Cryptanalysis and Improvement of Quantum Private Comparison Protocol Based on Bell Entangled States

被引:29
作者
Liu Wen-Jie [1 ,2 ]
Liu Chao [2 ]
Chen Han-Wu [3 ]
Li Zhi-Qiang [4 ]
Liu Zhi-Hao [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[3] Southeast Univ, Sch Comp Sci & Engn, Nanjing 211189, Jiangsu, Peoples R China
[4] Yangzhou Univ, Coll Informat Engn, Yangzhou 225009, Peoples R China
关键词
quantum private comparison; Bell states; entanglement swapping; TP's measurement attack; improvement; SECURE COMMUNICATION; CLUSTER STATES; SECRET; AUTHENTICATION; TELEPORTATION; EQUALITY; NETWORK; KEY;
D O I
10.1088/0253-6102/62/2/07
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, Liu et al. [Commun. Theor. Phys. 57 (2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party (TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol, it not only reduces the Bell states consumption but also simplifies the protocol steps.
引用
收藏
页码:210 / 214
页数:5
相关论文
共 38 条
[21]   Secure Quantum Private Comparison of Equality Based on Asymmetric W State [J].
Liu, Wen-Jie ;
Liu, Chao ;
Wang, Hai-bin ;
Liu, Jing-Fa ;
Wang, Fang ;
Yuan, Xiao-Min .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2014, 53 (06) :1804-1813
[22]   Same Initial States Attack in Yang et al.'s Quantum Private Comparison Protocol and the Improvement [J].
Liu, Wen-Jie ;
Liu, Chao ;
Liu, Zhi-Hao ;
Liu, Jing-Fa ;
Geng, Huan-Tong .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2014, 53 (01) :271-276
[23]   An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication [J].
School of Computer Science and Engineering, Southeast University, Nanjing 210096, China ;
不详 ;
不详 .
Chin. Phys., 2009, 10 (4105-4109) :4105-4109
[24]   Quantum Private Comparison: A Review [J].
Liu, Wenjie ;
Liu, Chao ;
Wang, Haibin ;
Jia, Tingting .
IETE TECHNICAL REVIEW, 2013, 30 (05) :439-445
[25]   Insecurity of quantum secure computations [J].
Lo, HK .
PHYSICAL REVIEW A, 1997, 56 (02) :1154-1162
[26]   Theoretically efficient high-capacity quantum-key-distribution scheme [J].
Long, GL ;
Liu, XS .
PHYSICAL REVIEW A, 2002, 65 (03) :3
[27]   Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel [J].
Lu, Hua ;
Fung, Chi-Hang Fred ;
Ma, Xiongfeng ;
Cai, Qing-yu .
PHYSICAL REVIEW A, 2011, 84 (04)
[28]   Quantum Secret Sharing with Error Correction [J].
Mouzali, Aziz ;
Merazka, Fatiha ;
Markham, Damian .
COMMUNICATIONS IN THEORETICAL PHYSICS, 2012, 58 (05) :661-671
[29]   Quantum Private Comparison Protocol Based on Cluster States [J].
Sun, Zhiwei ;
Long, Dongyang .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (01) :212-218
[30]   New quantum private comparison protocol using EPR pairs [J].
Tseng, Hsin-Yi ;
Lin, Jason ;
Hwang, Tzonelih .
QUANTUM INFORMATION PROCESSING, 2012, 11 (02) :373-384