A survey on cryptographic techniques for protecting big data security: present and forthcoming

S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …

Quantum communication technology for future ICT-review

SK Singh, AE Azzaoui, MM Salim… - Journal of Information …, 2020 - koreascience.kr
In the last few years, quantum communication technology and services have been
developing in various advanced applications to secure the sharing of information from one …

Secure and efficient two-party quantum scalar product protocol with application to privacy-preserving matrix multiplication

WJ Liu, ZX Li - IEEE Transactions on Circuits and Systems I …, 2023 - ieeexplore.ieee.org
Secure two-party scalar product (S2SP) is a promising research area within secure
multiparty computation (SMC), which can solve a range of SMC problems, such as intrusion …

An optimized quantum minimum searching algorithm with sure-success probability and its experiment simulation with Cirq

W Liu, Q Wu, J Shen, J Zhao, M Zidan… - Journal of Ambient …, 2021 - Springer
Finding a minimum is an essential part of mathematical models, and it plays an important
role in some optimization problems. Durr and Hoyer proposed a quantum searching …

Secure multi-party convex hull protocol based on quantum homomorphic encryption

C Wang, RG Zhou - Quantum Information Processing, 2022 - Springer
Secure multi-party computational geometry (SMCG) is a branch of secure multi-party
computing (SMC). The protocol is designed for secure multi-party convex hull computation in …

Quantum‐Based Feature Selection for Multiclassification Problem in Complex Systems with Edge Computing

W Liu, J Chen, Y Wang, P Gao, Z Lei, X Ma - Complexity, 2020 - Wiley Online Library
The complex systems with edge computing require a huge amount of multifeature data to
extract appropriate insights for their decision making, so it is important to find a feasible …

Dynamic phase signal control method for unstable asymmetric traffic flow at intersections

X Jiang, Y Jin, Y Ma - Journal of Advanced Transportation, 2021 - Wiley Online Library
This paper addresses the limitations that the phases proposed in variable phase
sequencing studies for stochastic traffic flow are all predetermined and that the variable …

[PDF][PDF] Device-independent quantum key distribution protocol based on hyper-entanglement

Y Chang, SB Zhang, LL Yan, XY Li… - Computers Mater …, 2020 - cdn.techscience.cn
The secure key rate of quantum key distribution (QKD) is greatly reduced because of the
untrusted devices. In this paper, to raise the secure key rate of QKD, a device-independent …

[PDF][PDF] Privacy-Preserving Decision Protocols Based on Quantum Oblivious Key Distribution.

K Zhang, C Ma, Z Sun, X Zhang… - … , Materials & Continua, 2020 - cdn.techscience.cn
Oblivious key transfer (OKT) is a fundamental problem in the field of secure multi-party
computation. It makes the provider send a secret key sequence to the user obliviously, ie …

Secure two-party computation based on blind quantum computation

Y Zhu, Q Li, C Liu, Z Sun, Y Peng, D Shen - International Journal of …, 2020 - Springer
Two-party quantum computation (2PQC) allows two participants Alice and Bob to securely
compute a given unitary function on their quantum inputs without leaking privacy. Existing …