Improved secure quantum sealed-bid auction

Abstract The security of a secure quantum sealed-bid auction protocol using quantum secure direct communication based on GHZ states [M. Naseri, Opt. Commun. 282 (2009) 1939] is reexamined. It is shown that the protocol does not complete the task of a sealed-bid auction fairly. It is shown that a dishonest bidder can obtain all the other one’s secret bids by two special types of attack, i.e., double Controlled NOT attack or using fake entangled particles. Furthermore, a simple possible improvement of the protocol is proposed.

[1]  Antoni Wójcik Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.

[2]  Harald Weinfurter,et al.  Secure Communication with a Publicly Known Key , 2001 .

[3]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[4]  Wen Qiao-Yan,et al.  A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol , 2008 .

[5]  I. Chuang,et al.  Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .

[6]  Chin-Chen Chang,et al.  Efficient anonymous auction protocols with freewheeling bids , 2003, Comput. Secur..

[7]  Zhan-jun Zhang,et al.  The improved Bostrom-Felbinger protocol against attacks without eavesdropping , 2004 .

[8]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[9]  Edward W. Piotrowski,et al.  An Invitation to Quantum Game Theory , 2002, ArXiv.

[10]  E. W. Piotrowski,et al.  Quantum English auctions , 2001 .

[11]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[12]  E. W. Piotrowski,et al.  Quantum Auctions: Facts and Myths ⋆ , 2007, 0709.4096.

[13]  D. Meyer Quantum strategies , 1998, quant-ph/9804010.

[14]  Zhan-jun Zhang,et al.  Improving Wojcik's eavesdropping attack on the ping-pong protocol , 2004 .

[15]  Zhang Zhan-jun,et al.  Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations , 2005 .

[16]  J. Eisert,et al.  Quantum Games and Quantum Strategies , 1998, quant-ph/9806088.

[17]  Chuan Wang,et al.  Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state , 2005 .

[18]  N. An,et al.  Quantum secure direct communication by using GHZ states and entanglement swapping , 2006 .

[19]  Zhan-jun Zhang,et al.  Improved Wójcik's eavesdropping attack on ping-pong protocol without eavesdropping-induced channel loss , 2004, quant-ph/0411030.

[20]  J. Sladkowski,et al.  The next stage: quantum game theory , 2003, quant-ph/0308027.

[21]  Mosayeb Naseri,et al.  Secure quantum sealed-bid auction , 2009 .

[22]  Zhou Hong-Yu,et al.  Multiparty Quantum Secret Report , 2006 .

[23]  Srividhya Subramanian,et al.  Design and verification of a secure electronic auction protocol , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[24]  Ping Zhou,et al.  Deterministic secure quantum communication without maximally entangled states , 2006 .

[25]  Tzer-Shyong Chen,et al.  An English auction scheme in the online transaction environment , 2004, Comput. Secur..