry intersection problems.On the other way,some researchers tried to study the geometric problems in three dimensional space [Li,Wu,Wang et al.(2014)].However,most of these classical solutions are based on computational complexity assumptions,and they cannot ensure the participants’ privacy under the attack of quantum computation.

Fortunately,quantum cryptography can provide the unconditional security,which is guaranteed by some physical principles of quantum mechanics,to resist against such impact.In additional,quantum parallelism makes it possible to greatly speed up solving some specific computational tasks,such as large-integer factorization [Shor (1994)] and database search [Grover (1996)].With quantum mechanics utilized in the information processing,many important research findings are presented in recent decades,such as quantum key distribution (QKD) [Bennett and Brassard (1984)],quantum key agreement(QKA) [Liu,Chen,Ji et al.(2017);Liu,Xu,Yang et al.(2018)],quantum secure direct communication [Liu,Chen,Ma et al.(2009);Liu,Chen,Liu (2016);Liu and Chen(2016)],quantum private comparison [Liu,Liu,Liu et al.(2014);Liu,Liu,Chen et al.(2014);Liu,Liu,Wang et al.(2014)],and quantum sealed-bid auction (QSBA) [Naseri(2009);Liu,Wang,Ji et al.(2014);Liu,Wang,Yuan et al.(2016)],and deterministic remote state preparation [Liu,Chen,Liu et al.(2015);Qu,Wu,Wang et al.(2017)].These findings have shown the potential power in either the efficiency improvements or the security enhancements.

In this study,we pay attention to the PGI problem:Alice owns a private geometric graphGA,Bob has the other geometric graphGB,and they want to determine whether these two graphs intersect without revealing any private information to each other.By utilizing some specific oracle operations and quantum counting algorithm,we propose an efficient privacy-preserving quantum two-party geometric intersection (PQGI) protocol.The rest of this paper is organized as follows,the PQGI protocol is proposed in Section 2,and the correctness,security and efficiency analysis of PQGI protocol are discussed in Section 3,while the conclusion is drawn in the last section.

2 Prelim inaries

Before introducing the procedures of PQGI protocol,we firstly make some definitions of PGI problem and PQGI protocol.Without loss of generality,we suppose there are two parties,i.e.,Alice and Bob,and the formal definitions are given as below.

2.1 The problems

Problem 1 (Privacy-preserving point inclusion):There are two parties,Alice has a pointpA,and Bob has a geometric graphGB.They want to decide whetherpA∈GBwithout revealing to each other anything more than what can be inferred from that answer.

Problem 2 (Privacy-preserving two-party geometric intersection):Two parties Alice,Bob own the private geometric graphsGA,GB,respectively,and decide whetherGA∩GB≠? without disclosing their respective private information.

As a point can be viewed as a special geometric graph whose area is small enough to be one dot,Problem 1 is a typical case of Problem 2.In the study,we only consider the geometric intersection of Problem 2.

2.2 The definition of PQGI

In order to solve Problem 2,the private geometric graph can be represented as the set of grids in the area of the graph (suppose these girds are divided sufficiently),then the intersection of two geometric graphs is transformed into the intersection of two sets.Without loss of generality,we suppose Alice and Bob have a private geometric graphGAandGBon the plane,and they divide and number the whole plane intoRgrids (HereRis a large enough integer),then Alice’s and Bob’s graphs can be denoted asrespectively (shown in Fig.1).

Figure1:The illustration of partitioning and numbering the plane with R =400.The green(blue) part is Alice’s graph G A (Bob’ graph G B ),respectively,and the yellow part is the intersection area

Through representing Alice’s and Bob’s private geometric graphsGA,GBas the grid setsSA,SB),the PQGI protocol is defined as follows.

Definition 1 (the PQGI protocol):Alice and Bob encode their serial numbers of graph grids,i.e.,into two initial statesandrespectively,hereAfter executing this protocol,they can obtain the result of whether the two graphs intersect without revealing their private information.To be specific,the PQGI protocol should guarantee the following privacy:

●Alice’s PrivacyBob cannot learn any secret information about Alice’s geometric graph without risking Alice’s detection.

●Bob’s PrivacyAlice cannot get any secret information about Bob’s geometric graph without risking Bob’s detection.

3 The privacy-preserving quantum two-party geometric intersection protocol

Suppose Alice and Bob’s private geometric graphsGAandGBare located on a unified plane,and the plane is uniformly divided intoRgrids,hereRis a large enough integer that the whole plane can be represented by these grids with sufficient accuracy.Thus Alice’s and Bob’s graphsGA,GBcan be represented as the sets of grids:whereai,bjare unique serial numbers in [1,R],0 ≤i≤M-1,0≤j≤N-1.The detailed protocol is described in detail as follows (shown in Fig.2).

