Two-party quantum private comparison protocol with maximally entangled seven-qubit state

2019 ◽  
Vol 34 (28) ◽  
pp. 1950229 ◽  
Author(s):  
ZhaoXu Ji ◽  
HuanGuo Zhang ◽  
PeiRu Fan

Quantum private comparison (QPC), whose security is based on some laws of quantum mechanics (e.g. quantum noncloning theorem and Heisenbergs uncertainty principle), allows [Formula: see text] parties who do not trust each other to judge whether their secret data are the same while maintaining data privacy. In this paper, we investigate the utility of the maximally entangled seven-qubit state for QPC, and we propose a new protocol which enables two parties to compare their secret data with each other for equality without disclosing their secret data. In our protocol, single particle measurements and Bell-basis measurements are employed, both of which can be implemented with current technologies. In addition to quantum measurements, our protocol does not use other quantum technologies such as entanglement swapping and unitary operations. A semi-honest third-party who assists two parties in implementing the protocol is assumed in our protocol. Furthermore, we use the entanglement correlations of the maximally entangled seven-qubit state and collaborative computing between parties for privacy protection, and we use quantum key distribution (QKD) to ensure the security of the cooperative computing when two parties are in different locations. What is more, we show that the security towards both outsider and insider attacks can be guaranteed.

2021 ◽  
Author(s):  
Xi Huang ◽  
Yan Chang ◽  
Wen Cheng ◽  
Min Hou ◽  
Shi-Bin Zhang

Abstract In this paper, by using swap test, a quantum private comparison (QPC) protocol of arbitrary single qubit states with a semi-honest third party is proposed. The semi-honest third party (TP) is required to help two participants perform the comparison. She can record intermediate results and do some calculations in the whole process of the protocol execution, but she cannot conspire with any participants. In the process of comparison, TP cannot get two participants' private information except the comparison results. According to the security analysis, the proposed protocol can resist both outsider attacks and participant attacks. Compared with the existing QPC protocols, the proposed one does not require any entanglement swapping technology, and it can compare two participants' qubits by performing swap test, which is easier to implement with current technology. Meanwhile, the proposed protocol can compare secret integers. It encodes secret integers into the amplitude of quantum state rather than transfer them as binary representations, and the encoded quantum state is compared by performing swap test. Additionally, the proposed QPC protocol is extended to the QPC of arbitrary single qubit states by using multi-qubit swap test.


2013 ◽  
Vol 11 (04) ◽  
pp. 1350039 ◽  
Author(s):  
CONG WANG ◽  
GANG XU ◽  
YI-XIAN YANG

In this paper, we carry out an in-depth analysis of the quantum private comparison (QPC) protocol with the semi-honest third party (TP). The security of QPC protocol using the EPR pairs is re-examined. Unfortunately, we find that TP can use the fake EPR pairs to steal all the secret information. Furthermore, we give two simple and feasible solutions to improve the original QPC protocol. It is shown that the improved protocol is secure, which can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the semi-honest TP.


Sign in / Sign up

Export Citation Format

Share Document