An efficient protocol for the quantum private comparison of equality with W state

被引:155
作者
Liu, Wen [1 ]
Wang, Yong-Bin [1 ]
Jiang, Zheng-Tao [1 ]
机构
[1] Commun Univ China, Sch Comp Sci, Beijing 100024, Peoples R China
关键词
Quantum private comparison; W state; Single-particle measurement; Correctness; Security; KEY DISTRIBUTION; COMMUNICATION; INFORMATION; MULTIPARTY; SCHEME;
D O I
10.1016/j.optcom.2011.02.017
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We propose an efficient quantum protocol for comparing the equal information with the help of a semi-honest third party (TP). Our protocol utilizes the triplet W states and the single-particle measurement. A precise proof of security of the protocol is presented. The security of this protocol with respect to various kinds of outside attacks is discussed. Outside eavesdroppers cannot learn any information about the private information. The security of this protocol with respect to various kinds of party attacks is also discussed. One party cannot learn any information about the other's private information. The TP cannot learn any information about the private information, even about the comparison result or the length of secret inputs. Crown Copyright (C) 2011 Published by Elsevier B.V. All rights reserved.
引用
收藏
页码:3160 / 3163
页数:4
相关论文
共 41 条
[1]  
[Anonymous], [No title captured]
[2]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]   TELEPORTING AN UNKNOWN QUANTUM STATE VIA DUAL CLASSICAL AND EINSTEIN-PODOLSKY-ROSEN CHANNELS [J].
BENNETT, CH ;
BRASSARD, G ;
CREPEAU, C ;
JOZSA, R ;
PERES, A ;
WOOTTERS, WK .
PHYSICAL REVIEW LETTERS, 1993, 70 (13) :1895-1899
[4]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[5]   A fair and efficient solution to the socialist millionaires' problem [J].
Boudot, F ;
Schoenmakers, B ;
Traoré, J .
DISCRETE APPLIED MATHEMATICS, 2001, 111 (1-2) :23-36
[6]   Experimental quantum teleportation [J].
Bouwmeester, D ;
Pan, JW ;
Mattle, K ;
Eibl, M ;
Weinfurter, H ;
Zeilinger, A .
NATURE, 1997, 390 (6660) :575-579
[7]  
Cachin C, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P120, DOI 10.1145/319709.319726
[8]   Controlled quantum secure direct communication with quantum encryption [J].
Chen, Xiu-Bo ;
Wang, Tian-Yin ;
Du, Jian-Zhong ;
Wen, Qiao-Yan ;
Zhu, Fu-Chen .
INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2008, 6 (03) :543-551
[9]   An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement [J].
Chen, Xiu-Bo ;
Xu, Gang ;
Niu, Xin-Xin ;
Wen, Qiao-Yan ;
Yang, Yi-Xian .
OPTICS COMMUNICATIONS, 2010, 283 (07) :1561-1565
[10]   Comment on "General relation between the transformation operator and an invariant under stochastic local operations and classical communication in quantum teleportation" [J].
Chen, Xiu-Bo ;
Wen, Qiao-Yan ;
Xu, Gang ;
Yang, Yi-Xian ;
Zhu, Fu-Chen .
PHYSICAL REVIEW A, 2009, 79 (03)