1,190 research outputs found
Quantum Private Comparison: A Review
As an important branch of quantum secure multiparty computation, quantum
private comparison (QPC) has attracted more and more attention recently. In
this paper, according to the quantum implementation mechanism that these
protocols used, we divide these protocols into three categories: The quantum
cryptography QPC, the superdense coding QPC, and the entanglement swapping QPC.
And then, a more in-depth analysis on the research progress, design idea, and
substantive characteristics of corresponding QPC categories is carried out,
respectively. Finally, the applications of QPC and quantum secure multi-party
computation issues are discussed and, in addition, three possible research
mainstream directions are pointed out
A Method of Electric Power Equipment Integrated Modeling Based on Carrier
AbstractModeling of electric power equipment is very important in power system. But there are several problems by the current method, such as information is incomplete. This paper proposes a method of electric power equipment integrated modeling based on carrier. Electric power equipment model are numbered and classification, then all of them are knowledge-related through knowledgebase. In the design, user-defined of meta-data structure is supported, which can be integrated with a variety of heterogeneous systems. Finally, the model can be displayed with the dynamic three-dimensional way after rendering by texturing techniques. Experiment indicates that the proposed model contain more information and more realistic
An Improved Quantum Private Set Intersection Protocol Based on Hadamard Gates
Recently, Liu and Yin (Int. J. Theor. Phys. 60, 2074-2083 (2021)) proposed a
two-party private set intersection protocol based on quantum Fourier transform.
We find the participant can deduce the other party's private information, which
violates the security requirement of private set computation. In order to solve
this problem, an improved private set intersection protocol based on Hadamard
gate is proposed. Firstly, the more feasible Hadamard gates are used to perform
on the original n qubits instead of the quantum Fourier transform, which may
reduce the difficulty of implementation. In addition, through the exclusive OR
calculation, the participant's private information is randomly chosen and
encoded on the additional n qubits, which prevents participants from obtaining
the result of the difference set S-diff , and then avoids the internal leakage
of private information. Finally, the correctness and security analysis are
conducted to show the proposed protocol can guarantee the correctness of
computation result as well as resist outside attacks and participant internal
attacks.Comment: 15 pages, 1 figure
- …