Skip to main content
Erschienen in: Electronic Commerce Research 3/2014

01.11.2014

An efficient novel online shopping mechanism based on quantum communication

verfasst von: Yao-Hsin Chou, Fang-Jhu Lin, Guo-Jyun Zeng

Erschienen in: Electronic Commerce Research | Ausgabe 3/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We propose a controlled quantum secure direct communication protocol which can be used for online shopping. The online shopping mall is able to control the shopping process, so the customer’s shopping information can be more secure. In this paper, single photons are used to carry customer’s information, so the cost of our protocol is less than others using entangled qubits. If any eavesdropper tries to steal the shopping information, the lawful participants will perceive it and abort their transaction. This protocol can be used to provide advanced applications and services for intelligent ubiquitous environments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Acin, A., Gisin, N., & Masanes, L. (2006). From Bells theorem to secure quantum key distribution. Physical Review Letters, 97, 120405.CrossRef Acin, A., Gisin, N., & Masanes, L. (2006). From Bells theorem to secure quantum key distribution. Physical Review Letters, 97, 120405.CrossRef
2.
Zurück zum Zitat Antoniou, G., & Batten, L. (2011). E-commerce: Protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11, 421–456.CrossRef Antoniou, G., & Batten, L. (2011). E-commerce: Protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11, 421–456.CrossRef
3.
Zurück zum Zitat Beige, A., Englert, B. G., Kurtsiefer, C., & Weinfurter, H. (2002). Secure communication with a publicly known key. Acta Physica Polonica A, 101, 357–368. Beige, A., Englert, B. G., Kurtsiefer, C., & Weinfurter, H. (2002). Secure communication with a publicly known key. Acta Physica Polonica A, 101, 357–368.
4.
Zurück zum Zitat Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (p. 175). Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (p. 175).
5.
Zurück zum Zitat Bennett, C. H., Brassard, G., & Mermin, N. D. (1992). Quantum cryptography without Bell’s theorem. Physical Review Letters, 68, 557–559.CrossRef Bennett, C. H., Brassard, G., & Mermin, N. D. (1992). Quantum cryptography without Bell’s theorem. Physical Review Letters, 68, 557–559.CrossRef
6.
Zurück zum Zitat Bostrm, K., & Felbinger, T. (2002). Deterministic secure direct communication using entanglement. Physical Review Letters, 89, 187902.CrossRef Bostrm, K., & Felbinger, T. (2002). Deterministic secure direct communication using entanglement. Physical Review Letters, 89, 187902.CrossRef
7.
Zurück zum Zitat BruB, D. (1998). Optimal eavesdropping in quantum cryptography with six states. Physical Review Letters, 81, 3018.CrossRef BruB, D. (1998). Optimal eavesdropping in quantum cryptography with six states. Physical Review Letters, 81, 3018.CrossRef
8.
Zurück zum Zitat Cai, Q. Y., & Li, B. W. (2004). Improving the capacity of the Bostrm–Felbinger protocol. Physical Review A, 69, 054301.CrossRef Cai, Q. Y., & Li, B. W. (2004). Improving the capacity of the Bostrm–Felbinger protocol. Physical Review A, 69, 054301.CrossRef
9.
Zurück zum Zitat Cai, Q. Y., & Li, B. W. (2004). Deterministic secure communication without using entanglement. Chinese Physics Letters, 21, 601.CrossRef Cai, Q. Y., & Li, B. W. (2004). Deterministic secure communication without using entanglement. Chinese Physics Letters, 21, 601.CrossRef
10.
Zurück zum Zitat Chen, M. Y., & Teng, C. I. (2013). A comprehensive model of the effects of online store image on purchase intention in an e-commerce environment. Electronic Commerce Research, 13, 1–23.CrossRef Chen, M. Y., & Teng, C. I. (2013). A comprehensive model of the effects of online store image on purchase intention in an e-commerce environment. Electronic Commerce Research, 13, 1–23.CrossRef
11.
Zurück zum Zitat Deng, F., & Long, G. (2004). Secure direct communication with a quantum one-time pad. Physical Review A, 69, 052319.CrossRef Deng, F., & Long, G. (2004). Secure direct communication with a quantum one-time pad. Physical Review A, 69, 052319.CrossRef
12.
