Skip to main content
Top
Published in: Quantum Information Processing 1/2014

01-01-2014

Differential phase shift quantum private comparison

Authors: Xing-tong Liu, Bo Zhang, Jian Wang, Chao-jing Tang, Jing-jing Zhao

Published in: Quantum Information Processing | Issue 1/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A novel quantum private comparison protocol based on a differential phase shift scheme is presented in this paper. In our protocol, two distrustful participants can compare the equality of information with the help of a semi-honest third party. Taking advantages of differential phase shift scheme, this protocol employs weak coherent pulses instead of single photons and can be implemented without expensive and impractical quantum devices, such as entangled photon source and quantum memory. Therefore, it is simpler and more flexible than previous protocols. Moreover, in principle, nearly 100 % qubit efficiency can be achieved because all photon counts obtained by TP contribute to the comparison. The correctness and security of the protocol are also discussed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, pp. 160–164 (1982) Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, pp. 160–164 (1982)
2.
go back to reference Boudot, F., Schoenmakers, B., Traore, J.: A fair and efficient solution to the socialist millionaires’ problem. Discrete Appl. Math. 111(1), 23–36 (2001)MathSciNetCrossRefMATH Boudot, F., Schoenmakers, B., Traore, J.: A fair and efficient solution to the socialist millionaires’ problem. Discrete Appl. Math. 111(1), 23–36 (2001)MathSciNetCrossRefMATH
4.
go back to reference Bennett, C., Brassard, G., et al.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175. Bangalore, India (1984) Bennett, C., Brassard, G., et al.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175. Bangalore, India (1984)
5.
go back to reference Inoue, K., Waks, E., Yamamoto, Y.: Differential phase shift quantum key distribution. Phys. Rev. Lett. 89(3), 37902 (2002)CrossRefADS Inoue, K., Waks, E., Yamamoto, Y.: Differential phase shift quantum key distribution. Phys. Rev. Lett. 89(3), 37902 (2002)CrossRefADS
9.
go back to reference Inoue, K., Ohashi, T., Kukita, T., Watanebe, K., Hayashi, S., Honjo, T., Takesue, H.: Differential-phase-shift quantum secret sharing. Opt. Express 16(20), 15469–15476 (2008)CrossRefADS Inoue, K., Ohashi, T., Kukita, T., Watanebe, K., Hayashi, S., Honjo, T., Takesue, H.: Differential-phase-shift quantum secret sharing. Opt. Express 16(20), 15469–15476 (2008)CrossRefADS
11.
go back to reference Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)CrossRefADS Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)CrossRefADS
15.
go back to reference De Martini, F., Giovannetti, V., Lloyd, S., Maccone, L., Nagali, E., Sansoni, L., Sciarrino, F.: Experimental quantum private queries with linear optics. Phys. Rev. A 80(1), 010302 (2009)CrossRef De Martini, F., Giovannetti, V., Lloyd, S., Maccone, L., Nagali, E., Sansoni, L., Sciarrino, F.: Experimental quantum private queries with linear optics. Phys. Rev. A 80(1), 010302 (2009)CrossRef
16.
go back to reference Gao, F., Liu, B., Wen, Q.Y., Chen, H.: Flexible quantum private queries based on quantum key distribution (2011). arXiv:1111.1511 (arXiv, preprint) Gao, F., Liu, B., Wen, Q.Y., Chen, H.: Flexible quantum private queries based on quantum key distribution (2011). arXiv:1111.1511 (arXiv, preprint)
17.
