Quantum private comparison of size using d-level Bell states with a semi-honest third party

2021 ◽  
Vol 20 (4) ◽  
Author(s):  
WanQing Wu ◽  
YongXin Zhao
2012 ◽  
Vol 12 (1) ◽  
pp. 559-568 ◽  
Author(s):  
Song Lin ◽  
Ying Sun ◽  
Xiao-Fen Liu ◽  
Zhi-Qiang Yao

2021 ◽  
Author(s):  
Xi Huang ◽  
Yan Chang ◽  
Wen Cheng ◽  
Min Hou ◽  
Shi-Bin Zhang

Abstract In this paper, by using swap test, a quantum private comparison (QPC) protocol of arbitrary single qubit states with a semi-honest third party is proposed. The semi-honest third party (TP) is required to help two participants perform the comparison. She can record intermediate results and do some calculations in the whole process of the protocol execution, but she cannot conspire with any participants. In the process of comparison, TP cannot get two participants' private information except the comparison results. According to the security analysis, the proposed protocol can resist both outsider attacks and participant attacks. Compared with the existing QPC protocols, the proposed one does not require any entanglement swapping technology, and it can compare two participants' qubits by performing swap test, which is easier to implement with current technology. Meanwhile, the proposed protocol can compare secret integers. It encodes secret integers into the amplitude of quantum state rather than transfer them as binary representations, and the encoded quantum state is compared by performing swap test. Additionally, the proposed QPC protocol is extended to the QPC of arbitrary single qubit states by using multi-qubit swap test.


2013 ◽  
Vol 11 (04) ◽  
pp. 1350039 ◽  
Author(s):  
CONG WANG ◽  
GANG XU ◽  
YI-XIAN YANG

In this paper, we carry out an in-depth analysis of the quantum private comparison (QPC) protocol with the semi-honest third party (TP). The security of QPC protocol using the EPR pairs is re-examined. Unfortunately, we find that TP can use the fake EPR pairs to steal all the secret information. Furthermore, we give two simple and feasible solutions to improve the original QPC protocol. It is shown that the improved protocol is secure, which can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the semi-honest TP.


2015 ◽  
Vol 14 (11) ◽  
pp. 4225-4235 ◽  
Author(s):  
Sheng-Liang Huang ◽  
Tzonelih Hwang ◽  
Prosanta Gope

2013 ◽  
Vol 13 (2) ◽  
pp. 239-247 ◽  
Author(s):  
Jason Lin ◽  
Chun-Wei Yang ◽  
Tzonelih Hwang

Sign in / Sign up

Export Citation Format

Share Document