Skip to main content
Top
Published in: Quantum Information Processing 6/2015

01-06-2015

Cryptanalysis and improvement of a quantum communication-based online shopping mechanism

Authors: Wei Huang, Ying-Hui Yang, Heng-Yue Jia

Published in: Quantum Information Processing | Issue 6/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recently, Chou et al. (Electron Commer Res 14:349–367, 2014) presented a novel controlled quantum secure direct communication protocol which can be used for online shopping. The authors claimed that their protocol was immune to the attacks from both external eavesdropper and internal betrayer. However, we find that this protocol is vulnerable to the attack from internal betrayer. In this paper, we analyze the security of this protocol to show that the controller in this protocol is able to eavesdrop the secret information of the sender (i.e., the customer’s shopping information), which indicates that it cannot be used for secure online shopping as the authors expected. Accordingly, an improvement of this protocol, which could resist the controller’s attack, is proposed. In addition, we present another protocol which is more appropriate for online shopping. Finally, a discussion about the difference in detail of the quantum secure direct communication process between regular quantum communications and online shopping is given.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Knill, E., Laflamme, R., Zurek, W.H.: Resilient quantum computation. Science 279, 342–345 (1998)CrossRefADS Knill, E., Laflamme, R., Zurek, W.H.: Resilient quantum computation. Science 279, 342–345 (1998)CrossRefADS
2.
go back to reference Knill, E., Laflamme, R., Milburn, G.J.: A scheme for efficient quantum computation with linear optics. Nature 409, 46–52 (2001)CrossRefADS Knill, E., Laflamme, R., Milburn, G.J.: A scheme for efficient quantum computation with linear optics. Nature 409, 46–52 (2001)CrossRefADS
3.
go back to reference Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. Santa Fe (1994) Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. Santa Fe (1994)
4.
go back to reference Bennett, C.H., Brassard, G.. In: Proceedings IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179. IEEE Press, New York (1984) Bennett, C.H., Brassard, G.. In: Proceedings IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179. IEEE Press, New York (1984)
5.
go back to reference Deng, F.G., Long, G.L.: Controlled order rearrangement encryption for quantum key distribution. Phys. Rev. A 68, 042315 (2003)CrossRefADS Deng, F.G., Long, G.L.: Controlled order rearrangement encryption for quantum key distribution. Phys. Rev. A 68, 042315 (2003)CrossRefADS
6.
go back to reference Deng, F.G., Long, G.L.: Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys. Rev. A 70, 012311 (2004)CrossRefADS Deng, F.G., Long, G.L.: Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys. Rev. A 70, 012311 (2004)CrossRefADS
7.
go back to reference Song, S.Y., Wang, C.: Recent development in quantum communication. Chin. Sci. Bull. 57, 4694–4700 (2012)CrossRef Song, S.Y., Wang, C.: Recent development in quantum communication. Chin. Sci. Bull. 57, 4694–4700 (2012)CrossRef
8.
go back to reference Liu, B., Gao, F., Wen, Q.Y.: Single-photon multiparty quantum cryptographic protocols with collective detection. IEEE J. Quantum Electron. 47, 1383–1390 (2011)CrossRefADS Liu, B., Gao, F., Wen, Q.Y.: Single-photon multiparty quantum cryptographic protocols with collective detection. IEEE J. Quantum Electron. 47, 1383–1390 (2011)CrossRefADS
9.
go back to reference Lin, S., Guo, G.D., et al.: Quantum key distribution: defeating collective noise without reducing efficiency. Quantum Inf. Comput. 14, 845–856 (2014)MathSciNet Lin, S., Guo, G.D., et al.: Quantum key distribution: defeating collective noise without reducing efficiency. Quantum Inf. Comput. 14, 845–856 (2014)MathSciNet
11.
go back to reference Wang, T.Y., Wen, Q.Y., Chen, X.B., Guo, F.Z., Zhu, F.C.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281, 6130–6134 (2008)CrossRefADS Wang, T.Y., Wen, Q.Y., Chen, X.B., Guo, F.Z., Zhu, F.C.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281, 6130–6134 (2008)CrossRefADS
12.
go back to reference Yang, Y.G., Teng, Y.W., Chai, H.P., Wen, Q.Y.: Fault-tolerant quantum secret sharing against collective noise. Phys. Scr. 83, 025003 (2011)CrossRefADS Yang, Y.G., Teng, Y.W., Chai, H.P., Wen, Q.Y.: Fault-tolerant quantum secret sharing against collective noise. Phys. Scr. 83, 025003 (2011)CrossRefADS
13.
go back to reference Sun, Y., Deng, J.Z., Qin, S.J.: Quantum secret sharing with bidirectional authentication. Acta Phys. Sin. 57, 4689–4694 (2008)MATH Sun, Y., Deng, J.Z., Qin, S.J.: Quantum secret sharing with bidirectional authentication. Acta Phys. Sin. 57, 4689–4694 (2008)MATH
14.
go back to reference Yan, F.L., Gao, T.: Quantum secret sharing between multiparty and multiparty without entanglement. Phys. Rev. A 72, 012304 (2005)CrossRefADS Yan, F.L., Gao, T.: Quantum secret sharing between multiparty and multiparty without entanglement. Phys. Rev. A 72, 012304 (2005)CrossRefADS
15.
go back to reference Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)CrossRefADS Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)CrossRefADS
16.
go back to reference Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)CrossRefADS Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)CrossRefADS
17.
go back to reference Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68, 042317 (2003)CrossRefADS Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68, 042317 (2003)CrossRefADS
18.
go back to reference Wang, C., Deng, F.G., Li, Y.S., Liu, X.S., Long, G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71, 044305 (2005)CrossRefADS Wang, C., Deng, F.G., Li, Y.S., Liu, X.S., Long, G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71, 044305 (2005)CrossRefADS
19.
go back to reference Wang, C., Deng, F.G., Long, G.L.: Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state. Opt. Commun. 253, 15–20 (2005)CrossRefADS Wang, C., Deng, F.G., Long, G.L.: Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state. Opt. Commun. 253, 15–20 (2005)CrossRefADS
20.
go back to reference Huang, W., Wen, Q.Y., Jia, H.Y., Qin, S.J., Gao, F.: Fault tolerant quantum secure direct communication with quantum encryption against collective noise. Chin. Phys. B 21, 100308 (2012)CrossRefADS Huang, W., Wen, Q.Y., Jia, H.Y., Qin, S.J., Gao, F.: Fault tolerant quantum secure direct communication with quantum encryption against collective noise. Chin. Phys. B 21, 100308 (2012)CrossRefADS
21.
go back to reference Long, G.L., Deng, F.G., Wang, C., Li, X.H., et al.: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2, 251 (2007)CrossRefADS Long, G.L., Deng, F.G., Wang, C., Li, X.H., et al.: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2, 251 (2007)CrossRefADS
22.
go back to reference Deng, F.G., Li, X.H., Li, C.Y., et al.: Quantum secure direct communication network with Einstein–Podolsky–Rosen pairs. Phys. Lett. A 359, 359–365 (2006) Deng, F.G., Li, X.H., Li, C.Y., et al.: Quantum secure direct communication network with Einstein–Podolsky–Rosen pairs. Phys. Lett. A 359, 359–365 (2006)
23.
go back to reference Zhang, W.W., Gao, F., Liu, B., Wen, Q.Y., Chen, H.: A watermark strategy for quantum images based on quantum fourier transform. Quantum Inf. Process. 12, 793–803 (2013)CrossRefADSMATHMathSciNet Zhang, W.W., Gao, F., Liu, B., Wen, Q.Y., Chen, H.: A watermark strategy for quantum images based on quantum fourier transform. Quantum Inf. Process. 12, 793–803 (2013)CrossRefADSMATHMathSciNet
25.
go back to reference Yang, Y.G., Peng, X., Tian, J., Zhang, H.: Analysis and improvement of the dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf. Process. 13, 1931–1936 (2014)CrossRefADSMATHMathSciNet Yang, Y.G., Peng, X., Tian, J., Zhang, H.: Analysis and improvement of the dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf. Process. 13, 1931–1936 (2014)CrossRefADSMATHMathSciNet
26.
go back to reference Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)CrossRefADS Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)CrossRefADS
27.
go back to reference Zhang, K.J., Song, T.T., Zuo, H.J., Zhang, W.W.: A secure quantum group signature scheme based on Bell states. Phys. Scr. 87, 045012 (2013)CrossRefADS Zhang, K.J., Song, T.T., Zuo, H.J., Zhang, W.W.: A secure quantum group signature scheme based on Bell states. Phys. Scr. 87, 045012 (2013)CrossRefADS
28.
go back to reference Liu, B., Gao, F., Jia, H.Y., et al.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12, 887–897 (2012)CrossRefADSMathSciNet Liu, B., Gao, F., Jia, H.Y., et al.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12, 887–897 (2012)CrossRefADSMathSciNet
29.
30.
go back to reference Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42, 055305 (2009)CrossRefADSMathSciNet Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42, 055305 (2009)CrossRefADSMathSciNet
31.
go back to reference Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11, 373–384 (2012)CrossRefMATHMathSciNet Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11, 373–384 (2012)CrossRefMATHMathSciNet
32.
go back to reference Li, Y.B., Wen, Q.Y., Gao, F., et al.: Information leak in Liu et al.’s quantum private comparison and a new protocol. Eur. Phys. J. D 66, 110 (2012)CrossRefADS Li, Y.B., Wen, Q.Y., Gao, F., et al.: Information leak in Liu et al.’s quantum private comparison and a new protocol. Eur. Phys. J. D 66, 110 (2012)CrossRefADS
33.
go back to reference Zhang, W.W., Li, D., Zhang, K.J., Zuo, H.J.: A quantum protocol for millionaire problem with Bell states. Quantum Inf. Process. 12, 2241–2249 (2013)CrossRefADSMATHMathSciNet Zhang, W.W., Li, D., Zhang, K.J., Zuo, H.J.: A quantum protocol for millionaire problem with Bell states. Quantum Inf. Process. 12, 2241–2249 (2013)CrossRefADSMATHMathSciNet
34.
go back to reference Huang, W., Wen, Q.Y., Liu, B., Gao, F., Sun, Y.: Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels. Sci. China Phys. Mech. Astron. 56, 1670–1678 (2013)CrossRefADS Huang, W., Wen, Q.Y., Liu, B., Gao, F., Sun, Y.: Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels. Sci. China Phys. Mech. Astron. 56, 1670–1678 (2013)CrossRefADS
35.
go back to reference Huang, W., Wen, Q.Y., Liu, B., et al.: Quantum anonymous ranking. Phys. Rev. A 89, 032325 (2014)CrossRefADS Huang, W., Wen, Q.Y., Liu, B., et al.: Quantum anonymous ranking. Phys. Rev. A 89, 032325 (2014)CrossRefADS
36.
go back to reference Wen, X.J.: An E-payment system based on quantum group signature. Phys. Scr. 82, 065403–065407 (2010)CrossRef Wen, X.J.: An E-payment system based on quantum group signature. Phys. Scr. 82, 065403–065407 (2010)CrossRef
37.
go back to reference Wen, X.J., Nie, Z.: An E-payment system based on quantum blind and group signature. In: Proceedings of International Symposium on Data, Privacy, and E-Commerce, America (2010) Wen, X.J., Nie, Z.: An E-payment system based on quantum blind and group signature. In: Proceedings of International Symposium on Data, Privacy, and E-Commerce, America (2010)
38.
go back to reference Wen, X.J., Chen, Y.Z., Fang, J.B.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12, 549–558 (2013)CrossRefADSMATHMathSciNet Wen, X.J., Chen, Y.Z., Fang, J.B.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12, 549–558 (2013)CrossRefADSMATHMathSciNet
39.
go back to reference Cai, X.Q., Wei, C.Y.: Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12, 1651–1657 (2013)CrossRefADSMATHMathSciNet Cai, X.Q., Wei, C.Y.: Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12, 1651–1657 (2013)CrossRefADSMATHMathSciNet
40.
go back to reference Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47, 630–635 (2011)CrossRefADS Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47, 630–635 (2011)CrossRefADS
41.
go back to reference Huang, W., Wen, Q.Y., Liu, B., Gao, F., Sun, Y.: Cryptanalysis of a multi-party quantum key agreement protocol with single particles. Quantum Inf. Process. 13, 1651–1657 (2013)CrossRefADSMathSciNet Huang, W., Wen, Q.Y., Liu, B., Gao, F., Sun, Y.: Cryptanalysis of a multi-party quantum key agreement protocol with single particles. Quantum Inf. Process. 13, 1651–1657 (2013)CrossRefADSMathSciNet
42.
go back to reference Lo, H.K., Ko, T.M.: Some attacks on quantum-based cryptographic protocols. Quantum Inf. Comput. 5, 40–47 (2005)MATHMathSciNet Lo, H.K., Ko, T.M.: Some attacks on quantum-based cryptographic protocols. Quantum Inf. Comput. 5, 40–47 (2005)MATHMathSciNet
43.
go back to reference Liu, B., Gao, F., Wen, Q.Y.: Eavesdropping and improvement to multiparty quantum secret sharing with collective eavesdropping-check. Int. J. Theor. Phys. 51, 1211–1223 (2012)CrossRefMATH Liu, B., Gao, F., Wen, Q.Y.: Eavesdropping and improvement to multiparty quantum secret sharing with collective eavesdropping-check. Int. J. Theor. Phys. 51, 1211–1223 (2012)CrossRefMATH
44.
go back to reference Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “experimental demonstration of a quantum protocol for Byzantine agreement and liar detection”. Phys. Rev. Lett. 101, 208901 (2008)CrossRefADS Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “experimental demonstration of a quantum protocol for Byzantine agreement and liar detection”. Phys. Rev. Lett. 101, 208901 (2008)CrossRefADS
45.
go back to reference Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “Quantum exam”. Phys. Lett. A 360, 748 (2007)CrossRefADS Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “Quantum exam”. Phys. Lett. A 360, 748 (2007)CrossRefADS
46.
go back to reference Qin, S.J., Gao, F., Guo, F.Z., Wen, Q.Y.: Comment on “Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair”. Phys. Rev. A 82, 036301 (2010)CrossRefADSMathSciNet Qin, S.J., Gao, F., Guo, F.Z., Wen, Q.Y.: Comment on “Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair”. Phys. Rev. A 82, 036301 (2010)CrossRefADSMathSciNet
47.
go back to reference Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)CrossRefADS Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)CrossRefADS
48.
go back to reference Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the brádler-dušek protocol. Quantum Inf. Comput. 7, 329–334 (2007)MATHMathSciNet Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the brádler-dušek protocol. Quantum Inf. Comput. 7, 329–334 (2007)MATHMathSciNet
49.
go back to reference Wang, Q.L., Zhang, W.W., Su, Q.: Revisiting “The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution”. Int. J. Theor. Phys. 53, 3147–3153 (2014)CrossRefMATH Wang, Q.L., Zhang, W.W., Su, Q.: Revisiting “The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution”. Int. J. Theor. Phys. 53, 3147–3153 (2014)CrossRefMATH
50.
go back to reference Wang, Q.L., Zhang, K.J.: Security analysis and improvement of the dining cryptographer problem-based anonymous quantum communication via non-maximally entanglement state analysis. Int. J. Theor. Phys. 54, 106–115 (2015)CrossRef Wang, Q.L., Zhang, K.J.: Security analysis and improvement of the dining cryptographer problem-based anonymous quantum communication via non-maximally entanglement state analysis. Int. J. Theor. Phys. 54, 106–115 (2015)CrossRef
51.
go back to reference Chou, Y.H., Lin, F.J., Zeng, G.J.: An efficient novel online shopping mechanism based on quantum communication. Electron. Commer. Res. 14, 349–367 (2014)CrossRef Chou, Y.H., Lin, F.J., Zeng, G.J.: An efficient novel online shopping mechanism based on quantum communication. Electron. Commer. Res. 14, 349–367 (2014)CrossRef
52.
go back to reference Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23 (2006)CrossRefADSMATH Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23 (2006)CrossRefADSMATH
53.
go back to reference Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74, 054302 (2006)CrossRefADS Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74, 054302 (2006)CrossRefADS
54.
go back to reference D’Ariano, G.M., Lo Presti, P., Paris, M.G.A.: Using entanglement improves the precision of quantum measurements. Phys. Rev. Lett. 87, 270404 (2001)CrossRef D’Ariano, G.M., Lo Presti, P., Paris, M.G.A.: Using entanglement improves the precision of quantum measurements. Phys. Rev. Lett. 87, 270404 (2001)CrossRef
Metadata
Title
Cryptanalysis and improvement of a quantum communication-based online shopping mechanism
Authors
Wei Huang
Ying-Hui Yang
Heng-Yue Jia
Publication date
01-06-2015
Publisher
Springer US
Published in
Quantum Information Processing / Issue 6/2015
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-015-0958-4

Other articles of this Issue 6/2015

Quantum Information Processing 6/2015 Go to the issue