SIMPLE QUANTUM PROTOCOLS FOR THE MILLIONAIRE PROBLEM WITH A SEMI-HONEST THIRD PARTY

Recently there were many quantum protocols devoted to solve the millionaire problem and private comparison problem by adding a semi-honest third party. They all require complicated quantum methods, while still leak a non-trivial amount of information to at least one of the parties. But it will be shown here that once the third party is introduced, there can be protocols which is very simple in the sense that they require quantum key distribution as the only quantum resource. Meanwhile, the amount of information leaked can be made arbitrarily small. Furthermore, in most previous protocols the third party can spoil the protocols without being detected. In our protocol such cheating can also be avoided, so that the only constraint left is that the third party should not conspire with another participant. Thus our solutions surpass all existing protocols on both feasibility and security.

[1]  Wen Liu,et al.  New Quantum Private Comparison Protocol Using χ-Type State , 2012 .

[2]  Wen Liu,et al.  A Protocol for the Quantum Private Comparison of Equality with χ-Type State , 2012 .

[3]  Fei Gao,et al.  Efficient quantum private comparison employing single photons and collective detection , 2013, Quantum Inf. Process..

[4]  Wen Liu,et al.  An efficient protocol for the quantum private comparison of equality with W state , 2011 .

[5]  Fei Gao,et al.  Quantum protocol for millionaire problem , 2011 .

[6]  Louis Salvail,et al.  Two-Party Quantum Protocols Do Not Compose Securely Against Honest-But-Curious Adversaries , 2009, 0906.1671.

[7]  Qiao-Yan Wen,et al.  Secure quantum private comparison , 2009 .

[8]  Qiaoyan Wen,et al.  An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .

[9]  Hua Zhang,et al.  Comment on quantum private comparison protocols with a semi-honest third party , 2012, Quantum Information Processing.

[10]  Roger Colbeck,et al.  The Impossibility Of Secure Two-Party Classical Computation , 2007, ArXiv.

[11]  Yixian Yang,et al.  An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement , 2010 .

[12]  Yuguang Yang,et al.  NEW QUANTUM PRIVATE COMPARISON PROTOCOL WITHOUT ENTANGLEMENT , 2012 .

[13]  Iordanis Kerenidis,et al.  Lower bounds for quantum oblivious transfer , 2010, Quantum Inf. Comput..

[14]  Tzonelih Hwang,et al.  New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.

[15]  Tzonelih Hwang,et al.  Intercept–resend attacks on Chen et al.'s quantum private comparison protocol and the improvements , 2011 .

[16]  T. Rudolph The Laws of Physics and Cryptographic Security , 2002, quant-ph/0202143.