Quantum private comparison protocol based on entanglement swapping of $$d$$-level Bell states

In this paper, we propose a quantum private comparison protocol based on entanglement swapping, where two distrustful parties can compare the values of their secrets with the help of a semi-trusted third party. The protocol can determine not only whether two secrets are equal, but also the size relationship between them. The two parties can deduce the comparison result based on the keys shared between them and the announcement of the third party. Others including the third party will learn nothing about the values of the secrets, as well as the comparison result. The security of our protocol is analyzed. Furthermore, all the particles can be reused in the same protocol model theoretically. So our protocol is efficient and feasible to expand in network service, which in turn gives a solution to the left problem in Lin et al. (Quantum Inf Process, doi:10.1007/s11128-012-0395-6, 2012).

[1]  Bin Liu,et al.  Single-Photon Multiparty Quantum Cryptographic Protocols With Collective Detection , 2011, IEEE Journal of Quantum Electronics.

[2]  Qiao-Yan Wen,et al.  Secure quantum private comparison , 2009 .

[3]  Wei Cui,et al.  Quantum Private Comparison Protocol Based on Bell Entangled States , 2012 .

[4]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[5]  Wen Liu,et al.  New Quantum Private Comparison Protocol Using χ-Type State , 2012 .

[6]  Anders Karlsson,et al.  Security of quantum key distribution using d-level systems. , 2001, Physical review letters.

[7]  Todd A. Brun,et al.  Quantum Computing , 2011, Computer Science, The Hardware, Software and Heart of It.

[8]  Wen Liu,et al.  A Protocol for the Quantum Private Comparison of Equality with χ-Type State , 2012 .

[9]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[10]  Ying Sun,et al.  Quantum private comparison protocol with d-dimensional Bell states , 2012, Quantum Information Processing.

[11]  Wen Liu,et al.  An efficient protocol for the quantum private comparison of equality with W state , 2011 .

[12]  Yixian Yang,et al.  An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement , 2010 .

[13]  Qiaoyan Wen,et al.  An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .

[14]  Vahid Karimipour,et al.  Quantum key distribution for d -level systems with generalized Bell states , 2002 .

[15]  Hoi-Kwong Lo,et al.  Insecurity of Quantum Secure Computations , 1996, ArXiv.

[16]  Jacques Traoré,et al.  A fair and efficient solution to the socialist millionaires' problem , 2001, Discret. Appl. Math..

[17]  Hua Zhang,et al.  Comment on quantum private comparison protocols with a semi-honest third party , 2012, Quantum Information Processing.

[18]  Fei Gao,et al.  Quantum protocol for millionaire problem , 2011 .

[19]  Qiaoyan Wen,et al.  Quantum secure direct communication with χ -type entangled states , 2008 .

[20]  Ekert,et al.  "Event-ready-detectors" Bell experiment via entanglement swapping. , 1993, Physical review letters.

[21]  Qiaoyan Wen,et al.  Semi-loss-tolerant strong coin flipping protocol using EPR pairs , 2011, Quantum Inf. Comput..

[22]  Qiaoyan Wen,et al.  Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol , 2007, 0801.2418.

[23]  H. Weinfurter,et al.  Experimental Entanglement Swapping: Entangling Photons That Never Interacted , 1998 .

[24]  Fei Gao,et al.  A simple participant attack on the brádler-dušek protocol , 2007, Quantum Inf. Comput..

[25]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[26]  Qiaoyan Wen,et al.  A Quantum Watermark Protocol , 2013 .

[27]  Qiao-Yan Wen,et al.  A TWO-STEP CHANNEL-ENCRYPTING QUANTUM KEY DISTRIBUTION PROTOCOL , 2010 .

[28]  Wen Qiao-Yan,et al.  Cryptanalysis and Improvement of Two GHZ-State-Based QSDC Protocols , 2010 .

[29]  Fei Gao,et al.  Efficient quantum private comparison employing single photons and collective detection , 2013, Quantum Inf. Process..

[30]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[31]  Wen Liu,et al.  Quantum Private Comparison Based on GHZ Entangled States , 2012 .

[32]  Hui Chen,et al.  A watermark strategy for quantum images based on quantum fourier transform , 2012, Quantum Information Processing.

[33]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[34]  Tzonelih Hwang,et al.  New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.

[35]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[36]  P. Knight,et al.  Multiparticle generalization of entanglement swapping , 1998 .

[37]  Qiaoyan Wen,et al.  Quantum Private Comparison Using Genuine Four-Particle Entangled States , 2012 .