Skip to main content
Erschienen in: Quantum Information Processing 6/2015

01.06.2015

Quantum private comparison with a malicious third party

verfasst von: Zhiwei Sun, Jianping Yu, Ping Wang, Lingling Xu, Chunhui Wu

Erschienen in: Quantum Information Processing | Ausgabe 6/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we will show that quantum private comparison protocol is secure when a malicious third party is presented. The security of the protocol is considered in a cheat-sensitive model, in which the TP is kept honest by the possibility of being caught cheating. Besides, we enhance the privacy of the quantum private comparison protocol, where the participants’ inputs and the comparison result can be preserved. Furthermore, in contrast to pervious protocols requiring a large amount of quantum resources, such as entanglement and quantum memory, our protocol is based on BB84 protocol, which is more feasible for practical applications. Finally, we analyze the security of the presented protocol.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yao, A.: Protocols for Secure Computations. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS’ 82), 160 (1982) Yao, A.: Protocols for Secure Computations. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS’ 82), 160 (1982)
2.
Zurück zum Zitat Goldreich, O.: Foundations of Cryptography, vol. 2. Cambridge University Press, Cambridge (2004). Chapter 7CrossRefMATH Goldreich, O.: Foundations of Cryptography, vol. 2. Cambridge University Press, Cambridge (2004). Chapter 7CrossRefMATH
3.
Zurück zum Zitat Lindell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. J. Priv. Confid. 1, 59 (2009) Lindell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. J. Priv. Confid. 1, 59 (2009)
4.
Zurück zum Zitat Chor, B., Goldreich, O., Kushilevitz E., Sudan, M.: Private Information Retrieval. In: Proceedings of the 36th Annual IEEE Conference on Foundations of Computer Science. IEEE, New York, 41 (1995) Chor, B., Goldreich, O., Kushilevitz E., Sudan, M.: Private Information Retrieval. In: Proceedings of the 36th Annual IEEE Conference on Foundations of Computer Science. IEEE, New York, 41 (1995)
5.
Zurück zum Zitat Colbeck, R.: Impossibility of secure two-party classical computation. Phys. Rev. A 76, 062308 (2007)ADS Colbeck, R.: Impossibility of secure two-party classical computation. Phys. Rev. A 76, 062308 (2007)ADS
6.
Zurück zum Zitat Crépeau, C., Gottesman, D., Smith, A.: Secure Multi-party Quantum Computation, STOC02, 643 (2002) Crépeau, C., Gottesman, D., Smith, A.: Secure Multi-party Quantum Computation, STOC02, 643 (2002)
7.
Zurück zum Zitat Bennett, C. H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing, In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), 175 (1984) Bennett, C. H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing, In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), 175 (1984)
9.
Zurück zum Zitat Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829 (1999)ADSMathSciNet Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829 (1999)ADSMathSciNet
10.
Zurück zum Zitat Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162 (1999)ADS Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162 (1999)ADS
11.
Zurück zum Zitat Unruh, D.: Universally composable quantum multi-party computation. Adv. Cryptol. C EUROCRYPT 2010 6110, 486 (2010)CrossRefMathSciNet Unruh, D.: Universally composable quantum multi-party computation. Adv. Cryptol. C EUROCRYPT 2010 6110, 486 (2010)CrossRefMathSciNet
12.
Zurück zum Zitat Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum key distribution scheme. Phys. Rev. A 65, 032302 (2002)ADS Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum key distribution scheme. Phys. Rev. A 65, 032302 (2002)ADS
13.
Zurück zum Zitat Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68, 042317 (2003)ADS Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68, 042317 (2003)ADS
14.
Zurück zum Zitat Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)ADS Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)ADS
15.
Zurück zum Zitat Sun, Z.W., Du, R.G., Long, D.Y.: Quantum secure direct communication with quantum identification. Int. J. Quantum Inf. 10, 1250008 (2012)MathSciNet Sun, Z.W., Du, R.G., Long, D.Y.: Quantum secure direct communication with quantum identification. Int. J. Quantum Inf. 10, 1250008 (2012)MathSciNet
16.
Zurück zum Zitat Sun, Z.W., Du, R.G., Long, D.Y.: Quantum secure direct communication with two-photon four-qubit cluster state. Int. J. Theor. Phys. 51, 1946 (2012)MATHMathSciNet Sun, Z.W., Du, R.G., Long, D.Y.: Quantum secure direct communication with two-photon four-qubit cluster state. Int. J. Theor. Phys. 51, 1946 (2012)MATHMathSciNet
17.
Zurück zum Zitat Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56, 1154 (1997)ADS Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56, 1154 (1997)ADS
18.
Zurück zum Zitat Buhrman, H., Christandl, M., Schaffner, C.: Complete insecurity of quantum protocols for classical two-party computation. Phys. Rev. Lett. 109, 160501 (2012)ADS Buhrman, H., Christandl, M., Schaffner, C.: Complete insecurity of quantum protocols for classical two-party computation. Phys. Rev. Lett. 109, 160501 (2012)ADS
19.
Zurück zum Zitat Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42, 055305 (2009)ADSMathSciNet Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42, 055305 (2009)ADSMathSciNet
