2,754 research outputs found

    Quantum Private Comparison: A Review

    Full text link
    As an important branch of quantum secure multiparty computation, quantum private comparison (QPC) has attracted more and more attention recently. In this paper, according to the quantum implementation mechanism that these protocols used, we divide these protocols into three categories: The quantum cryptography QPC, the superdense coding QPC, and the entanglement swapping QPC. And then, a more in-depth analysis on the research progress, design idea, and substantive characteristics of corresponding QPC categories is carried out, respectively. Finally, the applications of QPC and quantum secure multi-party computation issues are discussed and, in addition, three possible research mainstream directions are pointed out

    Multi-party quantum private comparison of size relationship with two third parties based on d-dimensional Bell states

    Full text link
    In this paper, we put forward a multi-party quantum private comparison (MQPC) protocol with two semi-honest third parties (TPs) by adopting d-dimensional Bell states, which can judge the size relationship of private integers from more than two users within one execution of protocol. Each TP is permitted to misbehave on her own but cannot collude with others. In the proposed MQPC protocol, TPs are only required to apply d-dimensional single-particle measurements rather than d-dimensional Bell state measurements. There are no quantum entanglement swapping and unitary operations required in the proposed MQPC protocol. The security analysis validates that the proposed MQPC protocol can resist both the outside attacks and the participant attacks. The proposed MQPC protocol is adaptive for the case that users want to compare the size relationship of their private integers under the control of two supervisors. Furthermore, the proposed MQPC protocol can be used in the strange user environment, because there are not any communication and pre-shared key between each pair of users.Comment: 15 pages, 1 figure, 1 tabl

    A novel multi-party semiquantum private comparison protocol of size relationship with d-dimensional single-particle states

    Full text link
    By using d-level single-particle states, the first multi-party semiquantum private comparison (MSQPC) protocol which can judge the size relationship of private inputs from more than two classical users within one execution of protocol is put forward. This protocol requires the help of one quantum third party (TP) and one classical TP, both of whom are allowed to misbehave on their own but cannot conspire with anyone else. Neither quantum entanglement swapping nor unitary operations are necessary for implementing this protocol. TPs are only required to perform d-dimensional single-particle measurements. The correctness analysis validates the accuracy of the compared results. The security analysis verifies that both the outside attacks and the participant attacks can be resisted.Comment: 19 pages, 2 figures, 2 table

    Semiquantum private comparison via cavity QED

    Full text link
    In this paper, we design the first semiquantum private comparison (SQPC) protocol which is realized via cavity quantum electrodynamics (QED) by making use of the evolution laws of atom. With the help of a semi-honest third party (TP), the proposed protocol can compare the equality of private inputs from two semiquantum parties who only have limited quantum capabilities. The proposed protocol uses product states as initial quantum resource and employs none of unitary operations, quantum entanglement swapping operation or delay lines. Security proof turns out that it can defeat both the external attack and the internal attack.Comment: 16 pages, 2 figures, 2 table

    Quantum Conference

    Full text link
    A notion of quantum conference is introduced in analogy with the usual notion of a conference that happens frequently in today's world. Quantum conference is defined as a multiparty secure communication task that allows each party to communicate their messages simultaneously to all other parties in a secure manner using quantum resources. Two efficient and secure protocols for quantum conference have been proposed. The security and efficiency of the proposed protocols have been analyzed critically. It is shown that the proposed protocols can be realized using a large number of entangled states and group of operators. Further, it is shown that the proposed schemes can be easily reduced to protocol for multiparty quantum key distribution and some earlier proposed schemes of quantum conference, where the notion of quantum conference was different.Comment: 12 pages, 1 figur
    • …
    corecore