As a branch of quantum secure multiparty computation,quantum private comparison is applied frequently in many fields,such as secret elections,private voting,and identification.A quantum private comparison protocol wit...As a branch of quantum secure multiparty computation,quantum private comparison is applied frequently in many fields,such as secret elections,private voting,and identification.A quantum private comparison protocol with higher efficiency and easier implementation is proposed in this paper.The private secrets are encoded as single polarized photons and then encrypted with a homomorphic rotational encryption method.Relying on this method and the circular transmission mode,we implement the multiplexing of photons,raising the efficiency of our protocol to 100%.Our protocol is easy to realize since only single photons,unitary operation,and single-particle measurement are introduced.Meanwhile,the analysis shows that our protocol is also correct and secure.展开更多
We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to...We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to set a flag to judge the comparing result,which improves the qubit efficiency and the maximum quantity of the participants’secret messages.Besides,our protocol can judge the size of the secret messages,not only equality.Furthermore,the quantum walks particle is disentangled in the initial state.It only requires a quantum walks operator to move,making our proposed protocol easy to implement and reducing the quantum resources.Through security analysis,we prove that our protocol can withstand well-known attacks and brute-force attacks.Analyses also reveal that our protocol is correct and practical.展开更多
Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to rema...Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed.展开更多
By using swap test,a quantum private comparison(QPC) protocol of arbitrary single qubit states with a semi-honest third party is proposed.The semi-honest third party(TP) is required to help two participants perform th...By using swap test,a quantum private comparison(QPC) protocol of arbitrary single qubit states with a semi-honest third party is proposed.The semi-honest third party(TP) is required to help two participants perform the comparison.She can record intermediate results and do some calculations in the whole process of the protocol execution,but she cannot conspire with any of participants.In the process of comparison,the TP cannot get two participants’ private information except the comparison results.According to the security analysis,the proposed protocol can resist both outsider attacks and participants’ attacks.Compared with the existing QPC protocols,the proposed one does not require any entanglement swapping technology,but it can compare two participants’ qubits by performing swap test,which is easier to implement with current technology.Meanwhile,the proposed protocol can compare secret integers.It encodes secret integers into the amplitude of quantum state rather than transfer them as binary representations,and the encoded quantum state is compared by performing the swap test.Additionally,the proposed QPC protocol is extended to the QPC of arbitrary single qubit states by using multi-qubit swap test.展开更多
In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the ...In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the objective.This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom(DOF),which could have 64 combinations.The TP can decide which combination to use based on the shared key information provided from a quantum key distribution(QKD)protocol.By doing so,the security of the protocol can be improved further.Decoy photon technology is also used as another means of security and checks if the transmission in the quantum channel is secure or not before sending the quantum carrier.The proposed protocol is proved to be able to fend off various kinds of eavesdropping attacks.In addition,the new QPC protocol also can compare secret inputs securely and efficiently.展开更多
Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is...Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is fault-tolerant and could be performed in a non-ideal scenario. However, there ex- ists a fatal loophole in their private comparison scheme under a special attack, namely the twice- Hadamard-CNOT attack. Specifically, a malicious party may intercept the other party's particles and execute Hadamard operations on the intercepted particles as well as on his or her own particles. Then, the malicious party could sequentially perform a controlled-NOT (CNOT) operation between intercepted particles and the auxiliary particles, as well as between his or her own particles and the auxiliary particles prepared in advance. By measuring the auxiliary particles, the secret input will be revealed to the malicious party without being detected. For resisting this special attack, a feasible improved scheme is proposed by introducing a permutation operator before the third party (TP) sends the particle sequences to each participant.展开更多
Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant...Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant can steal another’s secret data without being detected through an active attack means. In this paper, we show that Wu et al’s active attack is also effective for several other existing protocols, including the ones proposed by Ji et al and Zha et al(2016 Commun. Theor. Phys. 65 711;2018 Int. J. Theor. Phys. 57 3874). In addition,we propose what a passive attack means, which is different from Wu et al’s active attack in that the malicious participant can easily steal another’s secret data only by using his own secret data after finishing the protocol, instead of stealing the data by forging identities when executing the protocol. Furthermore, we find that several other existing quantum private comparison protocols also have such an information leakage problem. In response to the problem, we propose a simple solution, which is more efficient than the ones proposed by Wu et al, because it does not consume additional classical and quantum resources.展开更多
基金supported by the National Key Research and Development Program of China(Grant No.2020YFB1805405)the 111 Project(Grant No.B21049)+1 种基金the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2019BDKFJJ014)the Fundamental Research Funds for the Central Universities(Grant No.2020RC38)。
文摘As a branch of quantum secure multiparty computation,quantum private comparison is applied frequently in many fields,such as secret elections,private voting,and identification.A quantum private comparison protocol with higher efficiency and easier implementation is proposed in this paper.The private secrets are encoded as single polarized photons and then encrypted with a homomorphic rotational encryption method.Relying on this method and the circular transmission mode,we implement the multiplexing of photons,raising the efficiency of our protocol to 100%.Our protocol is easy to realize since only single photons,unitary operation,and single-particle measurement are introduced.Meanwhile,the analysis shows that our protocol is also correct and secure.
