Cryptanalysis and improvement of a quantum private set intersection protocol

被引:13
作者
Cheng, Xiaogang [1 ]
Guo, Ren [2 ]
Chen, Yonghong [1 ]
机构
[1] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen, Peoples R China
[2] Huaqiao Univ, Coll Business Adm, Quanzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Private set intersection; Private matching; Fairness; Impossible result; BIT COMMITMENT; ATTACK; SECURITY; SCHEME;
D O I
10.1007/s11128-016-1502-x
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A recent Quantum Private Set Intersection (QPSI) scheme is cryptanalyzed. The original claimed communication overhead is shown to be not accurate. And the original security definition is passive and not fair. To ensure fairness, a passive third party is introduced. It is also shown that unconditional fairness of QPSI protocol is impossible. Since otherwise, it would violate a well-known impossible quantum cryptography result.
引用
收藏
页数:8
相关论文
共 44 条
  • [1] Bennett C.H., 1984, PROC IEEE INT C COMP, P175, DOI DOI 10.1016/J.TCS.2014.05.025
  • [2] The "ping-pong" protocol can be attacked without eavesdropping
    Cai, QY
    [J]. PHYSICAL REVIEW LETTERS, 2003, 91 (10)
  • [3] Arbitrarily Long Relativistic Bit Commitment
    Chakraborty, Kaushik
    Chailloux, Andre
    Leverrier, Anthony
    [J]. PHYSICAL REVIEW LETTERS, 2015, 115 (25)
  • [4] Privacy-preserving disjunctive normal form-operations on distributed sets
    Chun, Ji Young
    Hong, Dowon
    Jeong, Ik Rae
    Lee, Dong Hoon
    [J]. INFORMATION SCIENCES, 2013, 231 : 113 - 122
  • [5] Dachman-Soled D, 2009, LECT NOTES COMPUT SC, V5536, P125, DOI 10.1007/978-3-642-01957-9_8
  • [6] Cryptography in the bounded-quantum-storage model
    Damgard, Ivan B.
    Fehr, Serge
    Salvail, Louis
    Schaffner, Christian
    [J]. SIAM JOURNAL ON COMPUTING, 2008, 37 (06) : 1865 - 1890
  • [7] Improving the security of multiparty quantum secret sharing against Trojan horse attack
    Deng, FG
    Li, XH
    Zhou, HY
    Zhang, ZJ
    [J]. PHYSICAL REVIEW A, 2005, 72 (04):
  • [8] Freedman MJ, 2004, LECT NOTES COMPUT SC, V3027, P1
  • [9] Teleportation attack on the QSDC protocol with a random basis and order
    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    [J]. Chin. Phys., 2008, 9 (3189-3193): : 3189 - 3193
  • [10] Consistency of shared reference frames should be reexamined
    Gao, Fei
    Guo, Fen-Zhuo
    Wen, Qiao-Yan
    Zhu, Fu-Chen
    [J]. PHYSICAL REVIEW A, 2008, 77 (01)