Secure delegated quantum algorithms for solving Mahalanobis distance

被引:1
|
作者
Ouyang, Jiandon [1 ]
Wang, Yuxun [1 ]
Li, Qin [1 ]
机构
[1] Xiangtan Univ, Sch Comp Sci, Xiangtan 411105, Peoples R China
基金
中国国家自然科学基金;
关键词
Delegated quantum computation; Quantum homomorphic encryption; Mahalanobis distance metric; Quantum communication; Quantum cryptography; Quantum algorithm; HOMOMORPHIC ENCRYPTION SCHEME;
D O I
10.1016/j.physa.2023.129025
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Distance metric is an important subroutine of some artificial intelligence algorithms such as classification and clustering algorithms. However, when a distance metric such as Mahalanobis distance is needed to calculate the distance between two points, the time required for classical algorithms to deal with Mahalanobis distance grows exponentially with the size of dataset and the dimensionality of the data. In this paper, a quantum algorithm for solving Mahalanobis distance (QAMD) is proposed. It can achieve an exponential speedup over the best classical counterpart if the covariance matrix in the sample distribution is a sparse Hermitian matrix. Especially, we propose a secure delegated QAMD protocol by combining the presented QAMD and quantum homomorphic encryption (QHE) which allows users with limited quantum capability to solve Mahalanobis distance with the help of a remote quantum server and still keep their data private. We also simulate a special case of the proposed delegated QAMD protocol on IBM's quantum cloud platform to show its feasibility.& COPY; 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Secure quantum weak oblivious transfer against individual measurements
    He, Guang Ping
    QUANTUM INFORMATION PROCESSING, 2015, 14 (06) : 2153 - 2170
  • [42] Quantum secure direct communication
    Li Xi-Han
    ACTA PHYSICA SINICA, 2015, 64 (16)
  • [43] Secure quantum weak oblivious transfer against individual measurements
    Guang Ping He
    Quantum Information Processing, 2015, 14 : 2153 - 2170
  • [44] Entanglement and teleportation in quantum key distribution for secure wireless systems
    Ahammed, Md. Ferdous
    Kadir, Mohammad Ismat
    IET QUANTUM COMMUNICATION, 2024, : 551 - 566
  • [45] A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
    徐淑奖
    陈秀波
    钮心忻
    杨义先
    CommunicationsinTheoreticalPhysics, 2013, 59 (05) : 547 - 553
  • [46] A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
    Xu Shu-Jiang
    Chen Xiu-Bo
    Niu Xin-Xin
    Yang Yi-Xian
    COMMUNICATIONS IN THEORETICAL PHYSICS, 2013, 59 (05) : 547 - 553
  • [47] Secure quantum key distribution protocol using eight state
    Sharma, Neha
    Saxena, Vikas
    JOURNAL OF OPTICS-INDIA, 2025,
  • [48] Specifications and improvements of LPN solving algorithms
    Jiao, Lin
    IET INFORMATION SECURITY, 2020, 14 (01) : 111 - 125
  • [49] MULBER: Effective Android Malware Clustering Using Evolutionary Feature Selection and Mahalanobis Distance Metric
    Soundrapandian, Pradeepkumar Duraisamy
    Subbiah, Geetha
    SYMMETRY-BASEL, 2022, 14 (10):
  • [50] CRYPTANALYSIS AND IMPROVEMENT OF THE SECURE QUANTUM SEALED-BID AUCTION WITH POSTCONFIRMATION
    Xu, Guo-Ai
    Zhao, Zhi-Wen
    Chen, Xiu-Bo
    Yang, Yi-Xian
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2011, 9 (06) : 1383 - 1392