Cryptanalysis and Improvement of Quantum Private Comparison Protocol Based on Bell Entangled States

被引:29
作者
Liu Wen-Jie [1 ,2 ]
Liu Chao [2 ]
Chen Han-Wu [3 ]
Li Zhi-Qiang [4 ]
Liu Zhi-Hao [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[3] Southeast Univ, Sch Comp Sci & Engn, Nanjing 211189, Jiangsu, Peoples R China
[4] Yangzhou Univ, Coll Informat Engn, Yangzhou 225009, Peoples R China
关键词
quantum private comparison; Bell states; entanglement swapping; TP's measurement attack; improvement; SECURE COMMUNICATION; CLUSTER STATES; SECRET; AUTHENTICATION; TELEPORTATION; EQUALITY; NETWORK; KEY;
D O I
10.1088/0253-6102/62/2/07
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, Liu et al. [Commun. Theor. Phys. 57 (2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party (TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol, it not only reduces the Bell states consumption but also simplifies the protocol steps.
引用
收藏
页码:210 / 214
页数:5
相关论文
共 38 条
[1]   Memory Attacks on Device-Independent Quantum Cryptography [J].
Barrett, Jonathan ;
Colbeck, Roger ;
Kent, Adrian .
PHYSICAL REVIEW LETTERS, 2013, 110 (01)
[2]   Secure communication with a publicly known key [J].
Beige, A ;
Englert, BG ;
Kurtsiefer, C ;
Weinfurter, H .
ACTA PHYSICA POLONICA A, 2002, 101 (03) :357-368
[3]   Secure communication with single-photon two-qubit states [J].
Beige, A ;
Englert, BG ;
Kurtsiefer, C ;
Weinfurter, H .
JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 2002, 35 (28) :L407-L413
[4]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[5]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[6]   A fair and efficient solution to the socialist millionaires' problem [J].
Boudot, F ;
Schoenmakers, B ;
Traoré, J .
DISCRETE APPLIED MATHEMATICS, 2001, 111 (1-2) :23-36
[7]   Experimental quantum teleportation [J].
Bouwmeester, D ;
Pan, JW ;
Mattle, K ;
Eibl, M ;
Weinfurter, H ;
Zeilinger, A .
NATURE, 1997, 390 (6660) :575-579
[8]   How to share a quantum secret [J].
Cleve, R ;
Gottesman, D ;
Lo, HK .
PHYSICAL REVIEW LETTERS, 1999, 83 (03) :648-651
[9]   Bidirectional quantum key distribution protocol with practical faint laser pulses [J].
Deng, FG ;
Long, GL .
PHYSICAL REVIEW A, 2004, 70 (01) :012311-1
[10]   Secure direct communication with a quantum one-time pad [J].
Deng, FG ;
Long, GL .
PHYSICAL REVIEW A, 2004, 69 (05) :052319-1