期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Efficient quantum private comparison protocol utilizing single photons and rotational encryption 被引量:1
1
作者 寇天翊 车碧琛 +3 位作者 窦钊 陈秀波 赖裕平 李剑 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第6期221-227,共7页
As a branch of quantum secure multiparty computation,quantum private comparison is applied frequently in many fields,such as secret elections,private voting,and identification.A quantum private comparison protocol wit... As a branch of quantum secure multiparty computation,quantum private comparison is applied frequently in many fields,such as secret elections,private voting,and identification.A quantum private comparison protocol with higher efficiency and easier implementation is proposed in this paper.The private secrets are encoded as single polarized photons and then encrypted with a homomorphic rotational encryption method.Relying on this method and the circular transmission mode,we implement the multiplexing of photons,raising the efficiency of our protocol to 100%.Our protocol is easy to realize since only single photons,unitary operation,and single-particle measurement are introduced.Meanwhile,the analysis shows that our protocol is also correct and secure. 展开更多
关键词 quantum private comparison rotational encryption polarized single photons EFFICIENCY
下载PDF
Efficient quantum private comparison protocol based on one direction discrete quantum walks on the circle 被引量:1
2
作者 王莒杰 窦钊 +2 位作者 陈秀波 赖裕平 李剑 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第5期150-156,共7页
We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to... We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to set a flag to judge the comparing result,which improves the qubit efficiency and the maximum quantity of the participants’secret messages.Besides,our protocol can judge the size of the secret messages,not only equality.Furthermore,the quantum walks particle is disentangled in the initial state.It only requires a quantum walks operator to move,making our proposed protocol easy to implement and reducing the quantum resources.Through security analysis,we prove that our protocol can withstand well-known attacks and brute-force attacks.Analyses also reveal that our protocol is correct and practical. 展开更多
关键词 quantum private comparison protocol one direction quantum walks EFFICIENCY brute-force attack
下载PDF
Measure-Resend Semi-Quantum Private Comparison Scheme Using GHZ Class States 被引量:1
3
作者 Lili Yan Yan Chang +3 位作者 Shibin Zhang Qirun Wang Zhiwei Sheng Yuhua Sun 《Computers, Materials & Continua》 SCIE EI 2019年第8期877-887,共11页
Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to rema... Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed. 展开更多
关键词 quantum private comparison semi-quantum protocol semi-honest third party GHZ class states
下载PDF
Quantum private comparison of arbitrary single qubit states based on swap test
4
作者 黄曦 昌燕 +2 位作者 程稳 侯敏 张仕斌 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第4期123-132,共10页
By using swap test,a quantum private comparison(QPC) protocol of arbitrary single qubit states with a semi-honest third party is proposed.The semi-honest third party(TP) is required to help two participants perform th... By using swap test,a quantum private comparison(QPC) protocol of arbitrary single qubit states with a semi-honest third party is proposed.The semi-honest third party(TP) is required to help two participants perform the comparison.She can record intermediate results and do some calculations in the whole process of the protocol execution,but she cannot conspire with any of participants.In the process of comparison,the TP cannot get two participants’ private information except the comparison results.According to the security analysis,the proposed protocol can resist both outsider attacks and participants’ attacks.Compared with the existing QPC protocols,the proposed one does not require any entanglement swapping technology,but it can compare two participants’ qubits by performing swap test,which is easier to implement with current technology.Meanwhile,the proposed protocol can compare secret integers.It encodes secret integers into the amplitude of quantum state rather than transfer them as binary representations,and the encoded quantum state is compared by performing the swap test.Additionally,the proposed QPC protocol is extended to the QPC of arbitrary single qubit states by using multi-qubit swap test. 展开更多
关键词 quantum private comparison arbitrary single qubit states swap test quantum cryptography
下载PDF
New Quantum Private Comparison Using Hyperentangled GHZ State
5
作者 Jerrel Gianni Zhiguo Qu 《Journal of Quantum Computing》 2021年第2期45-54,共10页
In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the ... In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the objective.This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom(DOF),which could have 64 combinations.The TP can decide which combination to use based on the shared key information provided from a quantum key distribution(QKD)protocol.By doing so,the security of the protocol can be improved further.Decoy photon technology is also used as another means of security and checks if the transmission in the quantum channel is secure or not before sending the quantum carrier.The proposed protocol is proved to be able to fend off various kinds of eavesdropping attacks.In addition,the new QPC protocol also can compare secret inputs securely and efficiently. 展开更多
关键词 GHZ state hyperentangled state information security quantum cryptography quantum private comparison
下载PDF
Twice-Hadamard-CNOT attack on Li et al.'s fault-tolerant quantum private comparison and the improved scheme 被引量:2
6
作者 季赛 王芳 +1 位作者 刘文杰 袁晓敏 《Frontiers of physics》 SCIE CSCD 2015年第2期73-78,共6页
Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is... Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is fault-tolerant and could be performed in a non-ideal scenario. However, there ex- ists a fatal loophole in their private comparison scheme under a special attack, namely the twice- Hadamard-CNOT attack. Specifically, a malicious party may intercept the other party's particles and execute Hadamard operations on the intercepted particles as well as on his or her own particles. Then, the malicious party could sequentially perform a controlled-NOT (CNOT) operation between intercepted particles and the auxiliary particles, as well as between his or her own particles and the auxiliary particles prepared in advance. By measuring the auxiliary particles, the secret input will be revealed to the malicious party without being detected. For resisting this special attack, a feasible improved scheme is proposed by introducing a permutation operator before the third party (TP) sends the particle sequences to each participant. 展开更多
关键词 quantum private comparison GHZ state twice-Hadamard-CNOT attack improvedscheme
原文传递
Cryptanalysis and improvement of several quantum private comparison protocols 被引量:1
7
作者 Zhao-Xu Ji Pei-Ru Fan +1 位作者 Huan-Guo Zhang Hou-Zhen Wang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2020年第8期57-62,共6页
Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant... Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant can steal another’s secret data without being detected through an active attack means. In this paper, we show that Wu et al’s active attack is also effective for several other existing protocols, including the ones proposed by Ji et al and Zha et al(2016 Commun. Theor. Phys. 65 711;2018 Int. J. Theor. Phys. 57 3874). In addition,we propose what a passive attack means, which is different from Wu et al’s active attack in that the malicious participant can easily steal another’s secret data only by using his own secret data after finishing the protocol, instead of stealing the data by forging identities when executing the protocol. Furthermore, we find that several other existing quantum private comparison protocols also have such an information leakage problem. In response to the problem, we propose a simple solution, which is more efficient than the ones proposed by Wu et al, because it does not consume additional classical and quantum resources. 展开更多
关键词 quantum information security quantum cryptography quantum private comparison information leakage problem passive attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部