2,754 research outputs found
Quantum Private Comparison: A Review
As an important branch of quantum secure multiparty computation, quantum
private comparison (QPC) has attracted more and more attention recently. In
this paper, according to the quantum implementation mechanism that these
protocols used, we divide these protocols into three categories: The quantum
cryptography QPC, the superdense coding QPC, and the entanglement swapping QPC.
And then, a more in-depth analysis on the research progress, design idea, and
substantive characteristics of corresponding QPC categories is carried out,
respectively. Finally, the applications of QPC and quantum secure multi-party
computation issues are discussed and, in addition, three possible research
mainstream directions are pointed out
Multi-party quantum private comparison of size relationship with two third parties based on d-dimensional Bell states
In this paper, we put forward a multi-party quantum private comparison (MQPC)
protocol with two semi-honest third parties (TPs) by adopting d-dimensional
Bell states, which can judge the size relationship of private integers from
more than two users within one execution of protocol. Each TP is permitted to
misbehave on her own but cannot collude with others. In the proposed MQPC
protocol, TPs are only required to apply d-dimensional single-particle
measurements rather than d-dimensional Bell state measurements. There are no
quantum entanglement swapping and unitary operations required in the proposed
MQPC protocol. The security analysis validates that the proposed MQPC protocol
can resist both the outside attacks and the participant attacks. The proposed
MQPC protocol is adaptive for the case that users want to compare the size
relationship of their private integers under the control of two supervisors.
Furthermore, the proposed MQPC protocol can be used in the strange user
environment, because there are not any communication and pre-shared key between
each pair of users.Comment: 15 pages, 1 figure, 1 tabl
A novel multi-party semiquantum private comparison protocol of size relationship with d-dimensional single-particle states
By using d-level single-particle states, the first multi-party semiquantum
private comparison (MSQPC) protocol which can judge the size relationship of
private inputs from more than two classical users within one execution of
protocol is put forward. This protocol requires the help of one quantum third
party (TP) and one classical TP, both of whom are allowed to misbehave on their
own but cannot conspire with anyone else. Neither quantum entanglement swapping
nor unitary operations are necessary for implementing this protocol. TPs are
only required to perform d-dimensional single-particle measurements. The
correctness analysis validates the accuracy of the compared results. The
security analysis verifies that both the outside attacks and the participant
attacks can be resisted.Comment: 19 pages, 2 figures, 2 table
Semiquantum private comparison via cavity QED
In this paper, we design the first semiquantum private comparison (SQPC)
protocol which is realized via cavity quantum electrodynamics (QED) by making
use of the evolution laws of atom. With the help of a semi-honest third party
(TP), the proposed protocol can compare the equality of private inputs from two
semiquantum parties who only have limited quantum capabilities. The proposed
protocol uses product states as initial quantum resource and employs none of
unitary operations, quantum entanglement swapping operation or delay lines.
Security proof turns out that it can defeat both the external attack and the
internal attack.Comment: 16 pages, 2 figures, 2 table
Quantum Conference
A notion of quantum conference is introduced in analogy with the usual notion
of a conference that happens frequently in today's world. Quantum conference is
defined as a multiparty secure communication task that allows each party to
communicate their messages simultaneously to all other parties in a secure
manner using quantum resources. Two efficient and secure protocols for quantum
conference have been proposed. The security and efficiency of the proposed
protocols have been analyzed critically. It is shown that the proposed
protocols can be realized using a large number of entangled states and group of
operators. Further, it is shown that the proposed schemes can be easily reduced
to protocol for multiparty quantum key distribution and some earlier proposed
schemes of quantum conference, where the notion of quantum conference was
different.Comment: 12 pages, 1 figur
- …