Multi-party quantum private comparison of size relation with d-level single-particle states

In this paper, by using d-level single-particle states, two novel multi-party quantum private comparison protocols for size relation comparison with two semi-honest third parties and one semi-honest third party are constructed, respectively. Here, each protocol can compare the size relation of secret integers from n parties rather than just the equality within one time execution. In each protocol, every third party is assumed to be semi-honest in the sense that she may misbehave on her own but is not allowed to collude with anyone else; and each party employs the qudit shifting operation to encode her secret integer. Each protocol can resist both the outside attack and the participant attack. Specially, each party’s secret integer can be kept unknown to other parties and the third parties. The proposed protocol with two third parties is workable in a stranger environment, as there are no communication and no pre-shared key between each pair of party. The proposed protocol with one third party is workable in an acquaintance environment, as all parties need to share a common private key beforehand.

[1]  Guowu Yang,et al.  Multi-party quantum private comparison protocol based on $$d$$d-dimensional entangled states , 2014, Quantum Inf. Process..

[2]  Fei Gao,et al.  Practical quantum private query with better performance in resisting joint-measurement attack , 2016 .

[3]  Ye Tianyu,et al.  Multi-party quantum private comparison based on the entanglement swapping of d-level cat states and d-level Bell states , 2017 .

[4]  Wen Liu,et al.  Multi-party Quantum Private Comparison Protocol Using d-Dimensional Basis States Without Entanglement Swapping , 2014 .

[5]  Deng Fu-Guo,et al.  Efficient Quantum Cryptography Network without Entanglement and Quantum Memory , 2006 .

[6]  Jian-Wei Pan,et al.  Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.

[7]  Qiaoyan Wen,et al.  Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol , 2007, 0801.2418.

[8]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[9]  Qiao-Yan Wen,et al.  Secure quantum private comparison , 2009 .

[10]  周萍,et al.  Efficient Quantum Cryptography Network without Entanglement and Quantum Memory , 2006 .

[11]  Ying Sun,et al.  Quantum private comparison protocol with d-dimensional Bell states , 2012, Quantum Information Processing.

[12]  D. Markham,et al.  Quantum secret sharing with qudit graph states , 2010, 1004.4619.

[13]  Jian Li,et al.  An Efficient Protocol for the Private Comparison of Equal Information Based on Four-Particle Entangled W State and Bell Entangled States Swapping , 2014 .

[14]  Tzonelih Hwang,et al.  New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.

[15]  Xi-Han Li,et al.  Efficient quantum key distribution over a collective noise channel (6 pages) , 2008, 0808.0042.

[16]  Ping Zhou,et al.  Robustness of two-way quantum communication protocols against Trojan horse attack , 2005 .

[17]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[18]  Fuguo Deng,et al.  Improving the security of secure direct communication based on the secret transmitting order of particles , 2006, quant-ph/0612016.

[19]  Fei Gao,et al.  Quantum private comparison protocol based on entanglement swapping of $$d$$-level Bell states , 2013, Quantum Inf. Process..

[20]  R. Cleve,et al.  HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.

[21]  Fei Gao,et al.  Postprocessing of the Oblivious Key in Quantum Private Query , 2014, IEEE Journal of Selected Topics in Quantum Electronics.

[22]  Fei Gao,et al.  A simple participant attack on the brádler-dušek protocol , 2007, Quantum Inf. Comput..

[23]  Hong-Yu Zhou,et al.  An efficient quantum secret sharing scheme with Einstein–Podolsky–Rosen pairs , 2005 .

[24]  Bin Liu,et al.  A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure , 2017, IEEE Transactions on Computers.

[25]  Wang Yan,et al.  Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations , 2005 .

[26]  Jingjing Zhao,et al.  Differential phase shift quantum private comparison , 2014, Quantum Inf. Process..

[27]  Guang-Can Guo,et al.  Quantum secret sharing without entanglement , 2002 .

[28]  Hua Zhang,et al.  Comment on quantum private comparison protocols with a semi-honest third party , 2012, Quantum Information Processing.

[29]  Zhiwei Sun,et al.  Quantum Private Comparison Protocol Based on Cluster States , 2013 .

[30]  Qiaoyan Wen,et al.  Participant attack on a kind of MQSS schemes based on entanglement swapping , 2010 .

[31]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[32]  Yu-Guang Yang,et al.  Comment on “efficient and feasible quantum private comparison of equality against the collective amplitude damping noise” , 2014, Quantum Inf. Process..

[33]  Barry C. Sanders,et al.  Erratum: Graph states for quantum secret sharing [Phys. Rev. A 78, 042309 (2008)] , 2011 .

