Advertisement

A Secret Information Preservation Scheme Based on Four-qubit Entangled State

  • Man-Mang Xue
  • Jian-Zhong ZhangEmail author
  • Shu-Cui Xie
Article

Abstract

With the improvement of people’s security awareness, the security of personal information has attracted more and more attention. This paper proposes a scheme that considers the preservation of personal information fundamentally. It is based on quantum cryptography. The scheme uses four-qubit entangled states and unitary operation to preserve or read information. In addition, quantum key distribution and one-time pad are used to ensure the security of message transmission. Finally, security analysis shows that the scheme is feasible.

Keywords

Four-qubit entangled state Information security Unitary operation Quantum measurement 

Notes

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61402275, 61402015, 61273311), the Natural Science Foundation of Shaanxi Province (Grant Nos. 2015JM6263, 2016JM6069), the Fundamental Research Funds for the Central Universities (Grant No. GK201402004), and the Fundamental Research Funds for the Central Universities (Grant No. 2019CSLZ001).

References

  1. 1.
    Allard, T., Anciaux, N., Bouganim, L., et al.: Secure personal data servers: A vision paper. Proceedings of the VLDB Endowment 3(1-2), 25–35 (2010)CrossRefGoogle Scholar
  2. 2.
    Beijing consumer association released the report on personal information security of mobile APP. Report on Quality Supervision in Guangxi. 208(04) 8 2018Google Scholar
  3. 3.
    Vladimir, E.C., Brankovic, L.: Data swapping: Balancing privacy against precision in mining for logic rules. Lecture Notes in Computer Science 1676, vol. 389–398. Springer, Heidelberg (1999)Google Scholar
  4. 4.
    Evfifimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. Inf. Syst. 29(4), 343–364 (2004)CrossRefGoogle Scholar
  5. 5.
    Kargupta, H., Datta, S., Wang, Q., et al.: On the privacy preserving properties of random data perturbation techniques. Proceedings of the Third IEEE international conference on data mining. 99–106 (2003)Google Scholar
  6. 6.
    Rizvi, S.J., Haritsa, J.R.: Maintaining data privacy in association rule mining. Proceedings of the 28th international conference on very large data bases. 682–693 (2002)Google Scholar
  7. 7.
    Grover, L.K.: A fast quantum mechanical algorithm for database search. Proceedings of the 28th annual ACM symposium on the theory of computing, 212–219 (1996)Google Scholar
  8. 8.
    Lloyd, S., Mohseni, M., Rebentrost, P.: Quantum algorithms for supervised and unsupervised machine learning. arXiv:1307.0411.1-11 (2013)
  9. 9.
    Lloyd, S., Mohseni, M., Rebentrost, P.: Quantum principal component analysis. Nature Phys. 10(9), 108–113 (2014)CrossRefGoogle Scholar
  10. 10.
    Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. Theoretical Comput. Sci. 560, 7–11 (2014)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: Security analysis. IEEE Trans. Inf. Theory 56(7), 3465–3477 (2010)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Unruh, D.: Revocable quantum timed-release encryption. Lecture Notes in Computer Science 8441, 129–146 (2015)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Liu, G., Zhang, J.Z., Xie, S.C.: Multiparty sealed-bid auction protocol based on the correlation of four-particle entangled state. Int. J. Theor. Phys. 57(10), 3141–3148 (2018)CrossRefGoogle Scholar
  14. 14.
    Luo, Y., Zhao, Z.W., Zhao, Z.J., et al.: The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution. Quantum Inf. Process. 12(1), 295–302 (2013)ADSCrossRefGoogle Scholar
  15. 15.
    Wang, Q.L., Zhang, W.W., Su, Q.: Revisiting “the loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution”. Int. J. Theor. Phys. 53(9), 3147–3153 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.College of Mathematics and Information ScienceShaanxi Normal UniversityXi’anChina
  2. 2.School of ScienceXi’an University of Posts and TelecommunicationsXi’anChina

Personalised recommendations