Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments.

Sensors (Basel)

School of Information and Electrical Engineering, Hangzhou City University, Hangzhou 310015, China.

Published: November 2024

With the rapid development of IoT technology, securely querying sensitive data collected by devices within a specific range has become a focal concern for users. This paper proposes a privacy-preserving range query scheme based on quantum encryption, along with circuit simulations and performance analysis. We first propose a quantum private set similarity comparison protocol and then construct a privacy-preserving range query scheme for IoT environments. By leveraging the properties of quantum homomorphic encryption, the proposed scheme enables encrypted data comparisons, effectively preventing the leakage of sensitive data. The correctness and security analysis demonstrates that the designed protocol guarantees users receive the correct query results while resisting both external and internal attacks. Moreover, the protocol requires only simple quantum states and operations, and does not require users to bear the cost of complex quantum resources, making it feasible under current technological conditions.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11598007PMC
http://dx.doi.org/10.3390/s24227405DOI Listing

Publication Analysis

Top Keywords

privacy-preserving range
12
range query
12
encrypted data
8
iot environments
8
sensitive data
8
query scheme
8
quantum
6
quantum privacy-preserving
4
range
4
query
4

Similar Publications

The vast potential of medical big data to enhance healthcare outcomes remains underutilized due to privacy concerns, which restrict cross-center data sharing and the construction of diverse, large-scale datasets. To address this challenge, we developed a deep generative model aimed at synthesizing medical data to overcome data sharing barriers, with a focus on breast ultrasound (US) image synthesis. Specifically, we introduce CoLDiT, a conditional latent diffusion model with a transformer backbone, to generate US images of breast lesions across various Breast Imaging Reporting and Data System (BI-RADS) categories.

View Article and Find Full Text PDF

Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments.

Sensors (Basel)

November 2024

School of Information and Electrical Engineering, Hangzhou City University, Hangzhou 310015, China.

With the rapid development of IoT technology, securely querying sensitive data collected by devices within a specific range has become a focal concern for users. This paper proposes a privacy-preserving range query scheme based on quantum encryption, along with circuit simulations and performance analysis. We first propose a quantum private set similarity comparison protocol and then construct a privacy-preserving range query scheme for IoT environments.

View Article and Find Full Text PDF

Privacy-Preserving Detection of Tampered Radio-Frequency Transmissions Utilizing Federated Learning in LoRa Networks.

Sensors (Basel)

November 2024

Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, P.O. Box 51178, Riyadh 11543, Saudi Arabia.

LoRa networks, widely adopted for low-power, long-range communication in IoT applications, face critical security concerns as radio-frequency transmissions are increasingly vulnerable to tampering. This paper addresses the dual challenges of privacy-preserving detection of tampered transmissions and the identification of unknown attacks in LoRa-based IoT networks. Leveraging Federated Learning (FL), our approach enables the detection of tampered RF transmissions while safeguarding sensitive IoT data, as FL allows model training on distributed devices without sharing raw data.

View Article and Find Full Text PDF

Human posture recognition has a wide range of applicability in the detective and preventive healthcare industry. Recognizing posture through frequency-modulated continuous wave (FMCW) radar poses a significant challenge as the human subject is static. Unlike existing radar-based studies, this study proposes a novel framework to extract the postures of two humans in close proximity using FMCW radar point cloud.

View Article and Find Full Text PDF

Private detection of relatives in forensic genomics using homomorphic encryption.

BMC Med Genomics

November 2024

Intel Labs, Intel Corporation, Santa Clara, California, USA.

Background: Forensic analysis heavily relies on DNA analysis techniques, notably autosomal Single Nucleotide Polymorphisms (SNPs), to expedite the identification of unknown suspects through genomic database searches. However, the uniqueness of an individual's genome sequence designates it as Personal Identifiable Information (PII), subjecting it to stringent privacy regulations that can impede data access and analysis, as well as restrict the parties allowed to handle the data. Homomorphic Encryption (HE) emerges as a promising solution, enabling the execution of complex functions on encrypted data without the need for decryption.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!