量子电子学报 ›› 2024, Vol. 41 ›› Issue (2): 330-339.doi: 10.3969/j.issn.1007-5461.2024.02.015

• 量子光学 • 上一篇    下一篇

一种基于验证的量子私有集合计算协议

刘文杰 1,2,3*, 杨奇 1, 李文博 1, 李子贤 1   

  1. ( 1 南京信息工程大学软件学院, 江苏 南京 210044; 2 江苏省大气环境与装备技术协同创新中心, 江苏 南京 210044; 3 江苏省先进计算与智能服务工程研究中心, 江苏 南京 210044 )
  • 收稿日期:2022-05-09 修回日期:2022-06-14 出版日期:2024-03-28 发布日期:2024-03-28
  • 通讯作者: E-mail: wenjiel@163.com E-mail:wenjiel@163.com
  • 作者简介:刘文杰 ( 1979 - ), 湖北大冶人, 博士, 副教授, 硕士生导师, 主要从事量子密码通信、量子安全多方计算、量子算法与量子机器学习等方面的研究。E-mail: wenjiel@163.com
  • 基金资助:
    国家自然科学基金 (62071240, 61802175), 江苏省高等学校重点学术项目建设 (PAPD)

A quantum private set computation protocol based on verifiability

LIU Wenjie 1,2,3*, YANG Qi 1, LI Wenbo 1, LI Zixian 1   

  1. ( 1 School of Software, Nanjing University of Information Science and Technology, Nanjing 210044, China; 2 Jiangsu Province Collaborative Innovation Center of Atmospheric Environment and Equipment Technology, Nanjing 210044, China; 3 Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services, Nanjing 210044, China )
  • Received:2022-05-09 Revised:2022-06-14 Published:2024-03-28 Online:2024-03-28

摘要: 私有集合计算是安全多方计算的重要组成部分, 可以在不暴露合法参与者私有信息的情况下解决参与者之 间的某些集合计算问题(如交集、并集)。然而现有的量子私有集合计算协议基本上没有考虑验证性, 参与者无法确 定计算结果是否正确。针对此问题, 提出了一种基于验证的量子私有集合计算协议。此外, 该协议还能够可选择地 求解私有交集或并集问题。性能分析中通过实例证明了该协议的正确性与可验证性, 并通过外部攻击和参与者攻 击证明了协议的安全性。

关键词: 量子通信, 私有集合计算, 交集, 并集, 可验证

Abstract: Private set computation is an important part of secure multi-party computation, which can perform certain set computations (such as intersection, union) among the legitimate participants without revealing their private information. However, the existing quantum private set computing protocols generally do not consider verification, so participants cannot determine whether the calculation results are correct or not. To solve this problem, a quantum private set computing protocol based on verification is proposed. In addition, this protocol can selectively solve private intersection or union problems. In performance analysis, the correctness and verifiability of the protocol are proved by examples, and the security of the protocol is also proved by external attack and participant attack.

Key words: quantum communication, private set computation, set intersection, set union, verifiability DOI: 10.3969/j.issn.1007-5461.2024.02.015 基

中图分类号: