An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement

被引:311
作者
Yang, Yu-Guang [1 ,2 ,3 ]
Wen, Qiao-Yan [4 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Peoples R China
[3] Grad Univ Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[4] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
KEY DISTRIBUTION; UNCONDITIONAL SECURITY; PROOF; COMMUNICATION; CRYPTOGRAPHY; ATTACK; STATE;
D O I
10.1088/1751-8113/42/5/055305
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Following some ideas of the quantum secret sharing (QSS) protocol (2008, Phys. Lett. A 372, 1957), we propose an efficient quantum private comparison (QPC) protocol for comparing information of equality with the help of a third party (TP). The protocol can ensure fairness, efficiency and security. The protocol is fair, which means that one party knows the sound result of the comparison if and only if the other one knows the result. The protocol is efficient with the help of the TP for calculating. However, the TP cannot learn any information about the players' respective private inputs and even about the comparison result and cannot collude with any player. The protocol is secure for the two players, that is, any information about their respective secret inputs will not leak except the final computation result. A precise proof of security of the protocol is presented. Applications of this protocol may include private bidding and auctions, secret ballot elections, commercial business, identification in a number of scenarios and so on.
引用
收藏
页数:9
相关论文
共 44 条
[1]  
Abadi M., 1990, Journal of Cryptology, V2, P1, DOI 10.1007/BF02252866
[2]  
Bennett C.H., 1984, P IEEE INT C COMP SY, V175, DOI DOI 10.1016/J.TCS.2014.05.025
[3]   COMMUNICATION VIA ONE-PARTICLE AND 2-PARTICLE OPERATORS ON EINSTEIN-PODOLSKY-ROSEN STATES [J].
BENNETT, CH ;
WIESNER, SJ .
PHYSICAL REVIEW LETTERS, 1992, 69 (20) :2881-2884
[4]   TELEPORTING AN UNKNOWN QUANTUM STATE VIA DUAL CLASSICAL AND EINSTEIN-PODOLSKY-ROSEN CHANNELS [J].
BENNETT, CH ;
BRASSARD, G ;
CREPEAU, C ;
JOZSA, R ;
PERES, A ;
WOOTTERS, WK .
PHYSICAL REVIEW LETTERS, 1993, 70 (13) :1895-1899
[5]  
Bennett CH, 1996, PHYS REV A, V54, P3824, DOI 10.1103/PhysRevA.54.3824
[6]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[7]   Experimental quantum teleportation [J].
Bouwmeester, D ;
Pan, JW ;
Mattle, K ;
Eibl, M ;
Weinfurter, H ;
Zeilinger, A .
NATURE, 1997, 390 (6660) :575-579
[8]   Quantum repeaters:: The role of imperfect local operations in quantum communication [J].
Briegel, HJ ;
Dür, W ;
Cirac, JI ;
Zoller, P .
PHYSICAL REVIEW LETTERS, 1998, 81 (26) :5932-5935
[9]   Eavesdropping on the two-way quantum communication protocols with invisible photons [J].
Cai, QY .
PHYSICS LETTERS A, 2006, 351 (1-2) :23-25
[10]   Impossibility of secure two-party classical computation [J].
Colbeck, Roger .
PHYSICAL REVIEW A, 2007, 76 (06)