Efficient Quantum Private Comparison Based on Entanglement Swapping of Bell States

被引:30
作者
Huang, Xi [1 ]
Zhang, Shi-Bin [1 ]
Chang, Yan [1 ]
Hou, Min [1 ]
Cheng, Wen [1 ]
机构
[1] Chengdu Univ Informat Technol, Sch Cybersecur, Chengdu 610225, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum private comparison; Bell states; Entanglement swapping; Quantum cryptography; COMPARISON PROTOCOL; KEY DISTRIBUTION; QUERY;
D O I
10.1007/s10773-021-04915-9
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, by using entanglement swapping of Bell states, an efficient quantum private comparison(QPC) protocol with a semi-honest party is proposed. The semi-honest third party (TP) is required to help two participants perform the comparison. She can record intermediate results and do some calculations in the whole process of the protocol execution, but she is not allowed to conspire with any participants. Moreover, TP cannot get two participants' privacy information except the comparison results. The security analysis shows that the proposed protocol can resist both outsider attacks and insider attacks. Compared with other similar QPC protocols, the proposed one needs neither unitary operations nor the entanglement swapping of multiparticle quantum states, and it only needs the entanglement swapping of Bell states, which makes it more practical. Since three-bit classical information could be compared in each comparison, the proposed protocol has a good performance in its efficiency.
引用
收藏
页码:3783 / 3796
页数:14
相关论文
共 37 条
[1]   Unidimensional continuous-variable measurement-device-independent quantum key distribution [J].
Bai, Dongyun ;
Huang, Peng ;
Zhu, Yiqun ;
Ma, Hongxin ;
Xiao, Tailong ;
Wang, Tao ;
Zeng, Guihua .
QUANTUM INFORMATION PROCESSING, 2020, 19 (02)
[2]   Efficient Quantum Secure Direct Communication Protocol Based on Quantum Channel Compression [J].
Bebrov, Georgi ;
Dimova, Rozalina .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (02) :426-435
[3]  
Bennett C. H., 1984, P IEEE INT C COMP SY, V1, P175, DOI [10.1016/j.tcs.2014.05.025, DOI 10.1016/J.TCS.2014.05.025]
[4]   A fair and efficient solution to the socialist millionaires' problem [J].
Boudot, F ;
Schoenmakers, B ;
Traoré, J .
DISCRETE APPLIED MATHEMATICS, 2001, 111 (1-2) :23-36
[5]   Semiquantum key distribution [J].
Boyer, Michel ;
Gelles, Ran ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW A, 2009, 79 (03)
[6]   Quantum key distribution in the Holevo limit [J].
Cabello, A .
PHYSICAL REVIEW LETTERS, 2000, 85 (26) :5635-5638
[7]   Eavesdropping on the two-way quantum communication protocols with invisible photons [J].
Cai, QY .
PHYSICS LETTERS A, 2006, 351 (1-2) :23-25
[8]   Practical Two-Way QKD-Based Quantum Private Query with Better Performance in User Privacy [J].
Chang, Yan ;
Zhang, Shi-Bin ;
Wan, Guo-gen ;
Yan, Li-Li ;
Zhang, Yan ;
Li, Xue-Yang .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (07) :2069-2080
[9]  
Chang Y, 2016, COMMUN THEOR PHYS, V66, P621, DOI 10.1088/0253-6102/66/6/621
[10]   An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement [J].
Chen, Xiu-Bo ;
Xu, Gang ;
Niu, Xin-Xin ;
Wen, Qiao-Yan ;
Yang, Yi-Xian .
OPTICS COMMUNICATIONS, 2010, 283 (07) :1561-1565