Cryptanalysis and Improvement of Quantum Private Comparison Protocol Based on Bell Entangled States

Recently, Liu et al. [Commun. Theor. Phys. 57 (2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party (TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol, it not only reduces the Bell states consumption but also simplifies the protocol steps.

[1]  Adrian Kent,et al.  Memory attacks on device-independent quantum cryptography. , 2012, Physical review letters.

[2]  Chao Liu,et al.  Quantum Private Comparison: A Review , 2013, ArXiv.

[3]  Chen Hanwu,et al.  An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication , 2009 .

[4]  Huantong Geng,et al.  Same Initial States Attack in Yang et al.’s Quantum Private Comparison Protocol and the Improvement , 2013, 1312.5562.

[5]  Damian Markham,et al.  Quantum Secret Sharing with Error Correction , 2014, ArXiv.

[6]  Kimble,et al.  Unconditional quantum teleportation , 1998, Science.

[7]  Yan Wang,et al.  Secure quantum key distribution network with Bell states and local unitary operations , 2007, 0705.1746.

[8]  Kejin Wei,et al.  Experimental circular quantum secret sharing over telecom fiber network. , 2013, Optics express.

[9]  Fuguo Deng,et al.  Circular quantum secret sharing , 2006, quant-ph/0612018.

[10]  Jian-Wei Pan,et al.  Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.

[11]  Qiaoyan Wen,et al.  Quantum Private Comparison Using Genuine Four-Particle Entangled States , 2012 .

[12]  Wen Liu,et al.  A Protocol for the Quantum Private Comparison of Equality with χ-Type State , 2012 .

[13]  Tzonelih Hwang,et al.  New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.

[14]  Fuguo Deng,et al.  Bidirectional quantum key distribution protocol with practical faint laser pulses , 2004 .

[15]  Harald Weinfurter,et al.  Secure Communication with a Publicly Known Key , 2001 .

[16]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[17]  R. Cleve,et al.  HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.

[18]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[19]  Andrew Chi-Chih Yao,et al.  Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.

[20]  Zhiwei Sun,et al.  Quantum Private Comparison Protocol Based on Cluster States , 2013 .

[21]  Qiaoyan Wen,et al.  Quantum Private Comparison Protocol with the Random Rotation , 2013 .

[22]  Tian-Yin Wang,et al.  Fault-Tolerate Quantum Private Comparison Based on GHZ States and ECC , 2013, 1405.6765.

[23]  Wei-Wei Zhang,et al.  Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party , 2013, Quantum Inf. Process..

[24]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[25]  Xiang Peng,et al.  Source monitoring for continuous-variable quantum key distribution , 2012 .

[26]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[27]  Wang Yan,et al.  Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations , 2005 .

[28]  Hoi-Kwong Lo,et al.  Insecurity of Quantum Secure Computations , 1996, ArXiv.

[29]  Wenjie Liu,et al.  Secure Quantum Private Comparison of Equality Based on Asymmetric W State , 2013, 1312.5577.

[30]  H. Weinfurter,et al.  Experimental quantum teleportation , 1997, Nature.

[31]  Christian Kurtsiefer,et al.  LETTER TO THE EDITOR: Secure communication with single-photon two-qubit states , 2001 .

[32]  Qiaoyan Wen,et al.  An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .

[33]  Hua Lu,et al.  Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel , 2011, 1111.0109.

[34]  Bin Liu,et al.  Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels , 2013 .

[35]  Jacques Traoré,et al.  A fair and efficient solution to the socialist millionaires' problem , 2001, Discret. Appl. Math..

[36]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[37]  Li Zhi-qiang,et al.  Efficient Quantum Secure Direct Communication with Authentication , 2007 .

[38]  Wei Cui,et al.  Quantum Private Comparison Protocol Based on Bell Entangled States , 2012 .

[39]  Bin Gu,et al.  High-Capacity Three-Party Quantum Secret Sharing with Single Photons in Both the Polarization and the Spatial-Mode Degrees of Freedom , 2013 .