337 research outputs found
Quantum Private Comparison: A Review
As an important branch of quantum secure multiparty computation, quantum
private comparison (QPC) has attracted more and more attention recently. In
this paper, according to the quantum implementation mechanism that these
protocols used, we divide these protocols into three categories: The quantum
cryptography QPC, the superdense coding QPC, and the entanglement swapping QPC.
And then, a more in-depth analysis on the research progress, design idea, and
substantive characteristics of corresponding QPC categories is carried out,
respectively. Finally, the applications of QPC and quantum secure multi-party
computation issues are discussed and, in addition, three possible research
mainstream directions are pointed out
Multi-party quantum private comparison based on entanglement swapping of Bell entangled states within d-level quantum system
In this paper, a multi-party quantum private comparison (MQPC) scheme is
suggested based on entanglement swapping of Bell entangled states within
d-level quantum system, which can accomplish the equality comparison of secret
binary sequences from n users via one execution of scheme. Detailed security
analysis shows that both the outside attack and the participant attack are
ineffective. The suggested scheme needn't establish a private key among n users
beforehand through the quantum key distribution (QKD) method to encrypt the
secret binary sequences. Compared with previous MQPC scheme based on d-level
Cat states and d-level Bell entangled states, the suggested scheme has distinct
advantages on quantum resource, quantum measurement of third party (TP) and
qubit efficiency.Comment: 8 pages, 1 figure, 1 tabl
Multi-party quantum private comparison of size relationship with two third parties based on d-dimensional Bell states
In this paper, we put forward a multi-party quantum private comparison (MQPC)
protocol with two semi-honest third parties (TPs) by adopting d-dimensional
Bell states, which can judge the size relationship of private integers from
more than two users within one execution of protocol. Each TP is permitted to
misbehave on her own but cannot collude with others. In the proposed MQPC
protocol, TPs are only required to apply d-dimensional single-particle
measurements rather than d-dimensional Bell state measurements. There are no
quantum entanglement swapping and unitary operations required in the proposed
MQPC protocol. The security analysis validates that the proposed MQPC protocol
can resist both the outside attacks and the participant attacks. The proposed
MQPC protocol is adaptive for the case that users want to compare the size
relationship of their private integers under the control of two supervisors.
Furthermore, the proposed MQPC protocol can be used in the strange user
environment, because there are not any communication and pre-shared key between
each pair of users.Comment: 15 pages, 1 figure, 1 tabl
An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States
Two quantum key agreement protocols using Bell states and Bell measurement
were recently proposed by Shukla et al.(Quantum Inf. Process. 13(11),
2391-2405, 2014). However, Zhu et al. pointed out that there are some security
flaws and proposed an improved version (Quantum Inf. Process. 14(11),
4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still
exists some security problems, and its efficiency is not high enough. For
solving these problems, we utilize four Pauli operations {I, Z, X, Y } to
encode two bits instead of the original two operations {I,X} to encode one bit,
and then propose an efficient and secure arbitrary N-party quantum key
agreement protocol. In the protocol, the channel checking with decoy single
photons is introduced to avoid the eavesdropper's flip attack, and a
post-measurement mechanism is used to prevent against the collusion attack. The
security analysis shows the present protocol can guarantee the correctness,
security, privacy and fairness of quantum key agreement.Comment: 13 pages, 5 figure
- …