Figure2:The procedure of the proposed PQGI protocol.The dotted (solid) line denotes the quantum (classic) channel

1.Alice and Bob prepare the initial statesrespectively,whereanddenote Alice’s(m-qubit) and Bob’s (n-qubit) address qubits,whileDaandDbrepresent Alice’s and Bob’s (r-qubit) data qubits,Then Alice and Bob apply the oracle operationto encode their private elements of(shown in Fig.3 and Fig.4).

Then Alice and Bob obtain the result statesrespectively,then Alice sends her stateto Bob.

Figure3:Schematic circuit of the oracle operation O A

Figure4:Schematic circuit of the oracle operation O B.

Then he sends the result stateto Alice.

Figure5:Schematic circuit of the oracle operation O f

Figure6:Schematic circuit of the oracle operation O A

4.After the cheating check,Alice executes the quantum counting algorithm [Brassard,H?yer and Tapp (1998)] onto countwheretis the number of states thatequaling toin(i∈[0,M-1],j∈[0,N-1]).After executing the quantum algorithm,Bob obtains the result oft.Then Alice judges whetherGAandGBintersect according to the value oft:ift>0,then it can be deduced that there existsai=bjfor anyiandj,then get the conclusion thatGAintersects withGB,otherwise,GAandGBare not intersect.

5.Alice tells Bob the result of whetherGAintersects withGB.

3 Correctness,security and efficiency analysis

3.1 Correctness analysis

Without loss of generality,we suppose that Alice (Bob) has a private graphGA(GB),which is represented asSA={1,2,5,6}(SB={6,7,10,11}),and thusM=4,N=4,R=16,Alice and Bob want to determine whether there exists an intersection betweenGAandGB(shown in Fig.7).

Figure7:The example of the two intersecting geometric graphs G A and G B

In Step 1,Alice and Bob prepare two initial quantum statesin the form ofand then apply oracle operationon them,the two result statesare as follows:

Then Bob applies the oracle operationOfon stateand obtains the state

Bob further sends the result stateto Alice.Alice then applies the oracle operationon the data qubitsDaofand obtains the result stateas follow:

Alice then performs measurement on the data qubitsDaofthe measurement outcome turns to bethen she can conclude that Bob has not cheated.Then Alice executes the quantum counting algorithm on.Since the counting result,thus graphGAintersects with graphGB.

3.2 Security analysis

Now we discuss the security of our protocol.To realize such a secure PQGI protocol,two security requirements should be satisfied,that are Alice’s privacy and Bob’s privacy.

3.2.1 Alice’s privacy

Suppose Bob wants to extract information about private graphGA(i.e.,aiwithout affecting the final result of the protocol.If Bob performs the projective measurement on statehe can randomly obtain one elementfromThe statecan also be represented by an ensembleis the probability that Bob obtains Alice’s coordinates:

Here,we get the upper bound of information that Bob can get from Alice's coordinates is determined by the Holevo’s bound [Holevo (2011)]:

whereS(ρ)denotes the Von Neumann entropy of quantum stateρ,H(A:B)means the information Bob can get about Alice’s secret information,we have:

Then,Bob can only get coordinate information by measuring the stateρ.If Bob performs measurement on the statethe state will collapse into one basis state,i.e.,and the statewill be changed toIn Step 3 of our protocol,Alice checks whether Bob has cheated by applying oracle operationOAon the data qubitsDainand then performs measurement on them.Since the measured data qubitsdoes not equal toshe can conclude Bob has cheated and aborts the protocol.

3.2.2 Bob’s privacy

Suppose Alice wants to extract any information about private graphGB(i.e.biwithout affecting the final result of the protocol.If Bob performs the projective measurement on statehe can randomly obtain one element,i.e.

However,the state Alice received isand Alice does not know choose which base to measure and obtainbj.On the other hand,the received information is in the form ofai⊕bj,which means he even does not know whichaiencodes thebj,and therefore prevents his cheating on Bob’s privacy.

3.3 Efficiency analysis

The communication cost is one of the key indicators of the e efficiency for communication protocols.In order to analyze the efficiency of our PQGI protocol,we choose the classical PGI protocols [Atallah and Du (2001);Qin,Duan,Zhao et al.(2014)] as comparative references.In the Atallah et al.’s protocol,the participants send total 4M2messages to Bob,hereMis the number of divided edges of the e geometric graph,and each message requiresRbits.So the transmitted messages of the eir protocol are 4M2*R,and their communication complexity isO(M2R).While in Qin et al.’s protocol [Qin,Duan,Zhao et al.(2014)],it requires to send 2(M2+N2)messages,and each message requiresRbits.HereMandNare the number of curves from the edges of the e geometry,and its communication complexity is

In our PQGI protocol,Alice sends a (m+r)-qubit statesto Bob in Step 1,and thenBob sends a (m+n+2r)-qubit state to Alice in Step 3,wherethus the total transmitted messages of our protocol arequbits.Thus our communication complexity isO(l ogMNR).Through the above calculations,we can get the results of the e three protocols’communication complexity (see Tab.1).Obviously,our protocol achieves a great reduction in the communication complexity aspect.

