Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2020 Dec 17;10:22246. doi: 10.1038/s41598-020-77579-w

Three-party quantum private computation of cardinalities of set intersection and union based on GHZ states

Cai Zhang 1,, Yinxiang Long 2, Zhiwei Sun 3,, Qin Li 4, Qiong Huang 1,
PMCID: PMC7747751  PMID: 33335110

Abstract

Private Set Intersection Cardinality (PSI-CA) and Private Set Union Cardinality (PSU-CA) are two cryptographic primitives whereby two or more parties are able to obtain the cardinalities of the intersection and the union of their respective private sets, and the privacy of their sets is preserved. In this paper, we propose a three-party protocol to finish these tasks by using quantum resources, where every two, as well as three, parties can obtain the cardinalities of the intersection and the union of their private sets with the help of a semi-honest third party (TP). In our protocol, GHZ states play a role in encoding private information that will be used by TP to compute the cardinalities. We show that the presented protocol is secure against well-known quantum attacks. In addition, we analyze the influence of six typical kinds of Markovian noise on our protocol.

Subject terms: Quantum information, Quantum mechanics

Introduction

Quantum key distribution is one kind of important cryptographic protocols based on quantum mechanics, in which any outside eavesdropper attempting to obtain the secret key shared by two users will be detected. The successful detection comes from Heisenberg’s uncertainty principle: the measurement of a quantum system, which is required to obtain information of that system, will generally disturb it. The disturbances provide two users with the information that there exists an outside eavesdropper, and they can therefore abort the communication. Nowadays, most people need to share some of their private information for certain services such as products recommendation for online shopping and collaborations between two companies depending on their comm interests. Private Set Intersection Cardinality (PSI-CA) and Private Set Union Cardinality (PSU-CA), which are two primitives in cryptography, involve two or more users who intend to obtain the cardinalities of the intersection and the union of their private sets through the minimum information disclosure of their sets13.

The definition of Private Set Intersection (PSI), also called Private Matching (PM), was proposed by Freedman4. They employed balanced hashing and homomorphic encryption to design two PSI protocols and also investigated some variants of PSI. In 2012, Cristofaro et al.1 developed several PSI-CA and PSU-CA protocols with linear computation and communication complexity based on the Diffie-Hellman key exchange which blinds the private information. Their protocols were the most efficient compared with the previous classical related ones. There are also other classical PSI-CA or PSU-CA protocols58. Nevertheless, the security of these protocols relies on the unproven difficulty assumptions, such as discrete logarithm, factoring, and quadratic residues assumptions, which will be insecure when quantum computers are available911.

For the sake of improving the security of PSI-CA protocols for two parties, Shi et al.3 designed a probabilistic protocol where multi-qubit entangled states, complicated oracle operators, and measurements in high N-dimensional Hilbert space were utilized. And the same method in Ref.3 was later used to develop a PSI-CA protocol for multiple parties12. For easy implementation of a protocol, Shi et al.13 leveraged Bell states to construct another protocol for PSI-CA and PSU-CA problems that was more practical than that in Ref.3. In both protocols Ref.3 and Ref.13, only two parties who intend to get the cardinalities of the intersection and the union of their private sets are involved. Although Ref.12 works for multiple parties, it only solves the PSI-CA problem and requires multi-qubit entangled states, complicated oracle operators, and measurements. It then interests us that how we could design a more practical protocol for multiple parties to simultaneously solve PSI-CA and PSU-CA problems. Inspired by Shi et al.’s work, we are thus trying to design a three-party protocol to solve PSI-CA and PSU-CA problems, where every two and three parties can obtain the cardinalities of the intersection and the union of their respective private sets with the aid of a semi-honest third party (TP). TP is semi-honest means that he loyally executes the protocol, makes a note of all the intermediate results, and might desire to take other parties’ private information, but he cannot collude with dishonest parties. We then give a detailed analysis of the presented protocol’s security. Besides, the influence of six typical kinds of Markovian noise on our protocol is also analyzed.

Preliminaries

First of all, we introduce the properties of GHZ states, and then give a detailed description of our protocol.

