Do you want to publish a course? Click here

Quantum private comparison protocol without a third party

206   0   0.0 ( 0 )
 Added by Guang Ping He
 Publication date 2016
  fields Physics
and research's language is English
 Authors Guang Ping He




Ask ChatGPT about the research

To evade the well-known impossibility of unconditionally secure quantum two-party computations, previous quantum private comparison protocols have to adopt a third party. Here we study how far we can go with two parties only. We propose a very feasible and efficient protocol. Intriguingly, although the average amount of information leaked cannot be made arbitrarily small, we find that it never exceeds 14 bits for any length of the bit-string being compared.



rate research

Read More

77 - Guang Ping He 2017
Since unconditionally secure quantum two-party computations are known to be impossible, most existing quantum private comparison (QPC) protocols adopted a third party. Recently, we proposed a QPC protocol which involves two parties only, and showed that although it is not unconditionally secure, it only leaks an extremely small amount of information to the other party. Here we further propose the device-independent version of the protocol, so that it can be more convenient and dependable in practical applications.
Quantum private comparison (QPC) aims to solve Tierce problem based on the laws of quantum mechanics, where the Tierce problem is to determine whether the secret data of two participants are equal without disclosing the data values. In this paper, we study for the fist time the utility of eight-qubit entangled states for QPC by proposing a new protocol. The proposed protocol only adopts necessary quantum technologies such as preparing quantum states and quantum measurements without using any other quantum technologies (e.g., entanglement swapping and unitary operations), which makes the protocol have advantages in quantum device consumption. The measurements adopted only include single-particle measurements, which is easier to implement than entangled-state measurements under the existing technical conditions. The proposed protocol takes advantage of the entanglement characteristics of the eight-qubit entangled state, and uses joint computation, decoy photon technology, the keys generated by quantum key distribution to ensure data privacy.
62 - Guang Ping He 2019
In a recent paper (Int. J. Quantum Inf. 17 (2019) 1950026), the authors discussed the shortcomings in the security of a quantum private comparison protocol that we previously proposed. They also proposed a new protocol aimed to avoid these problems. Here we analysis the information leaked in their protocol, and find that it is even less secure than our protocol in certain cases. We further propose an improved version which has the following advantages: (1) no entanglement needed, (2) quantum memory is no longer required, and (3) less information leaked. Therefore, better security and great feasibility are both achieved.
We develop a three-party quantum secret sharing protocol based on arbitrary dimensional quantum states. In contrast to the previous quantum secret sharing protocols, the sender can always control the state, just using local operations, for adjusting the correlation of measurement directions of three parties and thus there is no waste of resource due to the discord between the directions. Moreover, our protocol contains the hidden value which enables the sender to leak no information of secret key to the dishonest receiver until the last steps of the procedure.
Utilizing the advantage of quantum entanglement swapping, a multi-party quantum key agreement protocol with authentication is proposed. In this protocol, a semi-trusted third party is introduced, who prepares Bell states, and sends one particle to multiple participants respectively. After that the participants can share a Greenberger-Horne-Zeilinger state by entanglement swapping. Finally, these participants measure the particles in their hands and obtain an agreement key. Here, classical hash function and Hadamard operation are utilized to authenticate the identity of participants. The correlations of GHZ states ensure the security of the proposed protocol. To illustrated it detailly, the security of this protocol against common attacks is analyzed, which shows that the proposed protocol is secure in theory.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا