Evaluating the Security of a “Blind Quantum Algorithm-centered Medical Privacy Data Sharing Model” Using the DHGF Method

Autores

  • Lijuan Wu Changzhi Medical College
  • Jin Wei Changzhi Medical College
  • Hui Jiang Changzhi Medical College

DOI:

https://doi.org/10.4025/actascitechnol.v47i1.71128

Palavras-chave:

Blind quantum, Sharing Model, Privacy data, security, DHGF

Resumo

This research addresses the academic challenge of lacking security verification methods for quantum computing models. It innovatively introduces the DHGF comprehensive evaluation method into the quantum security field, successfully overcoming the adaptability bottleneck of traditional evaluation methods in quantum scenarios. The research proposes a cross-verification method between a classical algorithm-based evaluation system and a quantum security model, constructing a methodological framework for cross-validation between classical algorithms and quantum technology. This enables dynamic evaluation of blind quantum computing protocols using the DHGF comprehensive evaluation method. Taking a "Blind Quantum Algorithm-centered Medical Privacy Data Sharing Model" as an example, the research demonstrates the entire process of evaluating the security of a privacy data model built on quantum algorithms and technology using the classical DHGF comprehensive evaluation method. The evaluation process integrates the Delphi method, Analytic Hierarchy Process, Grey System Theory, and Fuzzy Comprehensive Evaluation. The Delphi method is used to determine the evaluation indicator set based on expert opinions; the Analytic Hierarchy Process is employed to determine the weights of the evaluation indicators; and then the evaluation is conducted using the Grey System Theory and Fuzzy Comprehensive Evaluation. This research leverages mature and reliable classical algorithms to validate the security of a model built using quantum algorithms and technologies as its core. This approach establishes a cross-validation system integrating classical and quantum techniques, resulting in a dynamically scalable paradigm for quantum security assessment. This represents a bold extension of classical algorithms into the quantum domain. The comprehensive evaluation score Z from the research results demonstrates the algorithm's ability to accurately and quantitatively describe the dynamic security of the model, providing a novel solution for security analysis of complex and uncertain models and holding significant practical value.

Downloads

Não há dados estatísticos.

Referências

Abhijith, J., Adedoyin, A., Ambrosiano, J., Anisimov, P., Casper, W., Chennupati, G., Lokhov, A. Y. (2022). Quantum Algorithm Implementations for Beginners. ACM Transactions on Quantum Computing, 3 (4), 1-92. https://doi.org/10.1145/3517340

Ashley, M. (2016). Quantum algorithms: An overview. npj Quantum Information, 2 (1). https://doi.org/10.1038/npjqi.2015.23

Batool, K., Zhao, Z.-Y., Nureen, N., & Irfan, M. (2023). Assessing and prioritizing biogas barriers to alleviate energy poverty in Pakistan: An integrated AHP and G-TOPSIS model. Environmental Science and Pollution Research, 30 (41), 94669-94693. https://doi.org/10.1007/s11356-023-28767-4

Chong, T., Yi, S., & Heng, C. (2017). Application of set pair analysis method on occupational hazard of coal mining. Safety Science, 92, 10-16. https://doi.org/10.1016/j.ssci.2016.09.005

Chuang, I. L., Vandersypen, L. M. K., Zhou, X., Leung, D. W., & Lloyd, S. (1998). Experimental realization of a quantum algorithm. Nature (London), 393 (6681), 143-146. https://doi.org/10.1038/30181

Fan, X., Tian, S., Lu, Z., & Cao, Y. (2022). Quality evaluation of entrepreneurship education in higher education based on CIPP model and AHP-FCE methods. Frontiers in Psychology, 13. https://doi.org/10.3389/fpsyg.2022.973511

Gao, T., & Bernstein, P. (2025). Physical Appearance Design Evaluation of Community Emotional Healing Installations Based on Analytic Hierarchy Process–Fuzzy Comprehensive Evaluation Method. Buildings, 15 (5), 773. https://doi.org/10.3390/buildings15050773

Ghimire, L. P., & Kim, Y. (2018). An analysis on barriers to renewable energy development in the context of Nepal using AHP. Renewable Energy, 129, 446-456. https://doi.org/10.1016/j.renene.2018.06.011

Ghosh, N., & Banerjee, I. (2021). IoT-based freezing of gait detection using grey relational analysis. Internet of Things, 13, 100068. https://doi.org/10.1016/j.iot.2019.100068

Gong, C., Zhu, H., Gani, A., & Qi, H. (2023). QGA–QGCNN: A model of quantum gate circuit neural network optimized by quantum genetic algorithm. The Journal of Supercomputing, 79 (12), 13421-13441. https://doi.org/10.1007/s11227-023-05158-7

Harsha, G. Anish, T. S., Rajaneesh, A., Prasad, Megha K., Mathew, R., Mammen, P. C., Ajin, R. S., & Kuriakose, S. L. (2022). Dengue risk zone mapping of Thiruvananthapuram district, India: A comparison of the AHP and F-AHP methods. GeoJournal, 88 (3), 2449-2470. https://doi.org/10.1007/s10708-022-10757-7

Hou, J., Gao, T., Yang, Y., Wang, X., Yang, Y., & Meng, S. (2024). Battery inconsistency evaluation based on hierarchical weight fusion and fuzzy comprehensive evaluation method. Journal of Energy Storage, 84, 110878. https://doi.org/10.1016/j.est.2024.110878

