Quantum Private Comparison via Cavity QED

被引:41
作者
Ye, Tian-Yu [1 ]
机构
[1] Zhejiang Gongshang Univ, Coll Informat & Elect Engn, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
quantum private comparison (QPC); third party (TP); cavity quantum electrodynamics (QED); product state; participant attack; SECURE DIRECT COMMUNICATION; BELL ENTANGLED STATES; COMPARISON PROTOCOL; KEY DISTRIBUTION; CONTROLLED TELEPORTATION; EFFICIENT PROTOCOL; EQUALITY PROTOCOL; INFORMATION; CRYPTOGRAPHY; 3RD-PARTY;
D O I
10.1088/0253-6102/67/2/147
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The first quantum private comparison (QPC) protocol via cavity quantum electrodynamics (QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party (TP) is allowed to misbehave on his own but cannot conspire with either of the two users. The proposed protocol adopts two-atom product states rather than entangled states as the initial quantum resource, and only needs single-atom measurements for two users. Both the unitary operations and the quantum entanglement swapping operation are not necessary for the proposed protocol. The proposed protocol can compare the equality of one bit from each user in each round comparison with one two-atom product state. The proposed protocol can resist both the outside attack and the participant attack. Particularly, it can prevent TP from knowing two users' secrets. Furthermore, the qubit efficiency of the proposed protocol is as high as 50%.
引用
收藏
页码:147 / 156
页数:10
相关论文
共 81 条
  • [1] Bennett C.H., 1984, PROC IEEE INT C COMP, P175, DOI DOI 10.1016/J.TCS.2014.05.025
  • [2] TELEPORTING AN UNKNOWN QUANTUM STATE VIA DUAL CLASSICAL AND EINSTEIN-PODOLSKY-ROSEN CHANNELS
    BENNETT, CH
    BRASSARD, G
    CREPEAU, C
    JOZSA, R
    PERES, A
    WOOTTERS, WK
    [J]. PHYSICAL REVIEW LETTERS, 1993, 70 (13) : 1895 - 1899
  • [3] QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM
    BENNETT, CH
    BRASSARD, G
    MERMIN, ND
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (05) : 557 - 559
  • [4] Deterministic secure direct communication using entanglement -: art. no. 187902
    Boström, K
    Felbinger, T
    [J]. PHYSICAL REVIEW LETTERS, 2002, 89 (18) : 187902/1 - 187902/4
  • [5] Quantum key distribution in the Holevo limit
    Cabello, A
    [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (26) : 5635 - 5638
  • [6] Efficient multipartite entanglement concentration protocol for nitrogen-vacancy center and microresonator coupled systems
    Cao, Cong
    Ding, Hao
    Li, Yin
    Wang, Tie-Jun
    Mi, Si-Chen
    Zhang, Ru
    Wang, Chuan
    [J]. QUANTUM INFORMATION PROCESSING, 2015, 14 (04) : 1265 - 1277
  • [7] Cluster state entanglement generation and concentration on nitrogen-vacancy centers in decoherence-free subspace
    Cao, Cong
    Wang, Tie-Jun
    Zhang, Ru
    Wang, Chuan
    [J]. LASER PHYSICS LETTERS, 2015, 12 (03)
  • [8] Robust quantum secure direct communication and authentication protocol against decoherence noise based on six-qubit DF state
    Chang Yan
    Zhang Shi-Bin
    Yan Li-Li
    Han Gui-Hua
    [J]. CHINESE PHYSICS B, 2015, 24 (05)
  • [9] Controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad
    Chang, Yan
    Xu, Chunxiang
    Zhang, Shibin
    Yan, Lili
    [J]. CHINESE SCIENCE BULLETIN, 2014, 59 (21): : 2541 - 2546
  • [10] Multi-user private comparison protocol using GHZ class states
    Chang, Yao-Jen
    Tsai, Chia-Wei
    Hwang, Tzonelih
    [J]. QUANTUM INFORMATION PROCESSING, 2013, 12 (02) : 1077 - 1088