Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state

Quantum private comparison (QPC) protocol can guarantee the two participants to compare the equality of their private information without leaking them. Based on the entanglement swapping between the four-qubit cluster state and extended Bell state, an efficient QPC protocol has been proposed. Three bits of the secret inputs have been compared in each comparison time, which improves the efficiency compared with the previous QPC protocols’ one or two bits. Then, based on a random sequence pre-shared between the two participants, the semi-honest third party can only execute the protocol’s process without obtaining the information of the participants’ secrets and comparison results. Last, various kinds of attacks have been analyzed, which show that the proposed protocol is secure against the outside and participants attacks.

[1]  Tian-Yin Wang,et al.  Security of quantum digital signatures for classical messages , 2015, Scientific Reports.

[2]  Bin Liu,et al.  Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels , 2013 .

[3]  Jian Li,et al.  Secure Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State , 2016 .

[4]  Yu-Guang Yang,et al.  Arbitrated quantum signature scheme based on cluster states , 2016, Quantum Inf. Process..

[5]  Gang Xu,et al.  Cryptanalysis of secret sharing with a single d-level quantum system , 2018, Quantum Inf. Process..

[6]  Gerardo Adesso,et al.  Unconditional security of entanglement-based continuous-variable quantum secret sharing , 2016, 1603.03224.

[7]  Jian Li,et al.  Deterministic Quantum Secure Direct Communication Protocol Based on Omega State , 2019, IEEE Access.

[8]  Binayak S. Choudhury,et al.  Simultaneous Teleportation of Arbitrary Two-qubit and Two Arbitrary Single-qubit States Using A Single Quantum Resource , 2018 .

[9]  Tian-Yin Wang,et al.  Economical quantum anonymous transmissions , 2010 .

[10]  Tian-Yin Wang,et al.  One-time proxy signature based on quantum cryptography , 2012, Quantum Inf. Process..

[11]  H. Briegel,et al.  Persistent entanglement in arrays of interacting particles. , 2000, Physical review letters.

[12]  Tzonelih Hwang,et al.  New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.

[13]  Zhiwen Zhao,et al.  Secure quantum sealed-bid auction with post-confirmation , 2010 .

[14]  Bin Liu,et al.  Quantum private comparison employing single-photon interference , 2017, Quantum Inf. Process..

[15]  Yixian Yang,et al.  An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement , 2010 .

[16]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[17]  Ling Xu,et al.  Quantum private comparison protocol based on the entanglement swapping between $$\chi ^+$$χ+ state and W-Class state , 2017, Quantum Inf. Process..

[18]  Wenliang Du,et al.  Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.

[19]  Na Li,et al.  A Survey on Quantum Cryptography , 2018 .

[20]  Tian-Yin Wang,et al.  The postprocessing of quantum digital signatures , 2017, Quantum Inf. Process..

[21]  Fan Yang,et al.  Cryptanalysis of the Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State , 2018 .

[22]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[23]  Tad Hogg,et al.  Quantum Auctions , 2007, 0704.0800.

[24]  V. Buzek,et al.  Toward protocols for quantum-ensured privacy and secure voting , 2011, 1108.5090.

[25]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[26]  W. Dur,et al.  Entanglement properties of multipartite entangled states under the influence of decoherence , 2005 .

[27]  Qiaoyan Wen,et al.  Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol , 2007, 0801.2418.

[28]  Gang Xu,et al.  A class of protocols for quantum private comparison based on the symmetry of states , 2014, Quantum Inf. Process..

[29]  Jian Li,et al.  An Efficient Protocol for the Private Comparison of Equal Information Based on Four-Particle Entangled W State and Bell Entangled States Swapping , 2014 .

[30]  P. Lu,et al.  Isolation of Live Premature Senescent Cells Using FUCCI Technology , 2016, Scientific Reports.

[31]  Jian Li,et al.  One Step Quantum Key Distribution Based on EPR Entanglement , 2016, Scientific Reports.

[32]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[33]  Qiaoyan Wen,et al.  An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .

[34]  A. Zeilinger,et al.  Experimental one-way quantum computing , 2005, Nature.

[35]  Qiao-Yan Wen,et al.  Improved secure quantum sealed-bid auction , 2009 .

[36]  Anthony Chefles,et al.  Quantum protocols for anonymous voting and surveying , 2005, quant-ph/0504161.

[37]  Jingjing Zhao,et al.  Differential phase shift quantum private comparison , 2014, Quantum Inf. Process..

[38]  Fei Gao,et al.  Quantum protocol for millionaire problem , 2011 .

[39]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[40]  Tian-Yin Wang,et al.  Security of a sessional blind signature based on quantum cryptograph , 2014, Quantum Information Processing.

[41]  Charles H. Bennett,et al.  Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.

[42]  Su-Juan Qin,et al.  Quantum anonymous ranking , 2014 .

[43]  Wen Liu,et al.  An efficient protocol for the quantum private comparison of equality with W state , 2011 .

[44]  Wei Cui,et al.  Quantum Private Comparison Protocol Based on Bell Entangled States , 2012 .