ترغب بنشر مسار تعليمي؟ اضغط هنا

Two-party quantum private comparison protocol using eight-qubit entangled state

168   0   0.0 ( 0 )
 نشر من قبل Zhao-Xu Ji
 تاريخ النشر 2021
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

Quantum private comparison (QPC) aims to solve Tierce problem based on the laws of quantum mechanics, where the Tierce problem is to determine whether the secret data of two participants are equal without disclosing the data values. In this paper, we study for the fist time the utility of eight-qubit entangled states for QPC by proposing a new protocol. The proposed protocol only adopts necessary quantum technologies such as preparing quantum states and quantum measurements without using any other quantum technologies (e.g., entanglement swapping and unitary operations), which makes the protocol have advantages in quantum device consumption. The measurements adopted only include single-particle measurements, which is easier to implement than entangled-state measurements under the existing technical conditions. The proposed protocol takes advantage of the entanglement characteristics of the eight-qubit entangled state, and uses joint computation, decoy photon technology, the keys generated by quantum key distribution to ensure data privacy.



قيم البحث

اقرأ أيضاً

205 - Guang Ping He 2016
To evade the well-known impossibility of unconditionally secure quantum two-party computations, previous quantum private comparison protocols have to adopt a third party. Here we study how far we can go with two parties only. We propose a very feasib le and efficient protocol. Intriguingly, although the average amount of information leaked cannot be made arbitrarily small, we find that it never exceeds 14 bits for any length of the bit-string being compared.
77 - Guang Ping He 2017
Since unconditionally secure quantum two-party computations are known to be impossible, most existing quantum private comparison (QPC) protocols adopted a third party. Recently, we proposed a QPC protocol which involves two parties only, and showed t hat although it is not unconditionally secure, it only leaks an extremely small amount of information to the other party. Here we further propose the device-independent version of the protocol, so that it can be more convenient and dependable in practical applications.
62 - Guang Ping He 2019
In a recent paper (Int. J. Quantum Inf. 17 (2019) 1950026), the authors discussed the shortcomings in the security of a quantum private comparison protocol that we previously proposed. They also proposed a new protocol aimed to avoid these problems. Here we analysis the information leaked in their protocol, and find that it is even less secure than our protocol in certain cases. We further propose an improved version which has the following advantages: (1) no entanglement needed, (2) quantum memory is no longer required, and (3) less information leaked. Therefore, better security and great feasibility are both achieved.
We consider a scenario of remote state preparation of qubits where a single copy of an entangled state is shared between Alice and several Bobs who sequentially perform unsharp single-particle measurements. We show that a substantial number of Bobs c an optimally and reliably prepare the qubit in Alices lab exceeding the classical realm. There can be at most 16 Bobs in a sequence when the state is chosen from the equatorial circle of the Bloch sphere. In general, depending upon the choice of a circle from the Bloch sphere, the optimum number of Bobs ranges from 12 for the worst choice, to become remarkably very large corresponding to circles in the polar regions, in case of an initially shared maximally entangled state. We further show that the bound on the number of observers successful in implementing remote state preparation is higher for maximally entangled initial states than that for non-maximally entangled initial states.
We develop a three-party quantum secret sharing protocol based on arbitrary dimensional quantum states. In contrast to the previous quantum secret sharing protocols, the sender can always control the state, just using local operations, for adjusting the correlation of measurement directions of three parties and thus there is no waste of resource due to the discord between the directions. Moreover, our protocol contains the hidden value which enables the sender to leak no information of secret key to the dishonest receiver until the last steps of the procedure.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا