EconPapers    
Economics at your fingertips  
 

Authenticated Multi-Party Quantum Private Set Intersection with Single Particles

Gong- De Guo, Li-Qin Zheng, Kai Yu () and Song Lin ()
Additional contact information
Gong- De Guo: School of Artificial Intelligence, Xiamen Institute of Technology, Xiamen 361021, China
Li-Qin Zheng: Science Research and Training Department, Fujian Institute of Education, Fuzhou 350001, China
Kai Yu: Digital Fujian Internet-of-Things Laboratory of Environmental Monitoring, Fujian Normal University, Fuzhou 350007, China
Song Lin: College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350007, China

Mathematics, 2025, vol. 13, issue 12, 1-18

Abstract: As an important branch of secure multi-party computation, privacy set intersection enables multiple parties to input their private sets and jointly compute the intersection of these sets without revealing any information other than the intersection itself. With the increasing demand for privacy protection of user data, privacy set intersection has been widely used in privacy computing and other fields. In this paper, we utilize the properties of mutually unbiased bases to propose a multi-party quantum private set intersection protocol that incorporates identity authentication mechanisms. A semi-honest third party (TP) is introduced to facilitate the secure execution of this task among the multiple participating parties. The TP establishes a shared master key with each party, which serves as the basis for authenticating the identity of each participant throughout the protocol. Single-particle quantum states, prepared by the TP, act as the information carriers and are sequentially transmitted among the participating parties. Each party performs a local unitary operation on the circulating particle, thereby encoding their private data within the quantum state. At the end of the protocol, the TP announces his measurement result, by which all participants can concurrently ascertain the intersection of their private data sets. Notably, the proposed protocol eliminates the need for long-term storage of single-particle quantum states, thereby rendering it feasible with existing quantum technological capabilities. Furthermore, a comprehensive security analysis demonstrates that the protocol effectively resists some common external and internal attacks, thereby ensuring its theoretical security.

Keywords: quantum private set intersection; identity authentication; single particles; mutually unbiased bases (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/13/12/2019/pdf (application/pdf)
https://www.mdpi.com/2227-7390/13/12/2019/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:13:y:2025:i:12:p:2019-:d:1682210

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-06-19
Handle: RePEc:gam:jmathe:v:13:y:2025:i:12:p:2019-:d:1682210