Zurück zum Zitat Deng, F., Long, G., & Liu, X. (2003). Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Physical Review A, 68, 042317.CrossRef Deng, F., Long, G., & Liu, X. (2003). Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Physical Review A, 68, 042317.CrossRef
13.
Zurück zum Zitat Deng, F. G., Li, C. Y., Zhou, P., & Zhou, H. Y. (2006). Quantum secure direct communication network with Einstein–Podolsky–Rosen pairs. Physical Letters A, 359, 359–365.CrossRef Deng, F. G., Li, C. Y., Zhou, P., & Zhou, H. Y. (2006). Quantum secure direct communication network with Einstein–Podolsky–Rosen pairs. Physical Letters A, 359, 359–365.CrossRef
14.
Zurück zum Zitat Ekert, A. K. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67, 661–663.CrossRef Ekert, A. K. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67, 661–663.CrossRef
15.
Zurück zum Zitat Gao, T., Yan, F. L., & Wang, Z. X. (2005). Controlled quantum teleportation and secure direct communication. Chinese Physics, 14(5), 893.CrossRef Gao, T., Yan, F. L., & Wang, Z. X. (2005). Controlled quantum teleportation and secure direct communication. Chinese Physics, 14(5), 893.CrossRef
16.
Zurück zum Zitat Guo, G. P., & Guo, G. C. (2003). Quantum secret sharing without entanglement. Physics Letters A, 310, 247.CrossRef Guo, G. P., & Guo, G. C. (2003). Quantum secret sharing without entanglement. Physics Letters A, 310, 247.CrossRef
17.
Zurück zum Zitat Hillery, M., Buek, V., & Berthiaume, A. (1999). Quantum secret sharing. Physical Review A, 59, 1892.CrossRef Hillery, M., Buek, V., & Berthiaume, A. (1999). Quantum secret sharing. Physical Review A, 59, 1892.CrossRef
18.
Zurück zum Zitat Karlsson, A., Koashi, M., & Lmoto, N. (1999). Quantum entanglement for secret sharing and secret splitting. Physical Review A, 59, 162.CrossRef Karlsson, A., Koashi, M., & Lmoto, N. (1999). Quantum entanglement for secret sharing and secret splitting. Physical Review A, 59, 162.CrossRef
19.
Zurück zum Zitat Li, X. H., Zhou, P., Liang, Y. J., Li, C. Y., Zhou, H. Y., & Deng, F. G. (2006). Quantum secure direct communication network with two-step protocol. Chinese Physics Letters, 23, 1080–1083.CrossRef Li, X. H., Zhou, P., Liang, Y. J., Li, C. Y., Zhou, H. Y., & Deng, F. G. (2006). Quantum secure direct communication network with two-step protocol. Chinese Physics Letters, 23, 1080–1083.CrossRef
20.
Zurück zum Zitat Long, G. L., & Liu, X. S. (2002). Theoretically efficient high-capacity quantum-key-distribution scheme. Physical Review A, 65, 032302.CrossRef Long, G. L., & Liu, X. S. (2002). Theoretically efficient high-capacity quantum-key-distribution scheme. Physical Review A, 65, 032302.CrossRef
21.
Zurück zum Zitat Lucamarini, M., & Mancini, S. (2005). Secure deterministic communication without entanglement. Physical Review Letters, 94, 140501.CrossRef Lucamarini, M., & Mancini, S. (2005). Secure deterministic communication without entanglement. Physical Review Letters, 94, 140501.CrossRef
22.
Zurück zum Zitat Morid, M. A., & Shajari, M. (2012). An enhanced e-commerce trust model for community based centralized systems. Electronic Commerce Research, 12, 409–427.CrossRef Morid, M. A., & Shajari, M. (2012). An enhanced e-commerce trust model for community based centralized systems. Electronic Commerce Research, 12, 409–427.CrossRef
23.
Zurück zum Zitat Nielsen, M. A., & Chuang, I. L. (2000). Quantum computation and quantum information. Cambridge: Cambridge University Press. Nielsen, M. A., & Chuang, I. L. (2000). Quantum computation and quantum information. Cambridge: Cambridge University Press.
24.
Zurück zum Zitat Ramanathan, R. (2010). E-commerce success criteria: Determining which criteria count most. Electronic Commerce Research, 10, 191–208.CrossRef Ramanathan, R. (2010). E-commerce success criteria: Determining which criteria count most. Electronic Commerce Research, 10, 191–208.CrossRef
25.
Zurück zum Zitat Shimizu, K., & Imoto, N. (1999). Communication channels secured from eavesdropping via transmission of photonic Bell states. Physical Review A, 60, 157–166.CrossRef Shimizu, K., & Imoto, N. (1999). Communication channels secured from eavesdropping via transmission of photonic Bell states. Physical Review A, 60, 157–166.CrossRef
26.
Zurück zum Zitat Shor, P. W. (1994). Algorithms for quantum computation: Discrete logarithms and factoring. In 35th Annual Symposium on Foundations of Computer Science (pp. 124–134). Shor, P. W. (1994). Algorithms for quantum computation: Discrete logarithms and factoring. In 35th Annual Symposium on Foundations of Computer Science (pp. 124–134).
27.
Zurück zum Zitat Smith, R., & Shao, J. (2007). Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research, 7, 89–116.CrossRef Smith, R., & Shao, J. (2007). Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research, 7, 89–116.CrossRef
28.
Zurück zum Zitat Vernam, G. S. (1926). Cipher printing telegraph systems for secret wire and radio telegraphic communications. Journal of the American Institute of Electrical Engineers, 45, 295–301.CrossRef Vernam, G. S. (1926). Cipher printing telegraph systems for secret wire and radio telegraphic communications. Journal of the American Institute of Electrical Engineers, 45, 295–301.CrossRef
29.
Zurück zum Zitat Wang, C., Deng, F. G., Li, Y. S., Liu, X. S., & Long, G. L. (2005). Quantum secure direct communication with high-dimension quantum superdense coding. Physical Review A, 71, 044305.CrossRef Wang, C., Deng, F. G., Li, Y. S., Liu, X. S., & Long, G. L. (2005). Quantum secure direct communication with high-dimension quantum superdense coding. Physical Review A, 71, 044305.CrossRef
30.
Zurück zum Zitat Wang, C., Deng, F. G., & Long, G. L. (2005). Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state. Optics Communications, 253, 15–20.CrossRef Wang, C., Deng, F. G., & Long, G. L. (2005). Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state. Optics Communications, 253, 15–20.CrossRef
31.
Zurück zum Zitat Wang, J., Zhang, Q., & Tang, C. J. (2006). Multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Optics Communications, 266, 732.CrossRef Wang, J., Zhang, Q., & Tang, C. J. (2006). Multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Optics Communications, 266, 732.CrossRef
32.
Zurück zum Zitat Xiao, L., Long, G. L., Deng, F. G., & Pan, J. W. (2004). Efficient multiparty quantum-secret-sharing schemes. Physical Review A, 69, 052307.CrossRef Xiao, L., Long, G. L., Deng, F. G., & Pan, J. W. (2004). Efficient multiparty quantum-secret-sharing schemes. Physical Review A, 69, 052307.CrossRef
33.
Zurück zum Zitat Xue, P., Li, C. F., & Guo, G. C. (2002). Conditional efficient multiuser quantum cryptography network. Physical Review A, 65, 022317.CrossRef Xue, P., Li, C. F., & Guo, G. C. (2002). Conditional efficient multiuser quantum cryptography network. Physical Review A, 65, 022317.CrossRef
34.
Zurück zum Zitat Zhang, Z. J. (2005). Multiparty quantum secret sharing of secure direct communication. Physics Letters A, 342, 60–66.CrossRef Zhang, Z. J. (2005). Multiparty quantum secret sharing of secure direct communication. Physics Letters A, 342, 60–66.CrossRef
35.
Zurück zum Zitat Zhang, Z. J., Li, Y., & Man, Z. X. (2005). Multiparty quantum secret sharing. Physical Review A, 71, 044301.CrossRef Zhang, Z. J., Li, Y., & Man, Z. X. (2005). Multiparty quantum secret sharing. Physical Review A, 71, 044301.CrossRef
36.
Zurück zum Zitat Zhou, P., Li, X. H., Liang, Y. J., Deng, F. G., & Zhou, H. Y. (2007). Multiparty quantum secret sharing with pure entangled states and decoy photons. Physica A: Statistical Mechanics and its Applications, 381, 164–169.CrossRef Zhou, P., Li, X. H., Liang, Y. J., Deng, F. G., & Zhou, H. Y. (2007). Multiparty quantum secret sharing with pure entangled states and decoy photons. Physica A: Statistical Mechanics and its Applications, 381, 164–169.CrossRef
Metadaten
Titel
An efficient novel online shopping mechanism based on quantum communication
verfasst von
Yao-Hsin Chou
Fang-Jhu Lin
Guo-Jyun Zeng
Publikationsdatum
01.11.2014
Verlag
Springer US
Erschienen in
Electronic Commerce Research / Ausgabe 3/2014
Print ISSN: 1389-5753
Elektronische ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-014-9143-6

Weitere Artikel der Ausgabe 3/2014

Electronic Commerce Research 3/2014 Zur Ausgabe