Secure delegated quantum algorithms for solving Mahalanobis distance

被引:1
|
作者
Ouyang, Jiandon [1 ]
Wang, Yuxun [1 ]
Li, Qin [1 ]
机构
[1] Xiangtan Univ, Sch Comp Sci, Xiangtan 411105, Peoples R China
基金
中国国家自然科学基金;
关键词
Delegated quantum computation; Quantum homomorphic encryption; Mahalanobis distance metric; Quantum communication; Quantum cryptography; Quantum algorithm; HOMOMORPHIC ENCRYPTION SCHEME;
D O I
10.1016/j.physa.2023.129025
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Distance metric is an important subroutine of some artificial intelligence algorithms such as classification and clustering algorithms. However, when a distance metric such as Mahalanobis distance is needed to calculate the distance between two points, the time required for classical algorithms to deal with Mahalanobis distance grows exponentially with the size of dataset and the dimensionality of the data. In this paper, a quantum algorithm for solving Mahalanobis distance (QAMD) is proposed. It can achieve an exponential speedup over the best classical counterpart if the covariance matrix in the sample distribution is a sparse Hermitian matrix. Especially, we propose a secure delegated QAMD protocol by combining the presented QAMD and quantum homomorphic encryption (QHE) which allows users with limited quantum capability to solve Mahalanobis distance with the help of a remote quantum server and still keep their data private. We also simulate a special case of the proposed delegated QAMD protocol on IBM's quantum cloud platform to show its feasibility.& COPY; 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Quantum Algorithms: Overviews, Foundations, and Speedups
    Wang, Shuangbao Paul
    Sakk, Eric
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 17 - 21
  • [22] Multiparty controlled quantum secure direct communication based on quantum search algorithm
    Kao, Shih-Hung
    Hwang, Tzonelih
    QUANTUM INFORMATION PROCESSING, 2013, 12 (12) : 3791 - 3805
  • [23] Analysis of multiple overlapping paths algorithms for secure key exchange in large-scale quantum networks
    Stępniak M.
    Mielczarek J.
    Journal of Information Security and Applications, 2023, 78
  • [24] Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication
    Shih-Hung Kao
    Chia-Wei Tsai
    Tzonelih Hwang
    International Journal of Theoretical Physics, 2012, 51 : 3868 - 3875
  • [25] Eavesdropping on secure quantum telephone protocol with dishonest server
    Naseri, Mosayeb
    OPTICS COMMUNICATIONS, 2009, 282 (16) : 3375 - 3378
  • [26] Efficient quantum secure communication with a publicly known key
    Li Chun-Yan
    Li Xi-Han
    Deng Fu-Guo
    Zhou Hong-Yu
    CHINESE PHYSICS B, 2008, 17 (07) : 2352 - 2355
  • [27] Improvement of a controlled quantum secure direct communication protocol
    Shen, Dongsu
    Ma, Wenping
    Wang, Meiling
    Yin, Xunru
    MODERN PHYSICS LETTERS B, 2014, 28 (15):
  • [28] Towards quantum-secure software defined networks
    Nosouhi, Mohammad Reza
    Sood, Keshav
    Chamola, Vinay
    Jeong, Jongkil Jay
    Gaddam, Anuroop
    IET QUANTUM COMMUNICATION, 2024, 5 (01): : 66 - 71
  • [29] Efficient quantum secure communication with a publicly known key
    Key Laboratory of Beam Technology and Material Modification, Ministry of Education, Beijing Normal University, Beijing 100875, China
    不详
    不详
    不详
    Chin. Phys., 2008, 7 (2352-2355): : 2352 - 2355
  • [30] Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication
    Kao, Shih-Hung
    Tsai, Chia-Wei
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2012, 51 (12) : 3868 - 3875