Abstract
In a recent paper [W. Liu, Y.B. Wang, Z.T. Jiang, Opt. Commun. 284, 3160 (2011)], a quantum private comparison (QPC) protocol based on W states was presented. Compared to the previous QPCs, the protocol is promising for that it can prevent the comparison result from revealing to the third party. However, this study point out that a flaw of information leak is existent in the protocol. And a new QPC which can avoid the flaw and has higher efficiency is proposed in this paper.
Similar content being viewed by others
References
C.H. Bennett, G. Brassard, Quantum cryptography: public-key distribution and coin tossing, in Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India (IEE Press, New York, 1984), p. 175
C.H. Bennett, Phys. Rev. Lett. 68, 3121 (1992)
X.B. Wang, Phys. Rev. Lett. 92, 077902 (2004)
Q. Zhang, J. Yin, T.Y. Chen, S. Lu, J. Zhang, X.Q. Li, T. Yang, X.B. Wang, J.W. Pan, Phys. Rev. A 73, 020301 (2006)
Y. Sun, Q.Y. Wen, F. Gao, F.C. Zhu, Phys. Rev. A 80, 032321 (2009)
Y.G. Tan, Q.Y. Cai, Eur. Phys. J. D 56, 449 (2010)
T. Hwang, C.C. Hwang, C.W. Tsai, Eur. Phys. J. D 61, 785 (2011)
A. Karlsson, M. Koashi, N. Imoto, Phys. Rev. A 59, 162 (1999)
M. Hillery, V. Buzěk, A. Berthiaume, Phys. Rev. A 59, 1829 (1999)
G.P. Guo, G.C. Guo, Phys. Lett. A 310, 247 (2003)
S.J. Qin, F. Gao, Q.Y. Wen, F.C. Zhu, Phys. Rev. A 76, 062324 (2007)
L.F. Han, Y.M. Liu, H. Yuan, Z.J. Zhang, Chin. Phys. Lett. 24, 3312 (2007)
T.Y. Wang, Q.Y. Wen, F. Gao, S. Lin, F.C. Zhu, Phys. Lett. A 65, 373 (2008)
F.Z. Guo, S.J. Qin, F. Gao, S. Lin, Q.Y. Wen, F.C. Zhu, Eur. Phys. J. D 56, 445 (2010)
Y. Xia, J. Song, P.M. Lu, H.S. Song, Eur. Phys. J. D 61, 493 (2011)
K. Bostroem, T. Felbinger, Phys. Rev. Lett. 89, 187902 (2002)
F.G. Deng, G.L. Long, X.S. Liu, Phys. Rev. A 68, 042317 (2003)
S. Lin, Q.Y. Wen, F. Gao, F.C. Zhu, Phys. Rev. A 78, 064304 (2008)
F. Gao, S.J. Qin, Q.Y. Wen, F.C. Zhu, Opt. Commun. 283, 192 (2010)
C.W. Tsai, C.R. Hsieh, T. Hwang, Eur. Phys. J. D 61, 779 (2011)
C.H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, W.K. Wootters, Phys. Rev. Lett. 70, 1895 (1993)
D. Bouwmeester, J.W. Pan, K. Mattle, M. Eibl, H. Weinfurter, A. Zeilinger, Nature 390, 575 (1997)
Z.J. Zhang, Y.M. Liu, Z.X. Man, Commun. Theor. Phys. 44, 847 (2005)
X.B. Chen, Q.Y. Wen, F.C. Zhu, Int. J. Quantum Inf. 5, 717 (2007)
I. Chakrabarty, Eur. Phys. J. D 57, 265 (2010)
J. Anders, D.E. Browne, Phys. Rev. Lett. 102, 050502 (2009)
A.C. Yao, Protocols for Secure Computation, in Proc. of the 23rd Annual IEEE Symposium on Foundations of Computer Science (IEEE Computer Society, Washington, DC, 1982), p. 160
O. Goldreich, S. Micali, A. Wigderson, How to play a mental game, in Annual ACM Symposium on Theory of Computing (ACM, New York, 1987), p. 218
Y. Li, Q. Wen, S. Qin, Phys. Rev. A 84, 016301 (2011)
K. Loukopoulos, D.E. Browne, Phys. Rev. A 81, 062336 (2010)
Y.G. Yang, Z. Zhou, Y.W. Teng, Q.Y. Wen, Eur. Phys. J. D 61, 773 (2011)
D. Mayers, Phys. Rev. Lett. 78, 3414 (1997)
H.K. Lo, H.F. Chau, Phys. Rev. Lett. 78, 3410 (1997)
Y.G. Yang, Q.Y. Wen, J. Phys. A Math. Theor. 42, 055305 (2009)
Y.G. Yang, W.F. Cao, Q.Y. Wen, Phys. Scr. 80, 065002 (2009)
X.B. Chen, G. Xu, X.X. Niu, Q.Y. Wen, Y.X. Yang, Opt. Commun. 283, 1561 (2010)
J. Lin, H.Y. Tseng, T. Hwang, Opt. Commun. 284, 2412 (2011)
H.Y. Tseng, J. Lin, T. Hwang, Quantum Inf. Process. 11, 373 (2012)
W. Liu, Y.B. Wang, Z.T. Jiang, Opt. Commun. 284, 3160 (2011)
C.W. Helstrom, Quantum detection and estimation theory (Academic Press, New York, 1976)
C.A. Fuchs, Fortschr. Phys. 46, 535 (1998)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, Y.B., Wen, Q.Y., Gao, F. et al. Information leak in Liu et al.’s quantum private comparison and a new protocol. Eur. Phys. J. D 66, 110 (2012). https://doi.org/10.1140/epjd/e2012-30065-9
Received:
Published:
DOI: https://doi.org/10.1140/epjd/e2012-30065-9