Table1:Comparison among our protocol and the other PGI protocols

4 Conclusion and discussion

In this paper,we present a novel quantum solution to two-party geometric intersection based on oracle and the quantum counting algorithm.The security of them is based on the quantum cryptography instead of difficulty assumptions of mathematical problem.Compared with the classical related protocols,our solution has the advantage of higher security and lower communication complexity.In addition,our proposed protocol can also be extended to some other complicated privacy-preserving computation problems,such as privacy-preserving database queries over cloud data [Cao,Wang,Li et al.(2014);Shen,Li,Li et al.(2017)],privacy-preserving set operations in cloud computing [Cao,Li,Dang et al.(2017);Zhuo,Jia,Guo et al.(2017)],and privacy-preserving reversible data hiding over encrypted image [Cao,Du,Wei et al.(2016)].

Furthermore,the method of the oracle operation applied in the presented protocols is general and can be employed to solve other similar privacy-preserving computation geometry problems,such as convex hull,polygon inclusion,etc.However,how to extend our two party scenarios to the multi-party scenario,and the more complex situations such as geometric union is another problem.We would like to investigate the applications of quantum technologies in more kinds of privacy-preserving computational geometric protocols in the future.

Acknowledgement:The authors would like to thank the anonymous reviewers and editors for their comments that improved the quality of this paper.This work is supported by the Nature Science Foundation of China (Grant Nos.61502101 and 61501247),the Natural Science Foundation of Jiangsu Province,China (Grant No.BK20171458),the Six Talent Peaks Project of Jiangsu Province,China (Grant No.2015-XXRJ-013),the Natural science Foundation for colleges and universities of Jiangsu Province,China (Grant No.16KJB520030),the Research Innovation Program for College Graduates of Jiangsu Province,China (Grant No.KYCX17_0902),the Practice Innovation Training Program Projects for the Jiangsu College Students (Grant No.201810300016Z),and the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD).

主站蜘蛛池模板: 国产免费网址| 熟妇人妻无乱码中文字幕真矢织江 | 国产黑丝视频在线观看| 国产精品毛片一区视频播| 国产自产视频一区二区三区| 国产在线一区视频| 国产欧美性爱网| 国产传媒一区二区三区四区五区| 内射人妻无码色AV天堂| 亚洲国产一成久久精品国产成人综合| 国产69囗曝护士吞精在线视频| 国产成人亚洲综合a∨婷婷| 中文字幕久久精品波多野结| 老司国产精品视频91| 欧美在线伊人| 国产亚洲欧美日韩在线观看一区二区| 一级毛片免费观看久| 久久免费成人| 色婷婷综合激情视频免费看| 国产高清不卡| 婷婷综合亚洲| 一级毛片在线播放免费| 欧美不卡视频在线| 男女精品视频| 香蕉eeww99国产精选播放| 5388国产亚洲欧美在线观看| 视频二区国产精品职场同事| 国产精品综合色区在线观看| 精品久久久无码专区中文字幕| 国产精品亚洲一区二区三区在线观看| 亚洲精品自在线拍| 亚洲无码在线午夜电影| 日日拍夜夜操| 亚洲中文字幕无码爆乳| 美女国内精品自产拍在线播放| 亚洲精品自拍区在线观看| 国产91视频观看| 亚洲三级a| 9久久伊人精品综合| 亚洲国产日韩欧美在线| 日本国产精品一区久久久| 久久久久国产一区二区| 欧美性爱精品一区二区三区 | 青青草原国产| 国产成人成人一区二区| 亚洲AV无码精品无码久久蜜桃| 99青青青精品视频在线| 天天摸夜夜操| 免费观看精品视频999| 国产成人精品高清在线| 毛片网站观看| 91丝袜在线观看| 试看120秒男女啪啪免费| 四虎AV麻豆| 久久性妇女精品免费| 野花国产精品入口| 国产精品极品美女自在线网站| 欧洲亚洲欧美国产日本高清| 国产一级α片| a在线观看免费| 久久久波多野结衣av一区二区| 女人18毛片一级毛片在线 | 色综合国产| 国产成人精品一区二区不卡| 国产精品欧美激情| 精品国产www| 狠狠五月天中文字幕| 亚洲AV无码久久精品色欲| 97人妻精品专区久久久久| 中文字幕 91| 亚洲女人在线| 亚洲一区二区约美女探花| 国产一区二区三区在线观看视频| 亚洲精品麻豆| 91丝袜在线观看| 青青热久麻豆精品视频在线观看| 欧美性天天| 天天色天天综合网| 亚洲无码精彩视频在线观看| 欧美福利在线| 久热这里只有精品6| 在线综合亚洲欧美网站|