The standard GHZ three-qubit state is usually given by

|φ000=12(|000+|111). 1

Let U=ZX, where X=|01|+|10| and Z=|00|-|11|. Combining U and I=|00|+|11|, we can deduce the following equations:

(UII)|φ000=12(|011-|100)=|φ100,(IUI)|φ000=12(|101-|010)=|φ010,(IIU)|φ000=12(|110-|001)=|φ001,(UUI)|φ000=12(|001+|110)=|φ110,(UIU)|φ000=12(|101+|010)=|φ101,(IUU)|φ000=12(|011+|100)=|φ011,(UUU)|φ000=12(|000-|111)=|φ111. 2

Note that Eqs. (1)–(2) form a basis (we call it GHZ basis hereafter) for the space of the three-qubit quantum system.

Results

The proposed protocol

Our protocol will satisfy the following requirements:

  1. Correctness The respective cardinalities of the intersection and the union of every two and three parties’ sets are correct.

  2. Privacy TP and dishonest parties cannot learn about the elements of any party’s set.

  3. Fairness All the parties are perfect peer entities and they can get the cardinalities with equal opportunities.

In our protocol, TP is assumed to be semi-honest which means that he honestly follows the protocol, writes down all the intermediate results and might attempt to obtain the elements of any party’s private set, but he cannot be collusive with any dishonest party.

Suppose that Alice, Bob and Charlie have private sets A={a1,a2,,al}, B={b1,b2,,bm} and C={c1,c2,,cn}, respectively, and each element of these sets lies in Zp, where Zp={0,1,2,p-1} and p is a large prime number. TP helps compute the cardinalities |AB| (|AB|), |AC| (|AC|), |BC| (|BC|), and |ABC| (|ABC|). Our protocol works as follows:

  • (Step 1) Alice, Bob and Charlie run a Quantum Key Agreement (QKA) protocol1416 to share a secret non-zero binary key k that corresponds to a secret integer over Zp. Then, Alice, Bob and Charlie compute
    A=ka1(modp),,kal(modp),B=kb1(modp),,kbm(modp),
    and
    C=kc1(modp),,kcn(modp),
    respectively.
  • (Step 2) Alice, Bob and Charlie encode their respective sets A, B and C into three private vectors over Zp2 as follows: Alice constructs a private vector (x0,x1,,xp-1)Z2p, where xi=1 if iA and xi=0, otherwise, for i=0,1,,p-1; Bob produces a private vector (y0,y1,,yp-1)Z2p, where yi=1 if iB and yi=0, otherwise, for i=0,1,,p-1; Charlie generates a private vector (z0,z1,,zp-1)Z2p, where zi=1 if iC and zi=0, otherwise, for i=0,1,,p-1.

  • (Step 3) TP prepares p GHZ states (GA0,GB0,GC0), (GA1,GB1,GC1), , (GA(p-1),GB(p-1),GC(p-1)), with each GHZ state being in the state |φ000. These GHZ states are referred to as encoding states. Next, TP divides all particles into three ordered sequences: (GA0,GA1,, GA(p-1)), (GB0,GB1,,GB(p-1)), and (GC0,GC1,, GC(p-1)), which are denoted as TA, TB, and TC, respectively.

  • (Step 4) TP generates 3d decoy particles, each of which is randomly chosen from the set {|0,|1,|+,|-}, where |+=12(|0+|1) and |-=12(|0-|1). Afterwards, TP randomly inserts d decoy particles into TA (TB, TC) to form a new sequence TA (TB, TC). TP then sends TA (TB, TC) to Alice (Bob, Charlie) through a quantum channel.

  • (Step 5) Confirming that Alice (Bob, Charlie) has successfully received TA (TB, TC), TP announces the inserted positions of all the d decoy particles in TA (TB, TC) and their corresponding measurement bases. Then, Alice (Bob, Charlie) measures all the decoy particles in the correct bases and announces the measurement results to TP. Next, TP compares the measurement results with their corresponding initial states. If the error rate is higher than the threshold determined by the channel noise, this protocol will be aborted. Otherwise, the protocol will continue to the next step.

  • (Step 6) Alice (Bob, Charlie) removes all the decoy particles from the sequence TA (TB, TC) to obtain the initial sequence TA (TB, TC). For each particle in TA (TB, TC), Alice (Bob, Charlie) performs U on GAi (GBi, GCi) (i=0,1,,P-1) if xi=1 (yi=1,zi=1); otherwise, Alice (Bob, Charlie) does nothing on GAi (GBi, GCi).