基金Project supported by the National Key R&D Program of China(Grant No.2020YFB1805405)the 111 Project(Grant No.B21049)+1 种基金the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2019BDKFJJ014)the Fundamental Research Funds for the Central Universities,China(Grant No.2020RC38)。
文摘We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to set a flag to judge the comparing result,which improves the qubit efficiency and the maximum quantity of the participants’secret messages.Besides,our protocol can judge the size of the secret messages,not only equality.Furthermore,the quantum walks particle is disentangled in the initial state.It only requires a quantum walks operator to move,making our proposed protocol easy to implement and reducing the quantum resources.Through security analysis,we prove that our protocol can withstand well-known attacks and brute-force attacks.Analyses also reveal that our protocol is correct and practical.
基金supported by the National Natural Science Foundation of China(Grant No.61572086)Major Project of Education Department in Sichuan(Grant No.18ZA0109)Web Culture Project Sponsored by the Humanities and Social Science Research Base of the Sichuan Provincial Education Department(Grant No.WLWH18-22).
文摘Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed.
基金Project supported by the National Natural Science Foundation of China(Grant No.62076042)the Key Research and Development Project of Sichuan Province,China(Grant Nos.2020YFG0307 and 2021YFSY0012)+2 种基金the Key Research and Development Project of Chengdu Municipality,China(Grant No.2019-YF05-02028-GX)the Innovation Team of Quantum Security Communication of Sichuan Province,China(Grant No.17TD0009)the Academic and Technical Leaders Training Funding Support Projects of Sichuan Province,China(Grant No.2016120080102643)。
文摘By using swap test,a quantum private comparison(QPC) protocol of arbitrary single qubit states with a semi-honest third party is proposed.The semi-honest third party(TP) is required to help two participants perform the comparison.She can record intermediate results and do some calculations in the whole process of the protocol execution,but she cannot conspire with any of participants.In the process of comparison,the TP cannot get two participants’ private information except the comparison results.According to the security analysis,the proposed protocol can resist both outsider attacks and participants’ attacks.Compared with the existing QPC protocols,the proposed one does not require any entanglement swapping technology,but it can compare two participants’ qubits by performing swap test,which is easier to implement with current technology.Meanwhile,the proposed protocol can compare secret integers.It encodes secret integers into the amplitude of quantum state rather than transfer them as binary representations,and the encoded quantum state is compared by performing the swap test.Additionally,the proposed QPC protocol is extended to the QPC of arbitrary single qubit states by using multi-qubit swap test.
文摘In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the objective.This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom(DOF),which could have 64 combinations.The TP can decide which combination to use based on the shared key information provided from a quantum key distribution(QKD)protocol.By doing so,the security of the protocol can be improved further.Decoy photon technology is also used as another means of security and checks if the transmission in the quantum channel is secure or not before sending the quantum carrier.The proposed protocol is proved to be able to fend off various kinds of eavesdropping attacks.In addition,the new QPC protocol also can compare secret inputs securely and efficiently.
基金Acknowledgements This work was supported by the National Natural Science Foundation of China (Grant Nos. 61103235, 61373131, and 61373016), the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD), the Natural Science Foundation of Jiangsu Province under Grant No. BK20140651, and the Scientific Research Innovation Project for College Graduates of Jiangsu Province (Grant No. KYLX_0855).
文摘Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is fault-tolerant and could be performed in a non-ideal scenario. However, there ex- ists a fatal loophole in their private comparison scheme under a special attack, namely the twice- Hadamard-CNOT attack. Specifically, a malicious party may intercept the other party's particles and execute Hadamard operations on the intercepted particles as well as on his or her own particles. Then, the malicious party could sequentially perform a controlled-NOT (CNOT) operation between intercepted particles and the auxiliary particles, as well as between his or her own particles and the auxiliary particles prepared in advance. By measuring the auxiliary particles, the secret input will be revealed to the malicious party without being detected. For resisting this special attack, a feasible improved scheme is proposed by introducing a permutation operator before the third party (TP) sends the particle sequences to each participant.
基金supported by the State Key Program of National Natural Science Foundation of China under grant 61332019the Major State Basic Research Development Program of China(973 Program)under grant 2014CB340601+1 种基金the National Science Foundation of China under grant 61202386 and grant 61402339the National Cryptography Development Fund of China under grant MMJJ201701304。
文摘Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant can steal another’s secret data without being detected through an active attack means. In this paper, we show that Wu et al’s active attack is also effective for several other existing protocols, including the ones proposed by Ji et al and Zha et al(2016 Commun. Theor. Phys. 65 711;2018 Int. J. Theor. Phys. 57 3874). In addition,we propose what a passive attack means, which is different from Wu et al’s active attack in that the malicious participant can easily steal another’s secret data only by using his own secret data after finishing the protocol, instead of stealing the data by forging identities when executing the protocol. Furthermore, we find that several other existing quantum private comparison protocols also have such an information leakage problem. In response to the problem, we propose a simple solution, which is more efficient than the ones proposed by Wu et al, because it does not consume additional classical and quantum resources.