Skip to main content
Top
Published in: Quantum Information Processing 2/2014

01-02-2014

Quantum private comparison of equality protocol without a third party

Authors: Jason Lin, Chun-Wei Yang, Tzonelih Hwang

Published in: Quantum Information Processing | Issue 2/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper presents a novel quantum private comparison protocol that uses Einstein–Podolsky–Rosen pairs. The proposed protocol allows two parties to secretly compare their information without exposing their actual contents. The technique of entanglement swapping enables the comparison to be achieved without the help of a third party. Moreover, because the proposed protocol employs one-step transmission and decoy photons, it is secure against the various quantum attacks in existence thus far.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (1984)
2.
go back to reference Bennett, C.H., Brassard, G., Crepeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70(13), 1895–1899 (1993)MathSciNetCrossRefADSMATH Bennett, C.H., Brassard, G., Crepeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70(13), 1895–1899 (1993)MathSciNetCrossRefADSMATH
3.
go back to reference Bouwmeester, D., Pan, J.W., Mattle, K., Eibl, M., Weinfurter, H., Zeilinger, A.: Experimental quantum teleportation. Nature 390(6660), 575–579 (1997)CrossRefADS Bouwmeester, D., Pan, J.W., Mattle, K., Eibl, M., Weinfurter, H., Zeilinger, A.: Experimental quantum teleportation. Nature 390(6660), 575–579 (1997)CrossRefADS
5.
go back to reference Zhang, Z.J.: Multiparty quantum secret sharing of secure direct communication. Phys. Lett. A 342(1–2), 60–66 (2005)CrossRefADSMATH Zhang, Z.J.: Multiparty quantum secret sharing of secure direct communication. Phys. Lett. A 342(1–2), 60–66 (2005)CrossRefADSMATH
6.
go back to reference Zhang, Z.J.: Multiparty secret sharing of quantum information via cavity QED. Opt. Commun. 261(1), 199–202 (2006)CrossRefADS Zhang, Z.J.: Multiparty secret sharing of quantum information via cavity QED. Opt. Commun. 261(1), 199–202 (2006)CrossRefADS
7.
go back to reference Zhang, Z.J.: Robust multiparty quantum secret key sharing over two collective-noise channels. Phys. A 361(1), 233–238 (2006)CrossRefADS Zhang, Z.J.: Robust multiparty quantum secret key sharing over two collective-noise channels. Phys. A 361(1), 233–238 (2006)CrossRefADS
8.
go back to reference Hwang, T., Hwang, C.-C., Yang, C.-W., Li, C.-M.: Revisiting Deng et al.’s multiparty quantum secret sharing protocol. Int. J. Theor. Phys. 50(9), 2790–2798 (2011)MathSciNetCrossRefMATH Hwang, T., Hwang, C.-C., Yang, C.-W., Li, C.-M.: Revisiting Deng et al.’s multiparty quantum secret sharing protocol. Int. J. Theor. Phys. 50(9), 2790–2798 (2011)MathSciNetCrossRefMATH
9.
go back to reference Deng, F.-G., Long, G., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)CrossRefADS Deng, F.-G., Long, G., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)CrossRefADS
10.
go back to reference Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)CrossRefADS Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)CrossRefADS
11.
go back to reference Yang, C.-W., Tsai, C.-W., Hwang, T.: Fault tolerant two-step quantum secure direct communication protocol against collective noises. Sci. China Phys. 54(3), 496–501 (2011)CrossRef Yang, C.-W., Tsai, C.-W., Hwang, T.: Fault tolerant two-step quantum secure direct communication protocol against collective noises. Sci. China Phys. 54(3), 496–501 (2011)CrossRef
12.
go back to reference Yang, C.-W., Hwang, T.: Improved QSDC protocol over a collective-dephasing noise channel. Int. J. Theor. Phys. 51(12), 3941–3950 (2012)MathSciNetCrossRefMATH Yang, C.-W., Hwang, T.: Improved QSDC protocol over a collective-dephasing noise channel. Int. J. Theor. Phys. 51(12), 3941–3950 (2012)MathSciNetCrossRefMATH
13.
go back to reference Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (1982) Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (1982)
14.
go back to reference Yao, A.C.-C.: How to generate and exchange secrets. In: Proceedings of the 27th Annual Symposium on Foundations of Computer Science (1986) Yao, A.C.-C.: How to generate and exchange secrets. In: Proceedings of the 27th Annual Symposium on Foundations of Computer Science (1986)
15.
go back to reference Boudot, F., Schoenmakers, B., Traoré, J.: A fair and efficient solution to the socialist millionaires’ problem. Discret Appl. Math. 111(1–2), 23–36 (2001)CrossRefMATH Boudot, F., Schoenmakers, B., Traoré, J.: A fair and efficient solution to the socialist millionaires’ problem. Discret Appl. Math. 111(1–2), 23–36 (2001)CrossRefMATH
16.
go back to reference Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56(2), 1154–1162 (1997)CrossRefADS Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56(2), 1154–1162 (1997)CrossRefADS
17.
go back to reference Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42(5), 055305 (2009) Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42(5), 055305 (2009)
18.
go back to reference Yang, Y.G., Cao, W.F., Wen, Q.Y.: Secure quantum private comparison. Phys. Scripta 80(6), 065002 (2009) Yang, Y.G., Cao, W.F., Wen, Q.Y.: Secure quantum private comparison. Phys. Scripta 80(6), 065002 (2009)
19.
go back to reference Lin, J., Tseng, H.-Y., Hwang, T.: Intercept-resend attacks on Chen et al.’s quantum private comparison protocol and the improvements. Opt. Commun. 284(9), 2412–2414 (2011)CrossRefADS Lin, J., Tseng, H.-Y., Hwang, T.: Intercept-resend attacks on Chen et al.’s quantum private comparison protocol and the improvements. Opt. Commun. 284(9), 2412–2414 (2011)CrossRefADS
20.
go back to reference Chang, Y.-J., Tsai, C.-W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 12(2), 1077–1088 (2013)MathSciNetCrossRefADSMATH Chang, Y.-J., Tsai, C.-W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 12(2), 1077–1088 (2013)MathSciNetCrossRefADSMATH
21.
go back to reference Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283(7), 1561–1565 (2010)CrossRefADS Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283(7), 1561–1565 (2010)CrossRefADS
22.
23.
go back to reference Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11(2), 373–384 (2012) Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11(2), 373–384 (2012)
24.
go back to reference Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z.: A protocol for the quantum private comparison of equality with \(\chi \)-type state. Int. J. Theor. Phys. 51(1), 69–77 (2012)MathSciNetCrossRefMATH Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z.: A protocol for the quantum private comparison of equality with \(\chi \)-type state. Int. J. Theor. Phys. 51(1), 69–77 (2012)MathSciNetCrossRefMATH
25.
go back to reference Xu, G.A., Chen, X.B., Wei, Z.H., Li, M.J., Yang, Y.X.: An efficient protocol for the quantum private comparison of equality with a four-qubit cluster state. Int. J. Quantum Inf. 10(4) (2012) Xu, G.A., Chen, X.B., Wei, Z.H., Li, M.J., Yang, Y.X.: An efficient protocol for the quantum private comparison of equality with a four-qubit cluster state. Int. J. Quantum Inf. 10(4) (2012)
26.
go back to reference Liu, W., Wang, Y.B., Jiang, Z.T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284(12), 3160–3163 (2011)CrossRefADS Liu, W., Wang, Y.B., Jiang, Z.T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284(12), 3160–3163 (2011)CrossRefADS
27.
go back to reference Liu, B., Gao, F., Jia, H.-y., Huang, W., Zhang, W.-w., Wen, Q.-y.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12(2), 887–897 (2013) Liu, B., Gao, F., Jia, H.-y., Huang, W., Zhang, W.-w., Wen, Q.-y.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12(2), 887–897 (2013)
28.
go back to reference Zhang, W.-W., Zhang, K.-J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12(5), 1981–1990 (2013) Zhang, W.-W., Zhang, K.-J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12(5), 1981–1990 (2013)