  • (Step 7) Alice (Bob, Charlie) prepares d decoy particles to detect eavesdropping. Each decoy states is randomly chosen from the set {|0,|1, |+,|-}. Later, Alice (Bob, Charlie) randomly inserts these d decoy particles into TA (TB,TC) to form a new sequence TA (TB,TC), and writes down the positions and the states of these inserted states. At last, Alice (Bob, Charlie) sends TA (TB,TC) to TP through a quantum channel.

  • (Step 8) Confirming that TP has successfully received TA (TB, TC), Alice (Bob, Charlie) announces the inserted positions of all d decoy particles in TA (TB, TC) and their corresponding measurement bases. TP measures all decoy particles in the correct bases and announces the measurement results. Alice (Bob, Charlie) then compares the measurement results with their corresponding initial states. If the error rate is higher than the threshold determined by the channel noise, the protocol will be aborted. Otherwise, the protocol will continue to the next step.

  • (Step 9) TP discards all decoy particles from TA (TB, TC) to attain TA (TB, TC). TP then selects eight variables S000, S100, S010, S001, S110, S101, S011 and S111 as the counters and sets them all to zero. Next, TP measures each trio (GAiGBiGCi) (i=0,1,,p-1) in the GHZ basis. If the measurement result is |φr (r{0,1}3), TP computes Sr=Sr+1. Finally, TP can calculate the cardinalities |AB|=S110+S111, |AC|=S101+S111, |BC|=S011+S111, |ABC|=S111, |AB|=p-S000-S001, |AC|=p-S000-S010, |BC|=p-S000-S100, and |ABC|=p-S000.

Correctness and security analyzes

In this section, we will analyze the correctness and the security of our protocol. Let us first give the analysis of the correctness.

Correctness

On the one hand, for any x,yZp and kZP-{0} , x=y if and only if kx=ky(modp). It is easy to deduce that

|AB|=|AB|,|AC|=|AC|,|BC|=|BC|,|ABC|=|ABC|,|AB|=|AB|,|AC|=|AC|,|BC|=|BC|,|ABC|=|ABC|. 3

On the other hand, by the coding rules in (Step 2) and (Step 6), for any iZp, if iAiBiC (iABC¯), then xi=yi=zi=0, and Alice (Bob, Charlie) does nothing on the particle GAi (GBi,GCi) when she (he, he) receives it. TP will get the measurement result |φ000 in step 9. Clearly, S000 is used to count the number of GHZ trios whose states are the same as their original states. The cardinality of the union of the sets A, B and C therefore equals p-S000. Namely, |ABC|=|ABC|=p-S000. Similarly, we can analyze other cases where i belonging to different sets corresponds to three parties’ different operations; see Table 1. From step 9, we have

S100=|AB¯C¯|,S010=|A¯BC¯|,S001=|A¯B¯C|,S110=|ABC¯|,S101=|AB¯C|,S011=|A¯BC|,S111=|ABC|, 4

where A¯=Zp-A, B¯=Zp-B, and C¯=Zp-C.

Table 1.

The relationship between i and three parties’ operations.

iZp Alice’s operations Bob’s operations Charlie’s operations TP’s measurment results
iA¯B¯C¯ I I I |φ000
iAB¯C¯ U I I |φ100
iA¯BC¯ I U I |φ010
iA¯B¯C I I U |φ001
iABC¯ U U I |φ110
iAB¯C U I U |φ101
iA¯BC I U U |φ011
iABC U U U |φ111

Furthermore, the relationships among A, B, C and Zp can be illustrated by a Venn Diagram in Fig. 1, where red, blue, and green circles represent the sets A, B and C, respectively, and Zp is the universal set. According to the Venn Diagram, we obtain the following equations:

|AB|=|ABC¯|+|ABC|=S110+S111,|AC|=|AB¯C|+|ABC|=S101+S111,|BC|=|A¯BC|+|ABC|=S011+S111,|AB|=|Zp|-|A¯B¯C|-|A¯B¯C¯|=p-S001-S000,|AC|=|Zp|-|A¯BC¯|-|A¯B¯C¯|=p-S010-S000,|BC|=|Zp|-|AB¯C¯|-|A¯B¯C¯|=p-S100-S000,|ABC|=|Zp|-|A¯B¯C¯|=p-S000. 5

According to Eqs. (3)–(5), TP will finally obtain

|AB|=S110+S111,|AC|=S101+S111,|BC|=S011+S111,|ABC|=S111,|AB|=p-S001-S000,|AC|=p-S010-S000,|BC|=p-S100-S000,|ABC|=p-S000, 6

which are the correct results.

