Do you want to publish a course? Click here

Device-independent quantum private comparison protocol without a third party

78   0   0.0 ( 0 )
 Added by Guang Ping He
 Publication date 2017
  fields Physics
and research's language is English
 Authors Guang Ping He




Ask ChatGPT about the research

Since unconditionally secure quantum two-party computations are known to be impossible, most existing quantum private comparison (QPC) protocols adopted a third party. Recently, we proposed a QPC protocol which involves two parties only, and showed that although it is not unconditionally secure, it only leaks an extremely small amount of information to the other party. Here we further propose the device-independent version of the protocol, so that it can be more convenient and dependable in practical applications.



rate research

Read More

205 - Guang Ping He 2016
To evade the well-known impossibility of unconditionally secure quantum two-party computations, previous quantum private comparison protocols have to adopt a third party. Here we study how far we can go with two parties only. We propose a very feasible and efficient protocol. Intriguingly, although the average amount of information leaked cannot be made arbitrarily small, we find that it never exceeds 14 bits for any length of the bit-string being compared.
Quantum private comparison (QPC) aims to solve Tierce problem based on the laws of quantum mechanics, where the Tierce problem is to determine whether the secret data of two participants are equal without disclosing the data values. In this paper, we study for the fist time the utility of eight-qubit entangled states for QPC by proposing a new protocol. The proposed protocol only adopts necessary quantum technologies such as preparing quantum states and quantum measurements without using any other quantum technologies (e.g., entanglement swapping and unitary operations), which makes the protocol have advantages in quantum device consumption. The measurements adopted only include single-particle measurements, which is easier to implement than entangled-state measurements under the existing technical conditions. The proposed protocol takes advantage of the entanglement characteristics of the eight-qubit entangled state, and uses joint computation, decoy photon technology, the keys generated by quantum key distribution to ensure data privacy.
Oblivious transfer is a cryptographic primitive where Alice has two bits and Bob wishes to learn some function of them. Ideally, Alice should not learn Bobs desired function choice and Bob should not learn any more than what is logically implied by the function value. While decent quantum protocols for this task are known, many become completely insecure if an adversary were to control the quantum devices used in the implementation of the protocol. In this work we give a fully device-independent quantum protocol for XOR oblivious transfer which is provably more secure than any classical protocol.
Minimal informationally complete positive operator-valued measures (MIC-POVMs) are special kinds of measurement in quantum theory in which the statistics of their $d^2$-outcomes are enough to reconstruct any $d$-dimensional quantum state. For this reason, MIC-POVMs are referred to as standard measurements for quantum information. Here, we report an experiment with entangled photon pairs that certifies, for what we believe is the first time, a MIC-POVM for qubits following a device-independent protocol (i.e., modeling the state preparation and the measurement devices as black boxes, and using only the statistics of the inputs and outputs). Our certification is achieved under the assumption of freedom of choice, no communication, and fair sampling.
62 - Guang Ping He 2019
In a recent paper (Int. J. Quantum Inf. 17 (2019) 1950026), the authors discussed the shortcomings in the security of a quantum private comparison protocol that we previously proposed. They also proposed a new protocol aimed to avoid these problems. Here we analysis the information leaked in their protocol, and find that it is even less secure than our protocol in certain cases. We further propose an improved version which has the following advantages: (1) no entanglement needed, (2) quantum memory is no longer required, and (3) less information leaked. Therefore, better security and great feasibility are both achieved.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا