Quantum private comparison with d-level single-particle states

In this paper, a quantum private comparison protocol with d-level single-particle states is proposed. In the protocol, a semi-honest third party is introduced to help two participants compare the size relationship of their secrets without revealing them to any other people. It is shown that the protocol is secure in theory. Moreover, the security of the protocol in real circumstance is also discussed.

[1]  Qiaoyan Wen,et al.  An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .

[2]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[3]  Tingting Song,et al.  Quantum Private Comparison Based on Quantum Search Algorithm , 2013 .

[4]  Anders Karlsson,et al.  Security of quantum key distribution using d-level systems. , 2001, Physical review letters.

[5]  Qiaoyan Wen,et al.  Quantum Private Comparison Using Genuine Four-Particle Entangled States , 2012 .

[6]  Fei Gao,et al.  Quantum protocol for millionaire problem , 2011 .

[7]  Wen Liu,et al.  New Quantum Private Comparison Protocol Using χ-Type State , 2012 .

[8]  Fei Gao,et al.  Quantum private comparison protocol based on entanglement swapping of $$d$$-level Bell states , 2013, Quantum Inf. Process..

[9]  Ying Sun,et al.  Quantum private comparison against decoherence noise , 2013, Quantum Inf. Process..

[10]  Wen Liu,et al.  A Protocol for the Quantum Private Comparison of Equality with χ-Type State , 2012 .

[11]  Valerio Scarani,et al.  Erratum: Security proof for quantum key distribution using qudit systems [Phys. Rev. A 82, 030301(R) (2010)] , 2011 .

[12]  Q. Cai Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.

[13]  Yixian Yang,et al.  An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement , 2010 .

[14]  Valerio Scarani,et al.  Security proof for quantum key distribution using qudit systems , 2010, 1003.5464.

[15]  Stefano Mancini,et al.  Deterministic quantum distribution of a d-ary key , 2009, Quantum Inf. Comput..

[16]  Fei Gao,et al.  Efficient quantum private comparison employing single photons and collective detection , 2013, Quantum Inf. Process..

[17]  Hoi-Kwong Lo,et al.  Insecurity of Quantum Secure Computations , 1996, ArXiv.

[18]  Wen Liu,et al.  An efficient protocol for the quantum private comparison of equality with W state , 2011 .

[19]  N. Gisin,et al.  Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.

[20]  Ying Sun,et al.  Quantum private comparison protocol with d-dimensional Bell states , 2012, Quantum Information Processing.

[21]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[22]  Qiaoyan Wen,et al.  Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks , 2009 .

[23]  Hua Zhang,et al.  Comment on quantum private comparison protocols with a semi-honest third party , 2012, Quantum Information Processing.

[24]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[25]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[26]  Tzonelih Hwang,et al.  New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.

[27]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[28]  Wei-Wei Zhang,et al.  A quantum protocol for millionaire problem with Bell states , 2013, Quantum Inf. Process..

[29]  Marco Lucamarini,et al.  Secure deterministic communication without entanglement. , 2005, Physical review letters.

[30]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[31]  M. Koashi,et al.  Quantum entanglement for secret sharing and secret splitting , 1999 .

[32]  Xingtong Liu,et al.  Cryptanalysis of the secure quantum private comparison protocol , 2013 .