Figure 1.

Figure 1

The relationships among Zp, A, B and C.

Security

In this subsection, we move on to the analysis of our protocol’s security. Two kinds of attacks, outside and participant attacks, on our protocol will be considered. Outside attacks come from an outside eavesdropper, Eve. Participant attacks can be launched by TP or dishonest parties.

Outside attacks In our protocol, TP and three parties employ decoy particles to prevent eavesdropping, which is derived from the BB84 QKD protocol17. And it has been proven to be unconditionally secure18. As we know, BB84 protocol remains secure even if the quantum channel is noisy, and our protocol can thus work on the noisy channels as well. Any eavesdropping will be detected in (Step 5) or (Step 8). Concretely, since the decoy state is randomly chosen from the set {|0,|1|+|-}, it is in the state ρ=I2. For any trio (GAi,GBi,GCi) (i=0,1,,p-1), we have ρAi=ρBi=ρCi=I2=ρ. Eve thus cannot distinguish these two states. Without loss of generality, the most general strategy for Eve is that she performs an operation UE which causes the encoding states to interact coherently with an auxiliary quantum system |e, which can be described as follows:

UE|0|e=α|0e00+β|1e01,UE|1|e=γ|0e10+δ|1e11, 7

where |α|2+|β|2=1 and |γ|2+|δ|2=1. In what follows, we will show that in order to pass the detection, Eve’s ancillary state and the encoding state should be product states.

From Eq. (7), if the decoy state is |0 or |1 and Eve introduces no error in the eavesdropping check, the following condition should be satisfied:

β=γ=0. 8

If the decoy state is |+ or |- and Eve introduces no error in the eavesdropping check, we should have

UE|+|e=12α|0e00+β|1e01+γ|0e10+δ|1e11=12|+αe00+βe01+γe10+δe11+12|-αe00-βe01+γe10-δe11=12|+αe00+βe01+γe10+δe11, 9

or

UE|-|e=12α|0e00+β|1e01-γ|0e10-δ|1e11=12|+αe00+βe01-γe10-δe11+12|-αe00-βe01-γe10+δe11=12|-αe00-βe01-γe10+δe11. 10

Namely, the following equations

αe00-βe01+γe10-δe11=0,αe00+βe01-γe10-δe11=0, 11

should hold, with 0 denoting a column zero vector. Depending on Eqs. (8) and (11), we can deduce that

α=δ=1,β=γ=0,|e00=|e11. 12

Finally, we have

UE|0|e=|0e00,UE|1|e=|1e00,UE|+|e=|+e00,UE|-|e=|-e00. 13

That is to say, Eve introduces no error in the eavesdropping only when her ancillary state and the encoding states are product states. Eve therefore cannot obtain useful information without being detected.

Note that our protocol involves two-way quantum transmission that may incur Trojan horse attacks19,20. We do not even need the photon number splitter and the optical wavelength filter devices21,22 to detect such an attack because the attacker knows nothing about three parties’ share key k that are employed to encrypt their private information.

Dishonest parties’ attacks Note that TP cannot collude with these dishonest parties. Suppose that Alice and Bob are the dishonest parties who intend to learn about Charlie’s set C. After they remove their respective decoy particles and do nothing on their particles, they may try to figure out what operations Charlie has perform on his particles to obtain (z0,z1,,zp-1). If Alice and Bob can get (z0,z1,,zp-1), they can easily steal Charlie’s private information because they share the same key k. Let’s consider the i-th trio of GHZ state. If iC, Charlie performs U=ZX on the particle GCi and then the state of (GAi,GBi,GCi) turns into φ001GAiGBiGCi=12(|110GAiGBiGCi-|001GAiGBiGCi); otherwise, the the state of (GAi,GBi,GCi) remains φ000GAiGBiGCi=12(|000GAiGBiGCi+|111GAiGBiGCi). In both case, ρGAiGBi=12(|00GAiGBi00|+|11GAiGBi11|), which means Alice and Bob cannot extract any private information from partial qubits of GHZ states. Thus, this attack by Alice and Bob is also invalid to our protocol.

