Skip to main content
Top
Published in: Quantum Information Processing 3/2021

01-03-2021

Cryptanalysis and improvement in semi-quantum private comparison based on Bell states

Authors: Chia-Wei Tsai, Jason Lin, Chun-Wei Yang

Published in: Quantum Information Processing | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recently, Jiang proposed a semi-quantum private comparison (SQPC) protocol without the use of a quantum measurement device (Quantum Inf Process 19:182, 2020). However, this paper highlights a security loophole during the transmission phase of the protocol in which a malicious participant can perform a double CNOT attack to steal partial information of the other participant’s private secret without being detected. With the same assumption of the semi-quantum environment as Jiang’s protocol, this paper presents an improved protocol by adopting a strategy of pre-sharing session keys to overcome the double CNOT attack. Moreover, a security analysis of the collective attack is also provided for Jiang’s and the improved SQPC protocols.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984 (IEEE, New York, 1984), pp. 175–179; IBM Tech. Discl. Bull. 28, pp. 3153–3163 (1985) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984 (IEEE, New York, 1984), pp. 175–179; IBM Tech. Discl. Bull. 28, pp. 3153–3163 (1985)
4.
go back to reference Zidan, M., Sagheer, A., Metwally, N.: An autonomous competitive learning algorithm using quantum hamming neural networks. In: Proceedings of the international joint conference on neural networks (IJCNN, Killarney, Ireland, 2015), pp. 1–7. IEEE (2015) Zidan, M., Sagheer, A., Metwally, N.: An autonomous competitive learning algorithm using quantum hamming neural networks. In: Proceedings of the international joint conference on neural networks (IJCNN, Killarney, Ireland, 2015), pp. 1–7. IEEE (2015)
5.
go back to reference Sagheer, A., Zidan, M., Abdelsamea, M.M.: A novel autonomous perceptron model for pattern classification applications. Entropy 21(8), 763 (2019)ADSMathSciNetCrossRef Sagheer, A., Zidan, M., Abdelsamea, M.M.: A novel autonomous perceptron model for pattern classification applications. Entropy 21(8), 763 (2019)ADSMathSciNetCrossRef
6.
go back to reference Zidan, M., Abdel-Aty, A.H., El-Sadek, A., Zanaty, E.A., Abdel-Aty, M.: Low-cost autonomous perceptron neural network inspired by quantum computation. AIP Conf. Proc. 1905(1), 020005 (2017)CrossRef Zidan, M., Abdel-Aty, A.H., El-Sadek, A., Zanaty, E.A., Abdel-Aty, M.: Low-cost autonomous perceptron neural network inspired by quantum computation. AIP Conf. Proc. 1905(1), 020005 (2017)CrossRef
8.
go back to reference Bennett, C.H., et al.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70(13), 1895 (1993)ADSMathSciNetCrossRef Bennett, C.H., et al.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70(13), 1895 (1993)ADSMathSciNetCrossRef
9.
go back to reference Abdalla, M.S., Abdel-Aty, M., Obada, A.F.: Degree of entanglement for anisotropic coupled oscillators interacting with a single atom. J. Opt. B Quantum Semiclassical Opt. 4(6), 396–401 (2002)ADSCrossRef Abdalla, M.S., Abdel-Aty, M., Obada, A.F.: Degree of entanglement for anisotropic coupled oscillators interacting with a single atom. J. Opt. B Quantum Semiclassical Opt. 4(6), 396–401 (2002)ADSCrossRef
10.
go back to reference Zhang, J.-S., Chen, A.-X., Abdel-Aty, M.: Two atoms in dissipative cavities in dispersive limit: entanglement sudden death and long-lived entanglement. J. Phys. B At. Mol. Opt. Phys. 43(2), 025501 (2010)ADSCrossRef Zhang, J.-S., Chen, A.-X., Abdel-Aty, M.: Two atoms in dissipative cavities in dispersive limit: entanglement sudden death and long-lived entanglement. J. Phys. B At. Mol. Opt. Phys. 43(2), 025501 (2010)ADSCrossRef
12.
go back to reference Abdel-Aty, A.-H., Kadry, H., Zidan, M., Al-Sbou, Y., Zanaty, E.A., Abdel-Aty, M.: A quantum classification algorithm for classification incomplete patterns based on entanglement measure. J. Intell. Fuzzy Syst. 38(3), 2809–2816 (2020)CrossRef Abdel-Aty, A.-H., Kadry, H., Zidan, M., Al-Sbou, Y., Zanaty, E.A., Abdel-Aty, M.: A quantum classification algorithm for classification incomplete patterns based on entanglement measure. J. Intell. Fuzzy Syst. 38(3), 2809–2816 (2020)CrossRef
13.
go back to reference Zidan, M., Abdel-Aty, A., Nguyene, D.M., Mohamed, A.S.A., Al-Sboug, Y., Eleuch, H., Abdel-Aty, M.: A quantum algorithm based on entanglement measure for classifying multivariate function into novel hidden classes. Results Phys. 15, 102549 (2019)CrossRef Zidan, M., Abdel-Aty, A., Nguyene, D.M., Mohamed, A.S.A., Al-Sboug, Y., Eleuch, H., Abdel-Aty, M.: A quantum algorithm based on entanglement measure for classifying multivariate function into novel hidden classes. Results Phys. 15, 102549 (2019)CrossRef
14.
go back to reference Zidan, M., Abdel-Aty, A.H., El-shafei, M., Feraig, M., Al-Sbou, Y., Eleuch, H., Abdel-Aty, M.: Quantum classification algorithm based on competitive learning neural network and entanglement measure. Appl. Sci. 9(7), 1277 (2019)CrossRef Zidan, M., Abdel-Aty, A.H., El-shafei, M., Feraig, M., Al-Sbou, Y., Eleuch, H., Abdel-Aty, M.: Quantum classification algorithm based on competitive learning neural network and entanglement measure. Appl. Sci. 9(7), 1277 (2019)CrossRef
15.
go back to reference Yao, A.C.: Protocols for secure computations. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS’82), p. 160. Washington, DC (1982) Yao, A.C.: Protocols for secure computations. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS’82), p. 160. Washington, DC (1982)
16.
go back to reference Boudot, F., Schoenmakers, B., Traoré, J.: A fair and efficient solution to the socialist millionaires’ problem. Discrete Appl. Math. 111(1–2), 23–36 (2001)MathSciNetCrossRef Boudot, F., Schoenmakers, B., Traoré, J.: A fair and efficient solution to the socialist millionaires’ problem. Discrete Appl. Math. 111(1–2), 23–36 (2001)MathSciNetCrossRef
17.
go back to reference Yang, Y.-G., Wen, Q.-Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42(5), 055305 (2009)ADSMathSciNetCrossRef Yang, Y.-G., Wen, Q.-Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42(5), 055305 (2009)ADSMathSciNetCrossRef
18.
go back to reference Jia, H.-Y., Wen, Q.-Y., Song, T.-T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284(1), 545–549 (2011)ADSCrossRef Jia, H.-Y., Wen, Q.-Y., Song, T.-T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284(1), 545–549 (2011)ADSCrossRef
19.
go back to reference Chang, Y.-J., Tsai, C.-W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 12(2), 1077–1088 (2013)ADSMathSciNetCrossRef Chang, Y.-J., Tsai, C.-W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 12(2), 1077–1088 (2013)ADSMathSciNetCrossRef
20.
go back to reference Luo, Q.-B., Yang, G.-W., She, K., Niu, W.-N., Wang, Y.-Q.: Multi-party quantum private comparison protocol based on d-dimensional entangled states. Quantum Inf. Process. 13(10), 2343–2352 (2014)ADSMathSciNetCrossRef Luo, Q.-B., Yang, G.-W., She, K., Niu, W.-N., Wang, Y.-Q.: Multi-party quantum private comparison protocol based on d-dimensional entangled states. Quantum Inf. Process. 13(10), 2343–2352 (2014)ADSMathSciNetCrossRef
21.
go back to reference Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11(2), 373–384 (2012)MathSciNetCrossRef Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11(2), 373–384 (2012)MathSciNetCrossRef
22.
go back to reference Liu, W., Wang, Y.-B., Jiang, Z.-T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284(12), 3160–3163 (2011)ADSCrossRef Liu, W., Wang, Y.-B., Jiang, Z.-T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284(12), 3160–3163 (2011)ADSCrossRef
23.
go back to reference Wen, L., Yong-Bin, W., Wei, C.: Quantum private comparison protocol based on Bell entangled states. Commun. Theor. Phys. 57(4), 583 (2012)ADSMathSciNetCrossRef Wen, L., Yong-Bin, W., Wei, C.: Quantum private comparison protocol based on Bell entangled states. Commun. Theor. Phys. 57(4), 583 (2012)ADSMathSciNetCrossRef
24.
go back to reference Zhang, W.-W., Zhang, K.-J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12(5), 1981–1990 (2013)ADSMathSciNetCrossRef Zhang, W.-W., Zhang, K.-J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12(5), 1981–1990 (2013)ADSMathSciNetCrossRef
25.
go back to reference Huang, S.-L., Hwang, T., Gope, P.: Multi-party quantum private comparison protocol with an almost dishonest third party using GHZ states. Int. J. Theor. Phys. 55(6), 2969–2976 (2016)CrossRef Huang, S.-L., Hwang, T., Gope, P.: Multi-party quantum private comparison protocol with an almost dishonest third party using GHZ states. Int. J. Theor. Phys. 55(6), 2969–2976 (2016)CrossRef
26.
go back to reference Hung, S.-M., Hwang, S.-L., Hwang, T., Kao, S.-H.: Multiparty quantum private comparison with almost dishonest third parties for strangers. Quantum Inf. Process. 16(2), 36 (2017)ADSMathSciNetCrossRef Hung, S.-M., Hwang, S.-L., Hwang, T., Kao, S.-H.: Multiparty quantum private comparison with almost dishonest third parties for strangers. Quantum Inf. Process. 16(2), 36 (2017)ADSMathSciNetCrossRef
27.
go back to reference Ye, T.-Y., Ji, Z.-X.: Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states. Sci. China Phys. Mech. Astron. 60(9), 090312 (2017)ADSCrossRef Ye, T.-Y., Ji, Z.-X.: Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states. Sci. China Phys. Mech. Astron. 60(9), 090312 (2017)ADSCrossRef
28.
go back to reference Yang, Y.-G., Xia, J., Jia, X., Shi, L.: New quantum private comparison protocol without entanglement. Int. J. Quantum Inf. 10(06), 1250065 (2012)MathSciNetCrossRef Yang, Y.-G., Xia, J., Jia, X., Shi, L.: New quantum private comparison protocol without entanglement. Int. J. Quantum Inf. 10(06), 1250065 (2012)MathSciNetCrossRef
29.
go back to reference Liu, B., Gao, F., Jia, H.-Y., Huang, W., Zhang, W.-W., Wen, Q.-Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12(2), 887–897 (2013)ADSMathSciNetCrossRef Liu, B., Gao, F., Jia, H.-Y., Huang, W., Zhang, W.-W., Wen, Q.-Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12(2), 887–897 (2013)ADSMathSciNetCrossRef
30.
go back to reference Yang, Y.-G., Cao, W.-F., Wen, Q.-Y.: Secure quantum private comparison. Phys. Scr. 80(6), 065002 (2009)ADSCrossRef Yang, Y.-G., Cao, W.-F., Wen, Q.-Y.: Secure quantum private comparison. Phys. Scr. 80(6), 065002 (2009)ADSCrossRef
31.
go back to reference Zhang, W.-W., Li, D., Song, T.-T., Li, Y.-B.: Quantum private comparison based on quantum search algorithm. Int. J. Theor. Phys. 52(5), 1466–1473 (2013)MathSciNetCrossRef Zhang, W.-W., Li, D., Song, T.-T., Li, Y.-B.: Quantum private comparison based on quantum search algorithm. Int. J. Theor. Phys. 52(5), 1466–1473 (2013)MathSciNetCrossRef
32.
go back to reference Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. In: First International Conference on Quantum, Nano, and Micro Technologies, 2007. ICQNM’07. IEEE (2007) Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. In: First International Conference on Quantum, Nano, and Micro Technologies, 2007. ICQNM’07. IEEE (2007)
34.
go back to reference Chou, W.-H., Hwang, T., Gu, J.: Semi-quantum private comparison protocol under an almost-dishonest third party. arXiv:1607.07961 (2016) Chou, W.-H., Hwang, T., Gu, J.: Semi-quantum private comparison protocol under an almost-dishonest third party. arXiv:​1607.​07961 (2016)
35.
36.
go back to reference Ye, T.-Y., Ye, C.-Q.: Measure-resend semi-quantum private comparison without entanglement. Int. J. Theor. Phys. 57(12), 3819–3834 (2018)MathSciNetCrossRef Ye, T.-Y., Ye, C.-Q.: Measure-resend semi-quantum private comparison without entanglement. Int. J. Theor. Phys. 57(12), 3819–3834 (2018)MathSciNetCrossRef
37.
go back to reference Thapliyala, K., Sharmab, R.D., Pathak, A.: Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment. arXiv:1608.00101v2 (2017) Thapliyala, K., Sharmab, R.D., Pathak, A.: Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment. arXiv:​1608.​00101v2 (2017)
39.
go back to reference Gu, J., Lin, P.H., Hwang, T.: Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol.’ Quantum Inf. Process. 17, 182 (2018)ADSMathSciNetCrossRef Gu, J., Lin, P.H., Hwang, T.: Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol.’ Quantum Inf. Process. 17, 182 (2018)ADSMathSciNetCrossRef
40.
go back to reference Lin, P.H., Hwang, T., Tsai, C.W.: Double CNOT attack on ‘Quantum key distribution with limited classical Bob.’ Int. J. Quantum Inf. 17, 1975001 (2019)MathSciNetCrossRef Lin, P.H., Hwang, T., Tsai, C.W.: Double CNOT attack on ‘Quantum key distribution with limited classical Bob.’ Int. J. Quantum Inf. 17, 1975001 (2019)MathSciNetCrossRef
41.
go back to reference Tsai, C.W., Chang, Y.C., Lai, Y.H., Yang, C.W.: Cryptanalysis of limited resource semi-quantum secret sharing. Quantum Inf. Process. 19, 224 (2020)ADSCrossRef Tsai, C.W., Chang, Y.C., Lai, Y.H., Yang, C.W.: Cryptanalysis of limited resource semi-quantum secret sharing. Quantum Inf. Process. 19, 224 (2020)ADSCrossRef
42.
go back to reference Krawec, W.O.: Mediated semi-quantum key distribution. Phys. Rev. A 91(3), 032323 (2015)ADSCrossRef Krawec, W.O.: Mediated semi-quantum key distribution. Phys. Rev. A 91(3), 032323 (2015)ADSCrossRef
43.
go back to reference Biham, E., Boyer, M., Brassard, G., Graaf, V.D., Mor, T.: Security of quantum key distribution against all collective attacks. Algorithmica 34(4), 372–388 (2002)MathSciNetCrossRef Biham, E., Boyer, M., Brassard, G., Graaf, V.D., Mor, T.: Security of quantum key distribution against all collective attacks. Algorithmica 34(4), 372–388 (2002)MathSciNetCrossRef
44.
go back to reference Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev Mod Phys 81(3), 1301–1350 (2009)ADSCrossRef Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev Mod Phys 81(3), 1301–1350 (2009)ADSCrossRef
Metadata
Title
Cryptanalysis and improvement in semi-quantum private comparison based on Bell states
Authors
Chia-Wei Tsai
Jason Lin
Chun-Wei Yang
Publication date
01-03-2021
Publisher
Springer US
Published in
Quantum Information Processing / Issue 3/2021
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-021-03047-7

Other articles of this Issue 3/2021

Quantum Information Processing 3/2021 Go to the issue