Quantum Private Comparison of Arbitrary Single Qubit States Based on Swap Test

2021 ◽  
Author(s):  
Xi Huang ◽  
Yan Chang ◽  
Wen Cheng ◽  
Min Hou ◽  
Shi-Bin Zhang

Abstract In this paper, by using swap test, a quantum private comparison (QPC) protocol of arbitrary single qubit states with a semi-honest third party is proposed. The semi-honest third party (TP) is required to help two participants perform the comparison. She can record intermediate results and do some calculations in the whole process of the protocol execution, but she cannot conspire with any participants. In the process of comparison, TP cannot get two participants' private information except the comparison results. According to the security analysis, the proposed protocol can resist both outsider attacks and participant attacks. Compared with the existing QPC protocols, the proposed one does not require any entanglement swapping technology, and it can compare two participants' qubits by performing swap test, which is easier to implement with current technology. Meanwhile, the proposed protocol can compare secret integers. It encodes secret integers into the amplitude of quantum state rather than transfer them as binary representations, and the encoded quantum state is compared by performing swap test. Additionally, the proposed QPC protocol is extended to the QPC of arbitrary single qubit states by using multi-qubit swap test.

2018 ◽  
Vol 16 (05) ◽  
pp. 1850047 ◽  
Author(s):  
Kishore Thapliyal ◽  
Rishi Dutt Sharma ◽  
Anirban Pathak

Private comparison is a primitive for many cryptographic tasks, and recently several schemes for the quantum private comparison (QPC) have been proposed, where two users can compare the equality of their secrets with the help of a semi-honest third party (TP) without knowing each other’s secret and without disclosing the same to the TP. In the existing schemes, secrecy is obtained by using conjugate coding, and considering all participants as quantum users who can perform measurement(s) and/or create states in basis other than computational basis. In contrast, here we propose two new protocols for QPC, first of which does not use conjugate coding (uses orthogonal states only) and the second one allows the users other than TP to be classical whose activities are restricted to either reflecting a quantum state or measuring it in computational basis. Further, the performance of the protocols is evaluated under various noise models.


2019 ◽  
Vol 34 (28) ◽  
pp. 1950229 ◽  
Author(s):  
ZhaoXu Ji ◽  
HuanGuo Zhang ◽  
PeiRu Fan

Quantum private comparison (QPC), whose security is based on some laws of quantum mechanics (e.g. quantum noncloning theorem and Heisenbergs uncertainty principle), allows [Formula: see text] parties who do not trust each other to judge whether their secret data are the same while maintaining data privacy. In this paper, we investigate the utility of the maximally entangled seven-qubit state for QPC, and we propose a new protocol which enables two parties to compare their secret data with each other for equality without disclosing their secret data. In our protocol, single particle measurements and Bell-basis measurements are employed, both of which can be implemented with current technologies. In addition to quantum measurements, our protocol does not use other quantum technologies such as entanglement swapping and unitary operations. A semi-honest third-party who assists two parties in implementing the protocol is assumed in our protocol. Furthermore, we use the entanglement correlations of the maximally entangled seven-qubit state and collaborative computing between parties for privacy protection, and we use quantum key distribution (QKD) to ensure the security of the cooperative computing when two parties are in different locations. What is more, we show that the security towards both outsider and insider attacks can be guaranteed.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Hussein Abulkasim ◽  
Ahmed Farouk ◽  
Safwat Hamad ◽  
Atefeh Mashatan ◽  
Shohini Ghose

AbstractWe propose a feasible and efficient dynamic multiparty quantum private comparison protocol that is fully secure against participant attacks. In the proposed scheme, two almost-dishonest third parties generate two random keys and send them to all participants. Every participant independently encrypts their private information with the encryption keys and sends it to the third parties. The third parties can analyze the equality of all or some participants’ secrets without gaining access to the secret information. New participants can dynamically join the protocol without the need for any additional conditions in the protocol. We provide detailed correctness and security analysis of the proposed protocol. Our security analysis of the proposed protocol against both inside and outside attacks proves that attackers cannot extract any secret information.


Sign in / Sign up

Export Citation Format

Share Document