Skip to main content
Erschienen in: Quantum Information Processing 3/2021

01.03.2021

Cryptanalysis and improvement in semi-quantum private comparison based on Bell states

verfasst von: Chia-Wei Tsai, Jason Lin, Chun-Wei Yang

Erschienen in: Quantum Information Processing | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, Jiang proposed a semi-quantum private comparison (SQPC) protocol without the use of a quantum measurement device (Quantum Inf Process 19:182, 2020). However, this paper highlights a security loophole during the transmission phase of the protocol in which a malicious participant can perform a double CNOT attack to steal partial information of the other participant’s private secret without being detected. With the same assumption of the semi-quantum environment as Jiang’s protocol, this paper presents an improved protocol by adopting a strategy of pre-sharing session keys to overcome the double CNOT attack. Moreover, a security analysis of the collective attack is also provided for Jiang’s and the improved SQPC protocols.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984 (IEEE, New York, 1984), pp. 175–179; IBM Tech. Discl. Bull. 28, pp. 3153–3163 (1985) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984 (IEEE, New York, 1984), pp. 175–179; IBM Tech. Discl. Bull. 28, pp. 3153–3163 (1985)
2.
4.
Zurück zum Zitat Zidan, M., Sagheer, A., Metwally, N.: An autonomous competitive learning algorithm using quantum hamming neural networks. In: Proceedings of the international joint conference on neural networks (IJCNN, Killarney, Ireland, 2015), pp. 1–7. IEEE (2015) Zidan, M., Sagheer, A., Metwally, N.: An autonomous competitive learning algorithm using quantum hamming neural networks. In: Proceedings of the international joint conference on neural networks (IJCNN, Killarney, Ireland, 2015), pp. 1–7. IEEE (2015)
5.
Zurück zum Zitat Sagheer, A., Zidan, M., Abdelsamea, M.M.: A novel autonomous perceptron model for pattern classification applications. Entropy 21(8), 763 (2019)ADSMathSciNetCrossRef Sagheer, A., Zidan, M., Abdelsamea, M.M.: A novel autonomous perceptron model for pattern classification applications. Entropy 21(8), 763 (2019)ADSMathSciNetCrossRef
6.
Zurück zum Zitat Zidan, M., Abdel-Aty, A.H., El-Sadek, A., Zanaty, E.A., Abdel-Aty, M.: Low-cost autonomous perceptron neural network inspired by quantum computation. AIP Conf. Proc. 1905(1), 020005 (2017)CrossRef Zidan, M., Abdel-Aty, A.H., El-Sadek, A., Zanaty, E.A., Abdel-Aty, M.: Low-cost autonomous perceptron neural network inspired by quantum computation. AIP Conf. Proc. 1905(1), 020005 (2017)CrossRef
8.
Zurück zum Zitat Bennett, C.H., et al.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70(13), 1895 (1993)ADSMathSciNetCrossRef Bennett, C.H., et al.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70(13), 1895 (1993)ADSMathSciNetCrossRef
9.
Zurück zum Zitat Abdalla, M.S., Abdel-Aty, M., Obada, A.F.: Degree of entanglement for anisotropic coupled oscillators interacting with a single atom. J. Opt. B Quantum Semiclassical Opt. 4(6), 396–401 (2002)ADSCrossRef Abdalla, M.S., Abdel-Aty, M., Obada, A.F.: Degree of entanglement for anisotropic coupled oscillators interacting with a single atom. J. Opt. B Quantum Semiclassical Opt. 4(6), 396–401 (2002)ADSCrossRef
10.
Zurück zum Zitat Zhang, J.-S., Chen, A.-X., Abdel-Aty, M.: Two atoms in dissipative cavities in dispersive limit: entanglement sudden death and long-lived entanglement. J. Phys. B At. Mol. Opt. Phys. 43(2), 025501 (2010)ADSCrossRef Zhang, J.-S., Chen, A.-X., Abdel-Aty, M.: Two atoms in dissipative cavities in dispersive limit: entanglement sudden death and long-lived entanglement. J. Phys. B At. Mol. Opt. Phys. 43(2), 025501 (2010)ADSCrossRef
12.
Zurück zum Zitat Abdel-Aty, A.-H., Kadry, H., Zidan, M., Al-Sbou, Y., Zanaty, E.A., Abdel-Aty, M.: A quantum classification algorithm for classification incomplete patterns based on entanglement measure. J. Intell. Fuzzy Syst. 38(3), 2809–2816 (2020)CrossRef Abdel-Aty, A.-H., Kadry, H., Zidan, M., Al-Sbou, Y., Zanaty, E.A., Abdel-Aty, M.: A quantum classification algorithm for classification incomplete patterns based on entanglement measure. J. Intell. Fuzzy Syst. 38(3), 2809–2816 (2020)CrossRef
13.
Zurück zum Zitat Zidan, M., Abdel-Aty, A., Nguyene, D.M., Mohamed, A.S.A., Al-Sboug, Y., Eleuch, H., Abdel-Aty, M.: A quantum algorithm based on entanglement measure for classifying multivariate function into novel hidden classes. Results Phys. 15, 102549 (2019)CrossRef Zidan, M., Abdel-Aty, A., Nguyene, D.M., Mohamed, A.S.A., Al-Sboug, Y., Eleuch, H., Abdel-Aty, M.: A quantum algorithm based on entanglement measure for classifying multivariate function into novel hidden classes. Results Phys. 15, 102549 (2019)CrossRef
14.
Zurück zum Zitat Zidan, M., Abdel-Aty, A.H., El-shafei, M., Feraig, M., Al-Sbou, Y., Eleuch, H., Abdel-Aty, M.: Quantum classification algorithm based on competitive learning neural network and entanglement measure. Appl. Sci. 9(7), 1277 (2019)CrossRef Zidan, M., Abdel-Aty, A.H., El-shafei, M., Feraig, M., Al-Sbou, Y., Eleuch, H., Abdel-Aty, M.: Quantum classification algorithm based on competitive learning neural network and entanglement measure. Appl. Sci. 9(7), 1277 (2019)CrossRef
15.
Zurück zum Zitat Yao, A.C.: Protocols for secure computations. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS’82), p. 160. Washington, DC (1982) Yao, A.C.: Protocols for secure computations. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS’82), p. 160. Washington, DC (1982)
16.
Zurück zum Zitat Boudot, F., Schoenmakers, B., Traoré, J.: A fair and efficient solution to the socialist millionaires’ problem. Discrete Appl. Math. 111(1–2), 23–36 (2001)MathSciNetCrossRef Boudot, F., Schoenmakers, B., Traoré, J.: A fair and efficient solution to the socialist millionaires’ problem. Discrete Appl. Math. 111(1–2), 23–36 (2001)MathSciNetCrossRef
17.
Zurück zum Zitat Yang, Y.-G., Wen, Q.-Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42(5), 055305 (2009)ADSMathSciNetCrossRef Yang, Y.-G., Wen, Q.-Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42(5), 055305 (2009)ADSMathSciNetCrossRef
18.
Zurück zum Zitat Jia, H.-Y., Wen, Q.-Y., Song, T.-T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284(1), 545–549 (2011)ADSCrossRef Jia, H.-Y., Wen, Q.-Y., Song, T.-T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284(1), 545–549 (2011)ADSCrossRef
19.
Zurück zum Zitat Chang, Y.-J., Tsai, C.-W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 12(2), 1077–1088 (2013)ADSMathSciNetCrossRef Chang, Y.-J., Tsai, C.-W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 12(2), 1077–1088 (2013)ADSMathSciNetCrossRef
20.
Zurück zum Zitat Luo, Q.-B., Yang, G.-W., She, K., Niu, W.-N., Wang, Y.-Q.: Multi-party quantum private comparison protocol based on d-dimensional entangled states. Quantum Inf. Process. 13(10), 2343–2352 (2014)ADSMathSciNetCrossRef Luo, Q.-B., Yang, G.-W., She, K., Niu, W.-N., Wang, Y.-Q.: Multi-party quantum private comparison protocol based on d-dimensional entangled states. Quantum Inf. Process. 13(10), 2343–2352 (2014)ADSMathSciNetCrossRef
21.
Zurück zum Zitat Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11(2), 373–384 (2012)MathSciNetCrossRef Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11(2), 373–384 (2012)MathSciNetCrossRef
22.
Zurück zum Zitat Liu, W., Wang, Y.-B., Jiang, Z.-T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284(12), 3160–3163 (2011)ADSCrossRef Liu, W., Wang, Y.-B., Jiang, Z.-T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284(12), 3160–3163 (2011)ADSCrossRef
23.
Zurück zum Zitat Wen, L., Yong-Bin, W., Wei, C.: Quantum private comparison protocol based on Bell entangled states. Commun. Theor. Phys. 57(4), 583 (2012)ADSMathSciNetCrossRef Wen, L., Yong-Bin, W., Wei, C.: Quantum private comparison protocol based on Bell entangled states. Commun. Theor. Phys. 57(4), 583 (2012)ADSMathSciNetCrossRef
24.
Zurück zum Zitat Zhang, W.-W., Zhang, K.-J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12(5), 1981–1990 (2013)ADSMathSciNetCrossRef Zhang, W.-W., Zhang, K.-J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12(5), 1981–1990 (2013)ADSMathSciNetCrossRef
25.
Zurück zum Zitat Huang, S.-L., Hwang, T., Gope, P.: Multi-party quantum private comparison protocol with an almost dishonest third party using GHZ states. Int. J. Theor. Phys. 55(6), 2969–2976 (2016)CrossRef Huang, S.-L., Hwang, T., Gope, P.: Multi-party quantum private comparison protocol with an almost dishonest third party using GHZ states. Int. J. Theor. Phys. 55(6), 2969–2976 (2016)CrossRef
26.
Zurück zum Zitat Hung, S.-M., Hwang, S.-L., Hwang, T., Kao, S.-H.: Multiparty quantum private comparison with almost dishonest third parties for strangers. Quantum Inf. Process. 16(2), 36 (2017)ADSMathSciNetCrossRef Hung, S.-M., Hwang, S.-L., Hwang, T., Kao, S.-H.: Multiparty quantum private comparison with almost dishonest third parties for strangers. Quantum Inf. Process. 16(2), 36 (2017)ADSMathSciNetCrossRef
27.
Zurück zum Zitat Ye, T.-Y., Ji, Z.-X.: Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states. Sci. China Phys. Mech. Astron. 60(9), 090312 (2017)ADSCrossRef Ye, T.-Y., Ji, Z.-X.: Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states. Sci. China Phys. Mech. Astron. 60(9), 090312 (2017)ADSCrossRef
28.
Zurück zum Zitat Yang, Y.-G., Xia, J., Jia, X., Shi, L.: New quantum private comparison protocol without entanglement. Int. J. Quantum Inf. 10(06), 1250065 (2012)MathSciNetCrossRef Yang, Y.-G., Xia, J., Jia, X., Shi, L.: New quantum private comparison protocol without entanglement. Int. J. Quantum Inf. 10(06), 1250065 (2012)MathSciNetCrossRef
29.
Zurück zum Zitat Liu, B., Gao, F., Jia, H.-Y., Huang, W., Zhang, W.-W., Wen, Q.-Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12(2), 887–897 (2013)ADSMathSciNetCrossRef Liu, B., Gao, F., Jia, H.-Y., Huang, W., Zhang, W.-W., Wen, Q.-Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12(2), 887–897 (2013)ADSMathSciNetCrossRef
30.
Zurück zum Zitat Yang, Y.-G., Cao, W.-F., Wen, Q.-Y.: Secure quantum private comparison. Phys. Scr. 80(6), 065002 (2009)ADSCrossRef Yang, Y.-G., Cao, W.-F., Wen, Q.-Y.: Secure quantum private comparison. Phys. Scr. 80(6), 065002 (2009)ADSCrossRef
31.
Zurück zum Zitat Zhang, W.-W., Li, D., Song, T.-T., Li, Y.-B.: Quantum private comparison based on quantum search algorithm. Int. J. Theor. Phys. 52(5), 1466–1473 (2013)MathSciNetCrossRef Zhang, W.-W., Li, D., Song, T.-T., Li, Y.-B.: Quantum private comparison based on quantum search algorithm. Int. J. Theor. Phys. 52(5), 1466–1473 (2013)MathSciNetCrossRef
32.
Zurück zum Zitat Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. In: First International Conference on Quantum, Nano, and Micro Technologies, 2007. ICQNM’07. IEEE (2007) Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. In: First International Conference on Quantum, Nano, and Micro Technologies, 2007. ICQNM’07. IEEE (2007)
34.
Zurück zum Zitat Chou, W.-H., Hwang, T., Gu, J.: Semi-quantum private comparison protocol under an almost-dishonest third party. arXiv:1607.07961 (2016) Chou, W.-H., Hwang, T., Gu, J.: Semi-quantum private comparison protocol under an almost-dishonest third party. arXiv:​1607.​07961 (2016)
35.
Zurück zum Zitat Lang, Y.-F.: Semi-quantum private comparison using single photons. Int. J. Theor. Phys. 57(10), 3048–3055 (2018)MathSciNetCrossRef Lang, Y.-F.: Semi-quantum private comparison using single photons. Int. J. Theor. Phys. 57(10), 3048–3055 (2018)MathSciNetCrossRef
36.
Zurück zum Zitat Ye, T.-Y., Ye, C.-Q.: Measure-resend semi-quantum private comparison without entanglement. Int. J. Theor. Phys. 57(12), 3819–3834 (2018)MathSciNetCrossRef Ye, T.-Y., Ye, C.-Q.: Measure-resend semi-quantum private comparison without entanglement. Int. J. Theor. Phys. 57(12), 3819–3834 (2018)MathSciNetCrossRef
37.
Zurück zum Zitat Thapliyala, K., Sharmab, R.D., Pathak, A.: Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment. arXiv:1608.00101v2 (2017) Thapliyala, K., Sharmab, R.D., Pathak, A.: Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment. arXiv:​1608.​00101v2 (2017)
39.
Zurück zum Zitat Gu, J., Lin, P.H., Hwang, T.: Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol.’ Quantum Inf. Process. 17, 182 (2018)ADSMathSciNetCrossRef Gu, J., Lin, P.H., Hwang, T.: Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol.’ Quantum Inf. Process. 17, 182 (2018)ADSMathSciNetCrossRef
40.
Zurück zum Zitat Lin, P.H., Hwang, T., Tsai, C.W.: Double CNOT attack on ‘Quantum key distribution with limited classical Bob.’ Int. J. Quantum Inf. 17, 1975001 (2019)MathSciNetCrossRef Lin, P.H., Hwang, T., Tsai, C.W.: Double CNOT attack on ‘Quantum key distribution with limited classical Bob.’ Int. J. Quantum Inf. 17, 1975001 (2019)MathSciNetCrossRef
41.
Zurück zum Zitat Tsai, C.W., Chang, Y.C., Lai, Y.H., Yang, C.W.: Cryptanalysis of limited resource semi-quantum secret sharing. Quantum Inf. Process. 19, 224 (2020)ADSCrossRef Tsai, C.W., Chang, Y.C., Lai, Y.H., Yang, C.W.: Cryptanalysis of limited resource semi-quantum secret sharing. Quantum Inf. Process. 19, 224 (2020)ADSCrossRef
42.
Zurück zum Zitat Krawec, W.O.: Mediated semi-quantum key distribution. Phys. Rev. A 91(3), 032323 (2015)ADSCrossRef Krawec, W.O.: Mediated semi-quantum key distribution. Phys. Rev. A 91(3), 032323 (2015)ADSCrossRef
43.
Zurück zum Zitat Biham, E., Boyer, M., Brassard, G., Graaf, V.D., Mor, T.: Security of quantum key distribution against all collective attacks. Algorithmica 34(4), 372–388 (2002)MathSciNetCrossRef Biham, E., Boyer, M., Brassard, G., Graaf, V.D., Mor, T.: Security of quantum key distribution against all collective attacks. Algorithmica 34(4), 372–388 (2002)MathSciNetCrossRef
44.
Zurück zum Zitat Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev Mod Phys 81(3), 1301–1350 (2009)ADSCrossRef Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev Mod Phys 81(3), 1301–1350 (2009)ADSCrossRef
Metadaten
Titel
Cryptanalysis and improvement in semi-quantum private comparison based on Bell states
verfasst von
Chia-Wei Tsai
Jason Lin
Chun-Wei Yang
Publikationsdatum
01.03.2021
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 3/2021
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-021-03047-7

Weitere Artikel der Ausgabe 3/2021

Quantum Information Processing 3/2021 Zur Ausgabe