Hu, Z., Xia, R., & Kais, S. (2020). A quantum algorithm for evolving open quantum dynamics on quantum computing devices. Scientific Reports, 10 (1). https://doi.org/10.1038/s41598-020-60321-x

Im, K. H., Kim, W., & Hong, S. J. (2021). A study on single pilot resource management using integral fuzzy analytical hierarchy process. Safety, 7 (4), 84. https://doi.org/10.3390/safety7040084

Kong, F., Geng, J., Kang, Y., Jin, X., Hao, S., & Wang, M. (2024, May 17-19). Evaluation of main responsibility of safety production in power engineering enterprises based on DHGF [Conference paper]. 2024 4th International Conference on Electrical Power and Energy Technology (ICEPET), Beijing, China. https://doi.org/10.1109/icepet61938.2024.10627512

Lanyon, B. P., Weinhold, T. J., Langford, N. K., Barbieri, M., James, D. F. V., Gilchrist, A., & White, A. G. (2007). Experimental demonstration of a compiled version of Shor’s algorithm with quantum entanglement. Physical Review Letters, 99 (25). https://doi.org/10.1103/PhysRevLett.99.250505

Makhmutov, R. (2021). The Delphi method at a glance. Pflege, 34 (4), 221-221. https://doi.org/10.1024/1012-5302/a000812

Montanaro, A. (2016). Quantum algorithms: An overview. npj Quantum Information, 2 (1). https://doi.org/10.1038/npjqi.2015.23

Neto, D. D. H., Figueiredo, M., Moraes, H. B., Campos Filho, L. C. P., & Nelio. (2024). Feasibility analysis of implementing a logistics integration center in amazon region using AHP. Acta Scientiarum, Technology, 47 (1), e66976. https://doi.org/10.4025/actascitechnol.v47i1.66976

Nakahara, M., & Ohmi, T. (2008). Quantum computing: From linear algebra to physical realizations. CRC Press.

Nielsen, M. A., & Chuang, I. L. (2010). Quantum computation and quantum information (10th anniversary ed.). Cambridge University Press.

Qu, Z., Wang, K., & Zheng, M. (2021). Secure quantum fog computing model based on blind quantum computation. Journal of Ambient Intelligence and Humanized Computing, 13 (8), 3807-3817. https://doi.org/10.1007/s12652-021-03402-7

Saini, V., Li, J., Yang, Y., & Li, J. (2022). Evaluating environmental quality in Rujigou coalfield, China, using analytic hierarchy process. Environmental Science and Pollution Research, 30 (1), 1841-1853. https://doi.org/10.1007/s11356-022-22340-1

Shekar, P. R., & Mathew, A. (2023). Integrated assessment of groundwater potential zones and artificial recharge sites using GIS and Fuzzy-AHP: A case study in Peddavagu watershed, India. Environmental Monitoring and Assessment, 195 (7). https://doi.org/10.1007/s10661-023-11474-5

Tan, C., Lu, Y., & Zhang, X. (2016). Life extension and repair decision-making of ageing offshore platforms based on DHGF method. Ocean Engineering, 117, 238-245. https://doi.org/10.1016/j.oceaneng.2016.03.048

Vandersypen, L. M. K., Steffen, M., Breyta, G., Yannoni, C. S., Sherwood, M. H., & Chuang, I. L. (2001). Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance. Nature, 414, 883-887.

Wei, J., Jiang, H., & Wu, L. (2023). Design of medical privacy data sharing model based on blind quantum computing. Computer Era, (10), 32-34, 39. https://doi.org/10.16644/j.cnki.cn33-1094/tp.2023.10.007

Xie, X. M., Duan, L. Z., Qiu, T. R., & Kang, X. L. (2021). Search Space Self-adaptive Quantum Search Algorithm. Xiaoxing Weixing Jisuanji Xitong = Journal of Chinese Computer Systems, 42 (4), 732.

Xin, J., Wang, C., Tang, Q., Zhang, R., & Yang, T. (2023). An evaluation framework for construction quality of bridge monitoring system using the DHGF method. Sensors, 23 (16), 7139. https://doi.org/10.3390/s23167139

Xu, W., Huang, Y., Song, S., Cao, G., Yu, M., Cheng, H., Zhu, Z., Wang, S., Xu, L., & Li, Q. (2022). A bran-new performance evaluation model of coal mill based on GA-IFCM-IDHGF method. Measurement: Journal of the International Measurement Confederation, 195, 110954. https://doi.org/10.1016/j.measurement.2022.110954

Zhang, W. Q., & Xi, Z. L. (2020). Application of Delphi method in screening of indexes for measuring soil pollution value evaluation. Environmental Science and Pollution Research, 28 (6), 6561-6571. https://doi.org/10.1007/s11356-020-10919-5

Zhu, Y. (2022). Research on adaptive combined wind speed prediction for each season based on improved gray relational analysis. Environmental Science and Pollution Research, 30 (5), 12317-12347. https://doi.org/10.1007/s11356-022-22957-2

Downloads

Publicado

2025-08-29

Como Citar

Wu, L., Wei, J., & Jiang, H. (2025). Evaluating the Security of a “Blind Quantum Algorithm-centered Medical Privacy Data Sharing Model” Using the DHGF Method. Acta Scientiarum. Technology, 47(1), e71128. https://doi.org/10.4025/actascitechnol.v47i1.71128

Edição

Seção

Ciência da Computação

 

0.8
2019CiteScore
 
 
36th percentile
Powered by  Scopus

 

 

0.8
2019CiteScore
 
 
36th percentile
Powered by  Scopus