TP’s attacks In our protocol, TP is assumed to be semi-honest, which means he will loyally execute the protocol, and he may use all the intermediate results to derive the other parties’ private information. However, he cannot collude with other dishonest parties.

Clearly, in 3.1, TP is able to derive (x0,x1,,xp-1), (y0,y1,,yp-1) and (z0,z1,,zp-1) according to the original GHZ states and the measurement results in the GHZ basis. Namely, TP knows what operations Alice, Bob and Charlie have done on their particles. Even though TP can then deduce whether or not iA (iB,iC), he can still not learn any information about the elements in A (B, C). For example, suppose TP knows that iA (i.e. i=kaj(modp)A), he knows nothing about ajA because he does not have the secret key k, whose security is guaranteed by Quantum Key Agreement. Hence, TP cannot steal three parties’ private information.

Influence of Markovian Noise on the Protocol

In this section, assuming that the quantum state generator, quantum memories, and measurement devices in our protocol are perfect, we analyze the influence of six typical sorts of Markovian noise on our protocol. The effect of quantum noise on a tripartite quantum state ρ123 can be characterized as follows:

ρ123=i,j,kK1(i)K2(j)K3(k)ρ123K1(i)K2(j)K3(k), 14

where {Ki} are Kraus operators characterizing quantum noise23 .

Flip channels

The flip channels have the following Kraus operators23

K(0)=1-qI,K(1)=qσi, 15

where i=1,2,3 represents the bit flip (σ1=|01|+|10|) , bit-phase flip (σ2=i(|10|-|01|)) and phase flip (σ3=|00|-|11|) channels, respectively, and q[0,1] denotes the noise strength.

Suppose that the channel between TP and Alice, the channel between TP and Bob, and the channel between TP and Charlie are the same. We first consider the bit flip channel. For a GHZ state ρABC=|φ000ABCφ000| used for computation, after three particles arrived at Alice, Bob, and Charlie, respectively, the state of this tripartite system ABC becomes

ρABC=i,j,k=01KA(i)KB(j)KC(k)ρABCKA(i)KB(j)KC(k), 16

where Ks(0)=1-qI,Ks(1)=qσ1 (s{A,B,C}).

Later, Alice, Bob, and Charlie perform unitary operations UA, UB and UC on particle A, B, C, respectively, as described in (Step 6) of the proposed protocol, with UA, UB, UC {I,U=ZX}. We denote UABC=UAUBUC, the state after Alice’s, Bob’s, and Charlie’s operations turns into

ρABC=UABCρABCUABC. 17

When TP receives these three particles from Alice, Bob, Charlie, the state of this system ABC is

ρABC=i,j,k=01KA(i)KB(j)KC(k)ρABCKA(i)KB(j)KC(k). 18

When TP measures the system ABC in the GHZ basis, he expects to obtain the measure result UABCρABCUABC, through which he can compute the cardinalities of intersections and unions, as described in 3.1 of our protocol. In this case, TP succeeds in the computation. We found that for all possible choices of UABC, the success probability is

PsucBF=1-6q+18q2-24q3+12q4. 19

Similarly, for bit-phase and phase channels, the success probabilities are

PsucBPF=(1-2q+2q2)3, 20

and

PsucPF=1-6q+30q2-80q3+120q4-96q5+32q6, 21

respectively.

The variation of these three success probabilities for flip channels are depicted in Fig. 2.

Figure 2.

Figure 2

The variations of the success probabilities Psuc using three kinds of flip channel with noise strength q.

Depolarizing

The depolarizing channel can be characterized by the following Kraus operators23

K(1)=1-34qI,K(2)=q2σ1,K(3)=q2σ2,K(4)=q2σ3, 22

where σ1=|01|+|10|, σ2=i(|10|-|01|), σ3=|00|-|11|, and q[0,1] is the noise strength.