go back to reference Hillery, M., Ziman, M., Bužek, V., Bieliková, M.: Towards quantum-based privacy and voting. Phys. Lett. A 349(1), 75–81 (2006)CrossRefADSMATH Hillery, M., Ziman, M., Bužek, V., Bieliková, M.: Towards quantum-based privacy and voting. Phys. Lett. A 349(1), 75–81 (2006)CrossRefADSMATH
18.
go back to reference Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)CrossRefADS Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)CrossRefADS
19.
go back to reference Piotrowski, E.W., Sładkowski, J.: Quantum auctions: facts and myths. Phys. A Stat. Mech. Appl. 387(15), 3949–3953 (2008)CrossRefMathSciNet Piotrowski, E.W., Sładkowski, J.: Quantum auctions: facts and myths. Phys. A Stat. Mech. Appl. 387(15), 3949–3953 (2008)CrossRefMathSciNet
20.
go back to reference Hogg, T., Harsha, P., Chen, K.Y.: Quantum auctions. Int. J. Quantum Inf. 5(05), 751–780 (2007)CrossRefMATH Hogg, T., Harsha, P., Chen, K.Y.: Quantum auctions. Int. J. Quantum Inf. 5(05), 751–780 (2007)CrossRefMATH
21.
22.
go back to reference Jia, H.Y., Wen, Q.Y., Song, T.T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284(1), 545–549 (2011)CrossRefADS Jia, H.Y., Wen, Q.Y., Song, T.T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284(1), 545–549 (2011)CrossRefADS
33.
34.
go back to reference Xu, G.A., Chen, X.B., Wei, Z.H., Li, M.J., Yang, Y.X.: An efficient protocol for the quantum private comparison of equality with a four-qubit cluster state. Int. J. Quantum Inf. 10(4) (2012). doi:10.1142/S0219749912500451 Xu, G.A., Chen, X.B., Wei, Z.H., Li, M.J., Yang, Y.X.: An efficient protocol for the quantum private comparison of equality with a four-qubit cluster state. Int. J. Quantum Inf. 10(4) (2012). doi:10.​1142/​S021974991250045​1
36.
go back to reference Li, J., Jin, H., Jing, B.: Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol. Chin. Sci. Bull. 57(34), 4434–4441 (2012)CrossRefMATH Li, J., Jin, H., Jing, B.: Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol. Chin. Sci. Bull. 57(34), 4434–4441 (2012)CrossRefMATH
41.
42.
go back to reference Li, Y.B., Wen, Q.Y., Gao, F., Jia, H.Y., Sun, Y.: Information leak in Liu et al.’s quantum private comparison and a new protocol. Eur. Phys. J. D 66(4) (2012). doi:10.1140/epjd/e2012-30065-9 Li, Y.B., Wen, Q.Y., Gao, F., Jia, H.Y., Sun, Y.: Information leak in Liu et al.’s quantum private comparison and a new protocol. Eur. Phys. J. D 66(4) (2012). doi:10.​1140/​epjd/​e2012-30065-9
45.
go back to reference Waks, E., Takesue, H., Yamamoto, Y.: Security of differential-phase-shift quantum key distribution against individual attacks. Phys. Rev. A 73(1), 012344 (2006)CrossRefADS Waks, E., Takesue, H., Yamamoto, Y.: Security of differential-phase-shift quantum key distribution against individual attacks. Phys. Rev. A 73(1), 012344 (2006)CrossRefADS
46.
go back to reference Curty, M., Tamaki, K., Moroder, T.: Effect of detector dead times on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks. Phys. Rev. A 77(5, Part a) (2008). doi:10.1103/PhysRevA.77.052321 Curty, M., Tamaki, K., Moroder, T.: Effect of detector dead times on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks. Phys. Rev. A 77(5, Part a) (2008). doi:10.​1103/​PhysRevA.​77.​052321
47.
go back to reference Chen-Xu, F., Rong-Zhen, J., Wen-Han, Z.: Performance of differential-phase-shift keying protocol applying 1310 nm up-conversion single-photon detector. Chin. Phys. Lett. 25(9), 3135–3137 (2008)CrossRefADS Chen-Xu, F., Rong-Zhen, J., Wen-Han, Z.: Performance of differential-phase-shift keying protocol applying 1310 nm up-conversion single-photon detector. Chin. Phys. Lett. 25(9), 3135–3137 (2008)CrossRefADS
49.
go back to reference Gomez-Sousa, H., Curty, M.: Upper bounds on the performance of differential-phase-shift quantum key distribution. Quantum Inf. Comput. 9(1–2), 62–80 (2009)MathSciNetMATH Gomez-Sousa, H., Curty, M.: Upper bounds on the performance of differential-phase-shift quantum key distribution. Quantum Inf. Comput. 9(1–2), 62–80 (2009)MathSciNetMATH
50.
go back to reference Rong-Zhen, J., Chen-Xu, F., Hai-Qiang, M.: Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system. Chin. Phys. B 18(3), 915–917 (2009)CrossRefADS Rong-Zhen, J., Chen-Xu, F., Hai-Qiang, M.: Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system. Chin. Phys. B 18(3), 915–917 (2009)CrossRefADS
51.
go back to reference Ma, L., Nam, S., Xu, H., Baek, B., Chang, T., Slattery, O., Mink, A., Tang, X.: 1310 nm differential-phase-shift qkd system using superconducting single-photon detectors. New J. Phys. 11 (2009). doi:10.1088/1367-2630/11/4/045020 Ma, L., Nam, S., Xu, H., Baek, B., Chang, T., Slattery, O., Mink, A., Tang, X.: 1310 nm differential-phase-shift qkd system using superconducting single-photon detectors. New J. Phys. 11 (2009). doi:10.​1088/​1367-2630/​11/​4/​045020
53.
go back to reference Jindong, W., Xiaojuan, Q., Huani, Z., Zhengjun, W., Changjun, L., Songhao, L.: A free-space-based differential phase shift quantum key distribution scheme with higher key creation efficiency. Opt. Commun. 282(16), 3379–3381 (2009). doi:10.1016/j.optcom.2009.05.020 CrossRef Jindong, W., Xiaojuan, Q., Huani, Z., Zhengjun, W., Changjun, L., Songhao, L.: A free-space-based differential phase shift quantum key distribution scheme with higher key creation efficiency. Opt. Commun. 282(16), 3379–3381 (2009). doi:10.​1016/​j.​optcom.​2009.​05.​020 CrossRef
56.
57.
go back to reference Namekata, N., Takesue, H., Honjo, T., Tokura, Y., Inoue, S.: High-rate quantum key distribution over 100 km using ultra-low-noise, 2-ghz sinusoidally gated ingaas/inp avalanche photodiodes. Opt. Express 19(11), 10632–10639 (2011)CrossRefADS Namekata, N., Takesue, H., Honjo, T., Tokura, Y., Inoue, S.: High-rate quantum key distribution over 100 km using ultra-low-noise, 2-ghz sinusoidally gated ingaas/inp avalanche photodiodes. Opt. Express 19(11), 10632–10639 (2011)CrossRefADS
58.
go back to reference Xiao-Lin, Y., Jin-Dong, W., Zheng-Jun, W., Bang-Hong, G., Song-Hao, L.: A new multi-wavelength two-way quantum key distribution system with a single optical source. Acta Phys. Sin. 61(18) (2012). doi:10.7498/aps.61.184215 Xiao-Lin, Y., Jin-Dong, W., Zheng-Jun, W., Bang-Hong, G., Song-Hao, L.: A new multi-wavelength two-way quantum key distribution system with a single optical source. Acta Phys. Sin. 61(18) (2012). doi:10.​7498/​aps.​61.​184215
59.
go back to reference Lütkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61(5), 052304 (2000)CrossRefADS Lütkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61(5), 052304 (2000)CrossRefADS
Metadata
Title
Differential phase shift quantum private comparison
Authors
Xing-tong Liu
Bo Zhang
Jian Wang
Chao-jing Tang
Jing-jing Zhao
Publication date
01-01-2014
Publisher
Springer US
Published in
Quantum Information Processing / Issue 1/2014
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-013-0708-4

Other articles of this Issue 1/2014

Quantum Information Processing 1/2014 Go to the issue