Protocol for secure quantum machine learning at a distant place.
Jeongho BangSeung-Woo LeeHyunseok JeongPublished in: Quantum Inf. Process. (2015)
Keyphrases
- machine learning
- cryptographic protocols
- covert channel
- authentication protocol
- security protocols
- secure routing
- scalar product
- key distribution
- key exchange protocol
- security analysis
- lightweight
- key agreement protocol
- vertically partitioned data
- group communication
- privacy preserving
- machine learning methods
- secure multiparty computation
- password authentication
- multi party
- machine learning algorithms
- secure multi party
- key management
- electronic voting
- key establishment
- security requirements
- mutual authentication
- security model
- cryptographic algorithms
- provably secure
- diffie hellman
- quantum computing
- rfid systems
- feature selection
- key agreement
- quantum computation
- homomorphic encryption
- natural language processing
- decision trees
- learning algorithm
- data mining
- mobile agent system
- security properties
- user authentication
- security issues
- blind signature
- trusted third party
- key exchange
- authentication scheme
- tcp ip