20.
Zurück zum Zitat Jakobsson, M., Yung, M.: Advances in Cryptology - CRYPTO ’96, 1109, 186 (1996) Jakobsson, M., Yung, M.: Advances in Cryptology - CRYPTO ’96, 1109, 186 (1996)
21.
Zurück zum Zitat Chen, X.-B., Xu, G., Niu, X.-X., Wen, Q.-Y., Yang, Y.-X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561 (2010)ADS Chen, X.-B., Xu, G., Niu, X.-X., Wen, Q.-Y., Yang, Y.-X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561 (2010)ADS
22.
Zurück zum Zitat Liu, W., Wang, Y.-B., Jiang, Z.-T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284, 3160 (2011)ADS Liu, W., Wang, Y.-B., Jiang, Z.-T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284, 3160 (2011)ADS
23.
Zurück zum Zitat Sun, Z., Long, D.: Cryptanalysis of an efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement, arXiv:1204.4587, (2012) Sun, Z., Long, D.: Cryptanalysis of an efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement, arXiv:​1204.​4587, (2012)
24.
Zurück zum Zitat Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process 11, 373 (2012)MATHMathSciNet Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process 11, 373 (2012)MATHMathSciNet
25.
Zurück zum Zitat Chen, X.-B., Dou, Z., Xu, G., Wang, C., Yang, Y.: A class of protocols for quantum private comparison based on the symmetry of states. Quantum Inf. Process 13, 85 (2014)ADSMATH Chen, X.-B., Dou, Z., Xu, G., Wang, C., Yang, Y.: A class of protocols for quantum private comparison based on the symmetry of states. Quantum Inf. Process 13, 85 (2014)ADSMATH
26.
Zurück zum Zitat Chen, X.-B., Su, Y., Niu, X., Yang, Y.-X.: Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf. Process 13, 101 (2014)ADSMATH Chen, X.-B., Su, Y., Niu, X., Yang, Y.-X.: Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf. Process 13, 101 (2014)ADSMATH
27.
Zurück zum Zitat Liu, W., Wang, Y.-B., Jiang, Z.-T., Cao, Y.-Z.: A protocol for the quantum private comparison of equality with x-type state. Int. J. Theor. Phys. 51, 69 (2011)MathSciNet Liu, W., Wang, Y.-B., Jiang, Z.-T., Cao, Y.-Z.: A protocol for the quantum private comparison of equality with x-type state. Int. J. Theor. Phys. 51, 69 (2011)MathSciNet
28.
Zurück zum Zitat Lin, S., Sun, Y., Liu, X.F., Yao, Z.Q.: Quantum private comparison protocol with d-dimensional Bell states. Quantum Inf. Process 12, 559–568 (2013)ADSMATHMathSciNet Lin, S., Sun, Y., Liu, X.F., Yao, Z.Q.: Quantum private comparison protocol with d-dimensional Bell states. Quantum Inf. Process 12, 559–568 (2013)ADSMATHMathSciNet
29.
Zurück zum Zitat Liu, B., Gao, F., Jia, H., Huang, W., Zhang, W., Wen, Q.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process 12, 887 (2013)ADSMATHMathSciNet Liu, B., Gao, F., Jia, H., Huang, W., Zhang, W., Wen, Q.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process 12, 887 (2013)ADSMATHMathSciNet
30.
Zurück zum Zitat Gao, F., Qin, S.J., Zhang, J., Wen, Q.Y.: Quantum private comparison protocol based on entanglement swapping of d-level Bell states. Quantum Inf. Process 12, 2793–2802 (2013)ADSMATHMathSciNet Gao, F., Qin, S.J., Zhang, J., Wen, Q.Y.: Quantum private comparison protocol based on entanglement swapping of d-level Bell states. Quantum Inf. Process 12, 2793–2802 (2013)ADSMATHMathSciNet
31.
Zurück zum Zitat Shor Peter, W., John, P.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 441, 85 (2000) Shor Peter, W., John, P.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 441, 85 (2000)
32.
Zurück zum Zitat Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Theory of Cryptography: Proceedings of TCC 2005, (Cambridge, MA, USA, Springer, 2005) 386–406 (2005) Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Theory of Cryptography: Proceedings of TCC 2005, (Cambridge, MA, USA, Springer, 2005) 386–406 (2005)
33.
Zurück zum Zitat He, G.: Quantum protocols for the millionaire problem with a third party are trivial. Int. J. Quantum Inf. 11, 1350025 (2013)MathSciNet He, G.: Quantum protocols for the millionaire problem with a third party are trivial. Int. J. Quantum Inf. 11, 1350025 (2013)MathSciNet
34.
Zurück zum Zitat Liu, X., Zhang, B., Wang, J., Tang, C., Zhao, J.: Differential phase shift quantum private comparison. Quantum Inf. Process 13, 71–84 (2014)ADS Liu, X., Zhang, B., Wang, J., Tang, C., Zhao, J.: Differential phase shift quantum private comparison. Quantum Inf. Process 13, 71–84 (2014)ADS
35.
Zurück zum Zitat Li, Y., Ma, Y., Xu, S., Huang, W., Zhang, Y.: Quantum private comparison based on phase encoding of single photons. Int. J. Theor. Phys. 53, 3191–3200 (2014)MATH Li, Y., Ma, Y., Xu, S., Huang, W., Zhang, Y.: Quantum private comparison based on phase encoding of single photons. Int. J. Theor. Phys. 53, 3191–3200 (2014)MATH
36.
Zurück zum Zitat Lin, J., Yang, C., Hweng, T.: Quantum private comparison of equality protocol without a third party. Quantum Inf. Process 13, 239–247 (2014)MATHMathSciNet Lin, J., Yang, C., Hweng, T.: Quantum private comparison of equality protocol without a third party. Quantum Inf. Process 13, 239–247 (2014)MATHMathSciNet
Metadaten
Titel
Quantum private comparison with a malicious third party
verfasst von
Zhiwei Sun
Jianping Yu
Ping Wang
Lingling Xu
Chunhui Wu
Publikationsdatum
01.06.2015
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 6/2015
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-015-0956-6

Weitere Artikel der Ausgabe 6/2015

Quantum Information Processing 6/2015 Zur Ausgabe

Neuer Inhalt