Skip to main content
Log in

Quantum secure two-party computation for set intersection with rational players

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Recently, Shi et al. (Phys Rev A 92:022309, 2015) proposed quantum oblivious set member decision protocol where two legitimate parties, namely Alice and Bob, play a game. Alice has a secret k, and Bob has a set \(\{k_1,k_2,\ldots k_n\}\). The game is designed towards testing if the secret k is a member of the set possessed by Bob without revealing the identity of k. The output of the game will be either “Yes” (bit 1) or “No” (bit 0) and is generated at Bob’s place. Bob does not know the identity of k, and Alice does not know any element of the set. In a subsequent work (Shi et al in Quant Inf Process 15:363–371, 2016), the authors proposed a quantum scheme for private set intersection (PSI) where the client (Alice) gets the intersected elements with the help of a server (Bob) and the server knows nothing. In the present draft, we extended the game to compute the intersection of two computationally indistinguishable sets X and Y possessed by Alice and Bob, respectively. We consider Alice and Bob as rational players, i.e. they are neither “good” nor “bad”. They participate in the game towards maximizing their utilities. We prove that in this rational setting, the strategy profile ((cooperate, abort), (cooperate, abort)) is a strict Nash equilibrium. If ((cooperate, abort), (cooperate, abort)) is strict Nash, then fairness and correctness of the protocol are guaranteed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. For the brevity of notation, in the rest of the paper, we will write \(\log (.)\) instead of \(\log _2(.)\).

  2. M qubit string can be written as the tensor product of M individual qubits. As \(j\in \mathbb {Z_N^*}, j\) can be expressed in \(M=\log N\) bits. Each bit corresponds to a qubit. Thus \(\left| j\right\rangle \) can be written as \(\left| d_M\right\rangle ^{\otimes M}\), \(d_M\in \{0,1\}\) and \(M\in [1,\log N]\).

  3. We assume that there is no payoff for a player who deviates from the game and gets partial knowledge about the functionality. In this case, partial knowledge is considered as no knowledge or \(\perp \).

References

  1. Gordon, S.D., Hazay, C., Katz, J., Lindell, Y.: Complete fairness in secure two-party computation. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing (STOC), pp. 413–422. ACM Press (2008)

  2. Asharov, G., Canetti, R., Hazay, C.: Towards a game theoretic view of secure computation. In: Advances in Cryptology—EUROCRYPT 2011, LNCS, vol. 6632, pp. 426–445 (2011)

  3. Groce, A., Katz, J.: Fair computation with rational players. In: Advances in Cryptology—EUROCRYPT 2012, pp. 81–98. Springer, Berlin (2012)

  4. Brunner, N., Linden, N.: Bell nonlocality and Bayesian game theory. Nat. Commun. 4, 2057 (2013)

    Article  ADS  Google Scholar 

  5. Maitra, A., De, S.J., Paul, G., Pal, A.: Proposal for quantum rational secret sharing. Phys. Rev. A 92, 022305 (2015)

    Article  ADS  Google Scholar 

  6. Hazay, C., Nissim, K.: Efficient set operations in the presence of malicious adversaries. J. Cryptol. 25, 383–433 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  7. Hazay, C.: Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs. In: TCC 2015, LNCS 9015, pp. 90–120 (2015)

  8. Jarecki, S., Liu, X.: Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In: TCC 2009, LNCS 5444, pp. 577–594 (2009)

  9. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  10. Stinson, D.: Cryptography Theory and Practice, 3rd edn. Chapman & Hall/CRC, Boca Raton (2005)

    MATH  Google Scholar 

  11. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Foundations of Computer Science (FOCS) 1994, pp. 124–134. IEEE Computer Society Press (1994)

  12. Shi, R.-H., Mu, Y., Zhong, H., Zhang, S.: Quantum oblivious set-member decision protocol. Phys. Rev. A 92, 022309 (2015)

    Article  ADS  Google Scholar 

  13. Shi, R.-H., Mu, Y., Zhong, H., Cui, J., Zhang, S.: An efficient quantum scheme for private set intersection. Quant. Inf. Process. 15, 363–371 (2016)

    Article  MathSciNet  MATH  ADS  Google Scholar 

  14. Gordon, S.D., Hazay, C., Katz, J., Lindell, Y.: Complete fairness in secure two-party computation. J. ACM (2011). https://doi.org/10.1145/2049697.2049698

    MathSciNet  MATH  Google Scholar 

  15. Asharov, G., Lindell, Y.: Utility dependence in correct and fair rational secret sharing. J. Cryptol. 24, 157–202 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  16. Yang, Y.G., Sun, S.J., Xu, P., Tiang, J.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805–813 (2014)

    Article  MathSciNet  ADS  Google Scholar 

  17. Wilde, M.M.: Quantum Information Theory, p. 2. Cambridge University Press, Cambridge (2017)

    Book  Google Scholar 

  18. Serfling, R.J.: Probability inequalities for the sum in sampling without replacement. Ann. Stat. 2, 39 (1974)

    Article  MathSciNet  MATH  Google Scholar 

  19. Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802803 (1982)

    Article  MATH  Google Scholar 

  20. Dieks, D.: Communication by EPR devices. Phys. Lett. A 92(6), 271272 (1982)

    Article  Google Scholar 

  21. Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set-intersection. In: EUROCRYPT’04, LNCS 3027, pp. 1–19. Springer, Berlin (2004)

  22. Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: 5th TCC, LNCS 4948, pp. 155–175. Springer, Berlin (2008)

  23. Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient robust private set intersection. In: ANCS, LNCS 5479, pp. 125–142. Springer, Berlin (2009)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arpita Maitra.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Maitra, A. Quantum secure two-party computation for set intersection with rational players. Quantum Inf Process 17, 197 (2018). https://doi.org/10.1007/s11128-018-1968-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-018-1968-9

Keywords

Navigation