Suppose that the channel between TP and Alice, the channel between TP and Bob, and the channel between TP and Charlie are the same. Using the similar method in Flip channels analysis, the success probability of TP obtaining the correct measurement result is

PsucDep=18(8-36q+78q2-92q3+63q4-24q5+4q6), 23

for all different choices of UABC.

Amplitude damping

The amplitude damping channel is used for the description of energy dissipation, which contains the Kraus operators23 as follows

K(1)=1001-q,K(2)=0q00, 24

where q[0,1] is the noise strength.

Suppose that the channel between TP and Alice, the channel between TP and Bob and the channel between TP and Charlie are the same. Using the similar method in Flip channels analysis, the success probability of TP obtaining the correct measurement result is

PsucAD1=14(4-12q+21q2+(-22+81-q)q3+(15-81-q)q4-6q5+q6), 25

for the cases where UABC=III and UABC=UUU. For other cases, the success probability changes to

PsucAD2=-14(-1+q)(4-8q+9q2+(-5+41-q)q3+q4). 26

Phase damping

The phase damping channel is characterized by the Kraus operators23 as follows

K(1)=1001-q,K(2)=000q, 27

where q[0,1] is the noise strength.

Suppose that the channel between TP and Alice, the channel between TP and Bob, and the channel between TP and Charlie are the same. Using the similar method in Flip channels analysis, the success probability of TP obtaining the correct measurement result is

PsucPD=12(2-3q+3q2-q3), 28

for all sorts of choices of UABC.

The variations of the success probabilities of depolarizing, amplitude damping and phase damping channels are depicted in Fig. 3.

Figure 3.

Figure 3

The variations of the success probabilities Psuc on the depolarizing, amplitude damping, and phase damping channels with noise strength q.

Discussion and Conclusions

We presented a three-party protocol to compute the cardinalities of the intersection and the union between any two sets and among three sets with the help a semi-honest party TP. The security analysis showed that our protocol can resist some well-known quantum attacks. In addition, we analyzed the influence of six typical sorts of Markovian noise on the success probabilities of a GHZ state used for computation. The analysis showed that among three kinds of flip channels, the bit-phase flip channel affects our protocol most. It is interesting to see that on the amplitude damping channel, the success probabilities of the cases where UABC=III and UABC=UUU are the same, but for other cases, they share another success probabilities.

In practice, quantum error correction codes are usually employed to protect quantum states from errors induced by noise. There is also research on designing robust quantum cryptographic protocols based on some specific quantum states over special noisy channels (e.g. collective noise channels)16. Note that imperfect devices, such as quantum state generators and measurement devices, may also affect the robust of quantum cryptographic protocol, we will further conduct research on these topics in the future.

Acknowledgements

 This work is supported by the National Natural Science Foundation of China  (Nos. 61902132, 11647140, 61872152, 61602316 and U1736113), the Natural Science Foundation of Guangdong Province, China (No. 2018A030310147), the Guangdong Major Project of Basic and Applied Basic Research (No. 2019B030302008), and the Shenzhen Fundamental Research Fund (No. JCYJ20190809152003992).

Author contributions

Study conception, design, and writing of the manuscript: C.Z., Z.S. and Q.H. Analysis and discussion: Y.L., Z.S. and Q.L. All authors reviewed the manuscript.

Competing interests

The authors declare no competing interests.

Footnotes

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Contributor Information

Cai Zhang, Email: zhangcai@scau.edu.cn.

Zhiwei Sun, Email: smeker@szpt.edu.cn.

Qiong Huang, Email: qhuang@scau.edu.cn.

References

  • 1.De Cristofaro, E., Gasti, P. & Tsudik, G. Fast and private computation of cardinality of set intersection and union. In International Conference on Cryptology and Network Security, 218–231 (Springer, 2012).
  • 2.Wu M-E, Chang S-Y, Lu C-J, Sun H-M. A communication-efficient private matching scheme in client-server model. Inf. Sci. 2014;275:348–359. doi: 10.1016/j.ins.2014.01.016. [DOI] [Google Scholar]
  • 3.Shi R-H, Mu Y, Zhong H, Zhang S, Cui J. Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 2016;370:147–158. doi: 10.1016/j.ins.2016.07.071. [DOI] [Google Scholar]
  • 4.Freedman, M. J., Nissim, K. & Pinkas, B. Efficient private matching and set intersection. In International conference on the theory and applications of cryptographic techniques, 1–19 (Springer, 2004).
  • 5.Vaidya J, Clifton C. Secure set intersection cardinality with application to association rule mining. J. Comput. Secur. 2005;13:593–622. doi: 10.3233/JCS-2005-13401. [DOI] [Google Scholar]
  • 6.Kissner, L. & Song, D. Privacy-preserving set operations. In Annual International Cryptology Conference, 241–257 (Springer, 2005).
  • 7.Zander, S., Andrew, L. L. & Armitage, G. Scalable private set intersection cardinality for capture-recapture with multiple private datasets. Centre for Advanced Internet Architectures, Technical Report 130930A (2013).
  • 8.Debnath, S. K. & Dutta, R. Secure and efficient private set intersection cardinality using bloom filter. In International Conference on Information Security, 209–226 (Springer, 2015).
  • 9.Shor, P. W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings 35th annual symposium on foundations of computer science, 124–134 (IEEE, 1994).
  • 10.Grover, L. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings 28th Annual ACM Symposium on the Theory of computation, 212–219 (ACM Press, 1996).
  • 11.Grover L. Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 1997;79:325. doi: 10.1103/PhysRevLett.79.325. [DOI] [Google Scholar]
  • 12.Liu B, Zhang M, Shi R. Quantum secure multi-party private set intersection cardinality. Int. J. Theor. Phys. 2020;59:1992–2007. doi: 10.1007/s10773-020-04471-8. [DOI] [Google Scholar]
  • 13.Shi R-H. Quantum private computation of cardinality of set intersection and union. Eur. Phys. J. D. 2018;72:221. doi: 10.1140/epjd/e2018-90380-7. [DOI] [Google Scholar]
  • 14.Sun Z, et al. Multi-party quantum key agreement by an entangled six-qubit state. Int. J. Theor. Phys. 2016;55:1920–1929. doi: 10.1007/s10773-015-2831-8. [DOI] [Google Scholar]
  • 15.Liu W-J, Xu Y, Yang C-N, Gao P-P, Yu W-B. An efficient and secure arbitrary n-party quantum key agreement protocol using bell states. Int. J. Theor. Phys. 2018;57:195–207. doi: 10.1007/s10773-017-3553-x. [DOI] [Google Scholar]
  • 16.Cai B, Guo G, Lin S, Zuo H, Yu C. Multipartite quantum key agreement over collective noise channels. IEEE Photonics Journal. 2018;10:1–11. [Google Scholar]
  • 17.Bennett, C. H. & Brassard, G. Quantum cryptography: public-key distribution and coin tossing. In Proceedings of IEEE International Conference on Computer, System and Signal, 175–179 (1984).
  • 18.Shor PW, Preskill J. Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 2000;85:441. doi: 10.1103/PhysRevLett.85.441. [DOI] [PubMed] [Google Scholar]
  • 19.Cai Q-Y. Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A. 2006;351:23–25. doi: 10.1016/j.physleta.2005.10.050. [DOI] [Google Scholar]
  • 20.Kraus B, et al. Quantum memory for nonstationary light fields based on controlled reversible inhomogeneous broadening. Phys. Rev. A. 2006;73:020302. doi: 10.1103/PhysRevA.73.020302. [DOI] [Google Scholar]
  • 21.Deng F-G, Li X-H, Zhou H-Y, Zhang Z-J. Improving the security of multiparty quantum secret sharing against trojan horse attack. Physical Review A. 2005;72:044302. doi: 10.1103/PhysRevA.72.044302. [DOI] [Google Scholar]
  • 22.Li X-H, Deng F-G, Zhou H-Y. Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A. 2006;74:054302. doi: 10.1103/PhysRevA.74.054302. [DOI] [Google Scholar]
  • 23.Nielsen MA, Chuang I. Quantum Computation and Quantum Information. Cambridge: Cambridge University Press; 2002. [Google Scholar]

Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES