期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
Unidirectional quantum private comparison based on quantum private query
1
作者 Hexiang Sun Ding Xing +3 位作者 Zhao Dou Jian Li Xiubo Chen Lixiang Li 《Chinese Physics B》 2025年第5期43-53,共11页
Previous bidirectional quantum private comparison(BQPC)protocols cannot meet the requirements in some special application scenarios,where only one party needs to obtain the comparison results without a third party(TP)... Previous bidirectional quantum private comparison(BQPC)protocols cannot meet the requirements in some special application scenarios,where only one party needs to obtain the comparison results without a third party(TP),such as scenarios for authority surveys or healthcare data sharing.In addition to this,the BQPC protocol has the potential of information leakage in multiple comparisons.Therefore,we design a new unidirectional quantum private comparison(UQPC)protocol based on quantum private query(QPQ)protocols with ideal database security and zero failure probability(IDS-ZF),for the reason that they have excellent unidirectionality and security.Concretely,we design a UQPC protocol based on Wei et al.’s work[IEEE Transactions on Computers 672(2017)]and it includes an authentication process to increase the resistance to outside attacks.Moreover,we generalize the protocol and propose a general model that can transform a QPQ protocol with or without the IDS-ZF property into a secure UQPC protocol.Finally,our study shows that protocols using our model are secure,practical,and have the IDS-ZF property. 展开更多
关键词 quantum private comparison UNIDIRECTIONALITY IDENTIFICATION general model
原文传递
Quantum Private Comparison Protocol Based on Bell Entangled States 被引量:4
2
作者 刘文 王永滨 崔巍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2012年第4期583-588,共6页
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The c... In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information. 展开更多
关键词 quantum private comparison protocol Bell entangled state private
原文传递
Measure-Resend Semi-Quantum Private Comparison Scheme Using GHZ Class States 被引量:2
3
作者 Lili Yan Yan Chang +3 位作者 Shibin Zhang Qirun Wang Zhiwei Sheng Yuhua Sun 《Computers, Materials & Continua》 SCIE EI 2019年第8期877-887,共11页
Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to rema... Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed. 展开更多
关键词 quantum private comparison semi-quantum protocol semi-honest third party GHZ class states
在线阅读 下载PDF
Quantum Private Comparison of Equal Information Based on Highly Entangled Six-Qubit Genuine State 被引量:5
4
作者 纪兆旭 叶天语 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第6期711-715,共5页
Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the ... Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the assistance of a semi-honest third party(TP). The proposed protocol needs neither unitary operations nor quantum entanglement swapping technology, both of which may consume expensive quantum devices. Single particle measurements and Bell-basis measurements, which are easy to implement with current technologies, are employed by two users and TP in the proposed protocol, respectively. The proposed protocol can withstand all kinds of outside attacks and participant attacks. Moreover, none of information about the two users' private secrets and the comparison result is leaked out to TP. 展开更多
关键词 quantum private comparison highly entangled six-qubit genuine state security
原文传递
Cryptanalysis and improvement of several quantum private comparison protocols 被引量:1
5
作者 Zhao-Xu Ji Pei-Ru Fan +1 位作者 Huan-Guo Zhang Hou-Zhen Wang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2020年第8期57-62,共6页
Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant... Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant can steal another’s secret data without being detected through an active attack means. In this paper, we show that Wu et al’s active attack is also effective for several other existing protocols, including the ones proposed by Ji et al and Zha et al(2016 Commun. Theor. Phys. 65 711;2018 Int. J. Theor. Phys. 57 3874). In addition,we propose what a passive attack means, which is different from Wu et al’s active attack in that the malicious participant can easily steal another’s secret data only by using his own secret data after finishing the protocol, instead of stealing the data by forging identities when executing the protocol. Furthermore, we find that several other existing quantum private comparison protocols also have such an information leakage problem. In response to the problem, we propose a simple solution, which is more efficient than the ones proposed by Wu et al, because it does not consume additional classical and quantum resources. 展开更多
关键词 quantum information security quantum cryptography quantum private comparison information leakage problem passive attack
原文传递
Efficient quantum private comparison protocol utilizing single photons and rotational encryption 被引量:1
6
作者 Tian-Yi Kou Bi-Chen Che +3 位作者 Zhao Dou Xiu-Bo Chen Yu-Ping Lai Jian Li 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第6期221-227,共7页
As a branch of quantum secure multiparty computation,quantum private comparison is applied frequently in many fields,such as secret elections,private voting,and identification.A quantum private comparison protocol wit... As a branch of quantum secure multiparty computation,quantum private comparison is applied frequently in many fields,such as secret elections,private voting,and identification.A quantum private comparison protocol with higher efficiency and easier implementation is proposed in this paper.The private secrets are encoded as single polarized photons and then encrypted with a homomorphic rotational encryption method.Relying on this method and the circular transmission mode,we implement the multiplexing of photons,raising the efficiency of our protocol to 100%.Our protocol is easy to realize since only single photons,unitary operation,and single-particle measurement are introduced.Meanwhile,the analysis shows that our protocol is also correct and secure. 展开更多
关键词 quantum private comparison rotational encryption polarized single photons EFFICIENCY
原文传递
Efficient quantum private comparison protocol based on one direction discrete quantum walks on the circle 被引量:1
7
作者 Jv-Jie Wang Zhao Dou +2 位作者 Xiu-Bo Chen Yu-Ping Lai Jian Li 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第5期150-156,共7页
We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to... We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to set a flag to judge the comparing result,which improves the qubit efficiency and the maximum quantity of the participants’secret messages.Besides,our protocol can judge the size of the secret messages,not only equality.Furthermore,the quantum walks particle is disentangled in the initial state.It only requires a quantum walks operator to move,making our proposed protocol easy to implement and reducing the quantum resources.Through security analysis,we prove that our protocol can withstand well-known attacks and brute-force attacks.Analyses also reveal that our protocol is correct and practical. 展开更多
关键词 quantum private comparison protocol one direction quantum walks EFFICIENCY brute-force attack
原文传递
Quantum Private Comparison via Cavity QED 被引量:2
8
作者 Tian-Yu Ye 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第2期147-156,共10页
The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed... The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed to misbehave on his own but cannot conspire with either of the two users. The proposed protocol adopts two-atom product states rather than entangled states as the initial quantum resource, and only needs single-atom measurements for two users. Both the unitary operations and the quantum entanglement swapping operation are not necessary for the proposed protocol. The proposed protocol can compare the equality of one bit from each user in each round comparison with one two-atom product state. The proposed protocol can resist both the outside attack and the participant attack.Particularly, it can prevent TP from knowing two users' secrets. Furthermore, the qubit efficiency of the proposed protocol is as high as 50%. 展开更多
关键词 quantum private comparison(QPC) third party(TP) cavity quantum electrodynamics(QED) product state participant attack
原文传递
New Quantum Private Comparison Using Hyperentangled GHZ State 被引量:2
9
作者 Jerrel Gianni Zhiguo Qu 《Journal of Quantum Computing》 2021年第2期45-54,共10页
In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the ... In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the objective.This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom(DOF),which could have 64 combinations.The TP can decide which combination to use based on the shared key information provided from a quantum key distribution(QKD)protocol.By doing so,the security of the protocol can be improved further.Decoy photon technology is also used as another means of security and checks if the transmission in the quantum channel is secure or not before sending the quantum carrier.The proposed protocol is proved to be able to fend off various kinds of eavesdropping attacks.In addition,the new QPC protocol also can compare secret inputs securely and efficiently. 展开更多
关键词 GHZ state hyperentangled state information security quantum cryptography quantum private comparison
在线阅读 下载PDF
Multi-Party Quantum Private Comparison Protocol Based on Entanglement Swapping of Bell Entangled States
10
作者 叶天语 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第9期280-290,共11页
Recently, Liu et al. proposed a two-party quantum private comparison(QPC) protocol using entanglement swapping of Bell entangled state(Commun. Theor. Phys. 57(2012) 583). Subsequently, Liu et al. pointed out that in L... Recently, Liu et al. proposed a two-party quantum private comparison(QPC) protocol using entanglement swapping of Bell entangled state(Commun. Theor. Phys. 57(2012) 583). Subsequently, Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole(Commun. Theor. Phys. 62(2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution. 展开更多
关键词 multi-party quantum private comparison Bell entangled state entanglement swapping information leakage
原文传递
Quantum private comparison of arbitrary single qubit states based on swap test
11
作者 Xi Huang Yan Chang +2 位作者 Wen Cheng Min Hou Shi-Bin Zhang 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第4期123-132,共10页
By using swap test,a quantum private comparison(QPC)protocol of arbitrary single qubit states with a semi-honest third party is proposed.The semi-honest third party(TP)is required to help two participants perform the ... By using swap test,a quantum private comparison(QPC)protocol of arbitrary single qubit states with a semi-honest third party is proposed.The semi-honest third party(TP)is required to help two participants perform the comparison.She can record intermediate results and do some calculations in the whole process of the protocol execution,but she cannot conspire with any of participants.In the process of comparison,the TP cannot get two participants’private information except the comparison results.According to the security analysis,the proposed protocol can resist both outsider attacks and participants’attacks.Compared with the existing QPC protocols,the proposed one does not require any entanglement swapping technology,but it can compare two participants’qubits by performing swap test,which is easier to implement with current technology.Meanwhile,the proposed protocol can compare secret integers.It encodes secret integers into the amplitude of quantum state rather than transfer them as binary representations,and the encoded quantum state is compared by performing the swap test.Additionally,the proposed QPC protocol is extended to the QPC of arbitrary single qubit states by using multi-qubit swap test. 展开更多
关键词 quantum private comparison arbitrary single qubit states swap test quantum cryptography
原文传递
Quantum Private Comparison of Equality Based on Five-Particle Cluster State
12
作者 Yan Chang Wen-Do Zhang +7 位作者 Shi-Bin Zhang Hai-Chun Wang Li-Li Yan Gui-Hua Han Zhi-Wei Sheng Yuan-Yuan Huang Wang Suo Jin-Xin Xiong 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第12期621-628,共8页
A protocol for quantum private comparison of equality(QPCE) is proposed based on five-particle cluster state with the help of a semi-honest third party(TP). In our protocol, TP is allowed to misbehave on its own but c... A protocol for quantum private comparison of equality(QPCE) is proposed based on five-particle cluster state with the help of a semi-honest third party(TP). In our protocol, TP is allowed to misbehave on its own but can not conspire with either of two parties. Compared with most two-user QPCE protocols, our protocol not only can compare two groups of private information(each group has two users) in one execution, but also compare just two private information. Compared with the multi-user QPCE protocol proposed, our protocol is safer with more reasonable assumptions of TP. The qubit efficiency is computed and analyzed. Our protocol can also be generalized to the case of 2N participants with one TP. The 2N-participant protocol can compare two groups(each group has N private information)in one execution or just N private information. 展开更多
关键词 quantum private comparison of equality five-particle cluster state semi-honest third party
原文传递
Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels 被引量:6
13
作者 HUANG Wei WEN QiaoYan +2 位作者 LIU Bin GAO Fei SUN Ying 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2013年第9期1670-1678,共9页
We present a protocol for quantum private comparison of equality(QPCE) with the help of a semi-honest third party(TP).Instead of employing the entanglement,we use single photons to achieve the comparison in this proto... We present a protocol for quantum private comparison of equality(QPCE) with the help of a semi-honest third party(TP).Instead of employing the entanglement,we use single photons to achieve the comparison in this protocol.By utilizing collective eavesdropping detection strategy,our protocol has the advantage of higher qubit efficiency and lower cost of implementation.In addition to this protocol,we further introduce three robust versions which can be immune to collective dephasing noise,collective-rotation noise and all types of unitary collective noise,respectively.Finally,we show that our protocols can be secure against the attacks from both the outside eavesdroppers and the inside participants by using the theorems on quantum operation discrimination. 展开更多
关键词 quantum private comparison of equality collective detection collective noise
原文传递
Twice-Hadamard-CNOT attack on Li et al.'s fault-tolerant quantum private comparison and the improved scheme 被引量:2
14
作者 季赛 王芳 +1 位作者 刘文杰 袁晓敏 《Frontiers of physics》 SCIE CSCD 2015年第2期73-78,共6页
Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is... Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is fault-tolerant and could be performed in a non-ideal scenario. However, there ex- ists a fatal loophole in their private comparison scheme under a special attack, namely the twice- Hadamard-CNOT attack. Specifically, a malicious party may intercept the other party's particles and execute Hadamard operations on the intercepted particles as well as on his or her own particles. Then, the malicious party could sequentially perform a controlled-NOT (CNOT) operation between intercepted particles and the auxiliary particles, as well as between his or her own particles and the auxiliary particles prepared in advance. By measuring the auxiliary particles, the secret input will be revealed to the malicious party without being detected. For resisting this special attack, a feasible improved scheme is proposed by introducing a permutation operator before the third party (TP) sends the particle sequences to each participant. 展开更多
关键词 quantum private comparison GHZ state twice-Hadamard-CNOT attack improvedscheme
原文传递
Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states 被引量:2
15
作者 TianYu Ye ZhaoXu Ji 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2017年第9期7-16,共10页
Quantum private comparison(QPC) aims to accomplish the equality comparison of the secrets from different users without disclosing their genuine contents by using the principles of quantum mechanics. In this paper, we ... Quantum private comparison(QPC) aims to accomplish the equality comparison of the secrets from different users without disclosing their genuine contents by using the principles of quantum mechanics. In this paper, we summarize eight modes of quantum state preparation and transmission existing in current QPC protocols first. Then, by using the mode of scattered preparation and one-way convergent transmission, we construct a new multi-user quantum private comparison(MQPC) protocol with two-particle maximally entangled states, which can accomplish arbitrary pair's comparison of equality amongK users within one execution. Analysis turns out that its output correctness and its security against both the outside attack and the participant attack are guaranteed. The proposed MQPC protocol can be implemented with current technologies. It can be concluded that the mode of scattered preparation and one-way convergent transmission of quantum states is beneficial to designing the MQPC protocol which can accomplish arbitrary pair's comparison of equality among K users within one execution. 展开更多
关键词 multi-user quantum private comparison (MQPC) scattered preparation one-way convergent transmission
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部