Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing

被引:8
作者
Debnath, Sumit Kumar [1 ]
Srivastava, Vikas [1 ]
Mohanty, Tapaswini [1 ]
Kundu, Nibedita [2 ]
Sakurai, Kouichi [3 ]
机构
[1] Natl Inst Technol Jamshedpur, Dept Math, Jamshedpur 831014, Bihar, India
[2] LNM Inst Informat Technol, Dept Math, Jaipur 302031, Rajasthan, India
[3] Kyushu Univ, Fac Informat Sci & Elect Engn, Fukuoka 8190395, Japan
关键词
Contact tracing; Private set intersection; Quantum communication; Quantum computation; Long-term security; SET INTERSECTION;
D O I
10.1016/j.jisa.2022.103127
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Contact tracing has emerged as a powerful and effective measure to curb the spread of contagious diseases. It is a robust tool, but on the downside, it possesses a risk of privacy violations as contact tracing requires gathering a lot of personal information. So there is a need for a cryptographic primitive that obfuscate the personal data of the user. Taking everything into account, private set intersection seems to be the natural choice to address the problem. Nearly all of the existing PSI protocols are relying on the number theoretic assumption based hard problems. However, these problems are not secure in quantum domain. As a consequence, it becomes essential to designing PSI that can resist quantum attack and provide long-term security. One may apply quantum cryptography to develop such PSI protocol. This paper deals with the design of PSI using quantum cryptography (QC), where the security depends on the principles of basic quantum mechanics. Our scheme achieves long-term security and remains secure against quantum attacks due to the use of QC. As opposed to the existing quantum PSI protocols, the communication and computation costs of our scheme are independent of the size of universal set. Particularly, our proposed protocol attains optimal communication cost in the context of quantum PSI. In addition, our designed protocol needs smaller amount of measurements. Moreover, we require only single photon quantum resources and simple single-particle projective measurements, unlike most of the existing quantum PSI protocols.
引用
收藏
页数:8
相关论文
共 60 条
[1]  
Abadi A., 2016, Financial Cryptography
[2]   Efficient Delegated Private Set Intersection on Outsourced Private Datasets [J].
Abadi, Aydin ;
Terzis, Sotirios ;
Metere, Roberto ;
Dong, Changyu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) :608-624
[3]   O-PSI: Delegated Private Set Intersection on Outsourced Datasets [J].
Abadi, Aydin ;
Terzis, Sotirios ;
Dong, Changyu .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 :3-17
[4]  
Alireza Kavousi, 2020, ARXIV PREPRINT ARXIV
[5]  
Bai Liu, 2021, SCI REP-UK, V11, P1
[6]  
Bennett C. H., 1984, P INT C COMPUTERS SY, P175, DOI [10.1016/j.tcs.2014.05.025, DOI 10.1016/J.TCS.2014.05.025]
[7]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[8]   CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures [J].
Brack, Samuel ;
Reichert, Leonie ;
Scheuermann, Bjoern .
PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, :337-340
[9]   Long-Distance Free-Space Measurement-Device-Independent Quantum Key Distribution [J].
Cao, Yuan ;
Li, Yu-Huai ;
Yang, Kui-Xing ;
Jiang, Yang-Fan ;
Li, Shuang-Lin ;
Hu, Xiao-Long ;
Abulizi, Maimaiti ;
Li, Cheng-Long ;
Zhang, Weijun ;
Sun, Qi-Chao ;
Liu, Wei-Yue ;
Jiang, Xiao ;
Liao, Sheng-Kai ;
Ren, Ji-Gang ;
Li, Hao ;
You, Lixing ;
Wang, Zhen ;
Yin, Juan ;
Lu, Chao-Yang ;
Wang, Xiang-Bin ;
Zhang, Qiang ;
Peng, Cheng-Zhi ;
Pan, Jian-Wei .
PHYSICAL REVIEW LETTERS, 2020, 125 (26)
[10]   Cryptanalysis and improvement of a quantum private set intersection protocol [J].
Cheng, Xiaogang ;
Guo, Ren ;
Chen, Yonghong .
QUANTUM INFORMATION PROCESSING, 2017, 16 (02)