Skip to main content
Log in

Quantum Private Comparison Protocol with the Random Rotation

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

We proposed a quantum secret comparison protocol for two parties with the random rotation angle, which is under the help of a semi-honest third party. The random rotation angle made it possible for the protocol to be safer and the two parties cannot deduce each other’s information by means of their own possessions. The participants’ secrets are divided into groups and the third party announced the results by group, which made the protocol more safely and sometimes it can save lots of resources. Moreover, during our protocol process any information of the two parties will not be leaked, even the third party cannot get any participants’ secrets.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Benaloh, J.: Verifiable secret-ballot elections. PhD thesis, Yale University (1987)

  2. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  3. Bennett, C.H., Brassard, G.: In: IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE Press, New York (1984)

    Google Scholar 

  4. Bennett, C.H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895 (1993)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  5. Bennett, C.H., DiVincenzo, D.P., Smolin, J.A., Wootters, W.K.: Mixed-state entanglement and quantum error correction. Phys. Rev. A 54, 3824 (1996)

    Article  MathSciNet  ADS  Google Scholar 

  6. Bonanome, M., Buzěk, V., Hillery, M., Ziman, M.: Toward protocols for quantum-ensured privacy and secure voting. Phys. Rev. A 84, 022331 (2011)

    Article  ADS  Google Scholar 

  7. Bouwmeester, D., Pan, J.W., Mattle, K., Eibl, M., Weinfurter, H., Zeilinger, A.: Experimental quantum teleportation. Nature 390, 575–579 (1997)

    Article  ADS  Google Scholar 

  8. Chen, X.B., Wen, Q.Y., Zhu, F.C.: Quantum circuits for probabilistic entanglement teleportation via a partially entangled pair. Int. J. Quantum Inf. 5, 717 (2007)

    Article  MATH  Google Scholar 

  9. Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561–1565 (2010)

    Article  ADS  Google Scholar 

  10. Deng, F.G., Long, G.L., Zhou, H.Y.: Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs. Phys. Lett. A 337, 329 (2005)

    Article  ADS  MATH  Google Scholar 

  11. Du, J.Z., Chen, X.B., Wen, Q.Y., Zhu, F.C.: Secure multiparty quantum summation. Acta Phys. Sin. 56, 6214 (2007)

    MathSciNet  Google Scholar 

  12. Dür, W., Briegel, H.-J., Ciracl, J.I., Zoller, P.: Quantum repeaters based on entanglement purification. Phys. Rev. A 59, 169–181 (1999)

    Article  ADS  Google Scholar 

  13. Ekert, A.K.: Quantum cryptography based on Bell theorem. Phys. Rev. Lett. 67(6), 661–663 (1991)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  14. Guo, G.P., Guo, G.C.: Quantum secret sharing without entanglement. Phys. Lett. A 310, 247 (2003)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  15. Guo, F.Z., Gao, F., Wen, Q.Y., Zhu, F.C.: A two-step channel-encrypting quantum key distribution protocol. Int. J. Quantum Inf. 8(6), 1013–1022 (2010)

    Article  MATH  Google Scholar 

  16. Han, L.F., Liu, Y.M., Yuan, H., Zhang, Z.J.: Efficient multiparty-to-multiparty quantum secret sharing via continuous variable operations. Phys. Rev. Lett. 24, 3312 (2007)

    MATH  Google Scholar 

  17. Hillery, M., Buzěk, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829–1834 (1999)

    Article  MathSciNet  ADS  Google Scholar 

  18. Jia, H.Y., Wen, Q.Y., Song, T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284, 545–549 (2011)

    Article  ADS  Google Scholar 

  19. Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162 (1999)

    Article  ADS  Google Scholar 

  20. Kye, W.H., Kim, C.M., Kim, M.S., Park, Y.J.: Quantum key distribution with blind polarization bases. Phys. Rev. Lett. 95, 040501 (2005)

    Article  ADS  Google Scholar 

  21. Lin, S., Sun, Y., Liu, X.F., Yao, Z.Q.: Quantum private comparison protocol with d-dimensional Bell states. Quantum Inf. Process. (2012). doi:10.1007/s11128-012-0395-6

    Google Scholar 

  22. Liu, B., Gao, F., Wen, Q.Y.: Single-photon multiparty quantum cryptographic protocols with collective detection. IEEE J. Quantum Electron. 47, 1389–1390 (2011)

    ADS  Google Scholar 

  23. Liu, B., Gao, F., Jia, H.Y., Huang, W., Zhang, W.W., Wen, Q.Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. (2012). doi:10.1007/s11128-012-0439-y

    Google Scholar 

  24. Liu, W., Wang, Y.B., Cui, W.: Quantum private comparison protocol based on Bell entangled states. Commun. Theor. Phys. 57, 583–588 (2012)

    Article  ADS  MATH  Google Scholar 

  25. Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56(2), 1154–1162 (1997)

    Article  ADS  Google Scholar 

  26. Pan, J.W., Simon, C., Brukner, Č., Zeilinger, A.: Entanglement purification for quantum communication. Nature 410, 1067–1070 (2001)

    Article  ADS  Google Scholar 

  27. Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of the Hillery-Buzěk-Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76, 062324 (2007)

    Article  ADS  Google Scholar 

  28. Sun, Y., Wen, Q.Y., Gao, F., Zhu, F.C.: Robust variations of the Bennett-Brassard 1984 protocol against collective noise. Phys. Rev. A 80, 032321 (2009)

    Article  ADS  Google Scholar 

  29. Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11, 373–384 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  30. Wang, X.B.: Quantum key distribution with two-qubit quantum codes. Phys. Rev. Lett. 92, 077902 (2004)

    Article  ADS  Google Scholar 

  31. Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A, Math. Theor. 42, 055305 (2009)

    Article  MathSciNet  ADS  Google Scholar 

  32. Yang, Y.G., Cao, W.F., Wen, Q.Y.: Secure quantum private comparison. Phys. Scr. 80(6), 065002 (2009)

    Article  ADS  Google Scholar 

  33. Zhang, Z.J., Liu, Y.M., Man, Z.X.: Many-agent controlled teleportation of multi-qubit quantum information via quantum entanglement swapping. Commun. Theor. Phys. 44, 847 (2005)

    Article  ADS  Google Scholar 

  34. Zhang, Q., Yin, J., Chen, T.Y., Lu, S., Zhang, J., Li, X.Q., Yang, T., Wang, X.B., Pan, J.W.: Experimental fault-tolerant quantum cryptography in a decoherence-free subspace. Phys. Rev. A 73, 020301 (2006)

    Article  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fenzhuo Guo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zi, W., Guo, F., Luo, Y. et al. Quantum Private Comparison Protocol with the Random Rotation. Int J Theor Phys 52, 3212–3219 (2013). https://doi.org/10.1007/s10773-013-1616-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-013-1616-1

Keywords

Navigation