29.
go back to reference Chen, X.-B., Su, Y., Niu, X.-X., Yang, Y.-X.: Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf. Process. doi:10.1007/s11128-012-0505-5 (2012) Chen, X.-B., Su, Y., Niu, X.-X., Yang, Y.-X.: Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf. Process. doi:10.​1007/​s11128-012-0505-5 (2012)
30.
go back to reference Li, Y.-B., Qin, S.-J., Yuan, Z., Huang, W., Sun, Y.: Quantum private comparison against decoherence noise. Quantum Inf. Process. 12(6), 2191–2205 (2013) Li, Y.-B., Qin, S.-J., Yuan, Z., Huang, W., Sun, Y.: Quantum private comparison against decoherence noise. Quantum Inf. Process. 12(6), 2191–2205 (2013)
31.
go back to reference Pan, J.W., Bouwmeester, D., Weinfurter, H., Zeilinger, A.: Experimental entanglement swapping: entangling photons that never interacted. Phys. Rev. Lett. 80(18), 3891–3894 (1998)MathSciNetCrossRefADSMATH Pan, J.W., Bouwmeester, D., Weinfurter, H., Zeilinger, A.: Experimental entanglement swapping: entangling photons that never interacted. Phys. Rev. Lett. 80(18), 3891–3894 (1998)MathSciNetCrossRefADSMATH
32.
go back to reference Zukowski, M., Zeilinger, A., Horne, M.A., Ekert, A.K.: Event-ready-detectors Bell experiment via entanglement swapping. Phys. Rev. Lett. 71(26), 4287–4290 (1993)CrossRefADS Zukowski, M., Zeilinger, A., Horne, M.A., Ekert, A.K.: Event-ready-detectors Bell experiment via entanglement swapping. Phys. Rev. Lett. 71(26), 4287–4290 (1993)CrossRefADS
33.
go back to reference Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)CrossRefADSMATH Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)CrossRefADSMATH
34.
go back to reference Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)CrossRefADS Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)CrossRefADS
35.
go back to reference Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack (vol 72, art no 044302, 2005). Phys. Rev. A 73(4), 049901 (2006) Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack (vol 72, art no 044302, 2005). Phys. Rev. A 73(4), 049901 (2006)
36.
go back to reference Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against Trojan horse attack. Quantum Phys. arXiv:quant-ph/0508168v1 (2005) Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against Trojan horse attack. Quantum Phys. arXiv:quant-ph/0508168v1 (2005)
37.
go back to reference Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)CrossRefADS Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)CrossRefADS
38.
go back to reference Yang, C.-W., Hwang, T., Luo, Y.-P.: Enhancement on “quantum blind signature based on two-state vector formalism”. Quantum Inf. Process. 12(1), 109–117 (2013)MathSciNetCrossRefADSMATH Yang, C.-W., Hwang, T., Luo, Y.-P.: Enhancement on “quantum blind signature based on two-state vector formalism”. Quantum Inf. Process. 12(1), 109–117 (2013)MathSciNetCrossRefADSMATH
39.
go back to reference Lin, J., Hwang, T.: An enhancement on Shi et al.’s multiparty quantum secret sharing protocol. Opt. Commun. 284(5), 1468–1471 (2011)MathSciNetCrossRefADS Lin, J., Hwang, T.: An enhancement on Shi et al.’s multiparty quantum secret sharing protocol. Opt. Commun. 284(5), 1468–1471 (2011)MathSciNetCrossRefADS
40.
go back to reference Damgard, I.B.: A design principle for hash functions. Adv Cryptol. 89(435), 416–427 (1990) Damgard, I.B.: A design principle for hash functions. Adv Cryptol. 89(435), 416–427 (1990)
Metadata
Title
Quantum private comparison of equality protocol without a third party
Authors
Jason Lin
Chun-Wei Yang
Tzonelih Hwang
Publication date
01-02-2014
Publisher
Springer US
Published in
Quantum Information Processing / Issue 2/2014
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-013-0645-2

Other articles of this Issue 2/2014

Quantum Information Processing 2/2014 Go to the issue