[34]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[35]  Gongde Guo,et al.  Quantum Private Comparison of Equality with χ-Type Entangled States , 2013 .

[36]  Chia-Wei Tsai,et al.  Multi-user private comparison protocol using GHZ class states , 2013, Quantum Inf. Process..

[37]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[38]  Wei Huang,et al.  Multi-party quantum private comparison protocol with $$n$$n-level entangled states , 2014, Quantum Inf. Process..

[39]  Man Zhong-xiao,et al.  Quantum Bidirectional Secure Direct Communication via Entanglement Swapping , 2007 .

[40]  Yan Wang,et al.  Secure quantum key distribution network with Bell states and local unitary operations , 2007, 0705.1746.

[41]  H. Weinfurter,et al.  Experimental quantum teleportation , 1997, Nature.

[42]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[43]  Dan Li,et al.  Quantum Private Comparison Protocol with W States , 2014 .

[44]  Jian Wang,et al.  Quantum secure direct communication based on order rearrangement of single photons , 2006, quant-ph/0603100.

[45]  Q. Cai Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.

[46]  D. Markham,et al.  Graph states for quantum secret sharing , 2008, 0808.1532.

[47]  Tian-Yu Ye,et al.  Reply to the Comment on “Improvement of Controlled Bidirectional Quantum Direct Communication Using a GHZ State" [Chin. Phys. Lett. 30 (2013) 040305] , 2013 .

[48]  Wei Cui,et al.  Quantum Private Comparison Protocol Based on Bell Entangled States , 2012 .

[49]  Ziyun Zhang,et al.  Perfect teleportation of an arbitrary three-qubit state with the highly entangled six-qubit genuine state , 2010 .

[50]  Yixian Yang,et al.  An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement , 2010 .

[51]  Qiaoyan Wen,et al.  Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .

[52]  D. Gottesman Theory of quantum secret sharing , 1999, quant-ph/9910067.

[53]  M. Koashi,et al.  Quantum entanglement for secret sharing and secret splitting , 1999 .

[54]  Wei Chen,et al.  Delayed error verification in quantum key distribution , 2014 .

[55]  Qiaoyan Wen,et al.  An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .

[56]  Prosanta Gope,et al.  Multi-party quantum private comparison with an almost-dishonest third party , 2015, Quantum Inf. Process..

[57]  Yi-min Liu,et al.  Many-Agent Controlled Teleportation of Multi-qubit Quantum Information via Quantum Entanglement Swapping , 2005 .

[58]  K. Peng,et al.  Multiparty secret sharing of quantum information based on entanglement swapping , 2004 .

[59]  Jacques Traoré,et al.  A fair and efficient solution to the socialist millionaires' problem , 2001, Discret. Appl. Math..

[60]  Christoph Simon,et al.  Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.

[61]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[62]  Gu Bin,et al.  A two-step quantum secure direct communication protocol with hyperentanglement , 2011 .

[63]  Chao-Hua Yu,et al.  Quantum private comparison with d-level single-particle states , 2013 .

[64]  Gang Xu,et al.  CRYPTANALYSIS AND IMPROVEMENTS FOR THE QUANTUM PRIVATE COMPARISON PROTOCOL USING EPR PAIRS , 2013 .

[65]  Tian-Yu Ye,et al.  Improvement of Controlled Bidirectional Quantum Direct Communication Using a GHZ State , 2013 .

[66]  Qiaoyan Wen,et al.  Quantum Private Comparison Protocol with the Random Rotation , 2013 .

[67]  Wei-Wei Zhang,et al.  Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party , 2013, Quantum Inf. Process..

[68]  A Cabello Quantum key distribution in the Holevo limit. , 2000, Physical review letters.

[69]  Yuguang Yang,et al.  NEW QUANTUM PRIVATE COMPARISON PROTOCOL WITHOUT ENTANGLEMENT , 2012 .

[70]  Hoi-Kwong Lo,et al.  Insecurity of Quantum Secure Computations , 1996, ArXiv.

[71]  Fei Gao,et al.  Efficient quantum private comparison employing single photons and collective detection , 2013, Quantum Inf. Process..

[72]  Zhaoxu Ji,et al.  Quantum Private Comparison of Equal Information Based on Highly Entangled Six-Qubit Genuine State , 2016 .

[73]  Xiu-Bo Chen,et al.  An efficient and secure multiparty quantum secret sharing scheme based on single photons , 2008 .

[74]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[75]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[76]  Tzonelih Hwang,et al.  Multiparty quantum private comparison with almost dishonest third parties for strangers , 2017, Quantum Inf. Process..