Cryptanalysis and improvement of a quantum private set intersection protocol

A recent Quantum Private Set Intersection (QPSI) scheme is crypt-analyzed. The original claimed communication overhead is shown to be not accurate. And the original security definition is passive and not fair. To ensure fairness, a passive third party is introduced. It is also shown that unconditional fairness of QPSI protocol is impossible. Since otherwise, it would violate a well-known impossible quantum cryptography result.

[1]  Antoni Wójcik Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.

[2]  Hoi-Kwong Lo,et al.  Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.

[3]  Ivan Damgård,et al.  Cryptography in the Bounded-Quantum-Storage Model , 2008, SIAM J. Comput..

[4]  Fen-Zhuo Guo,et al.  Consistency of shared reference frames should be reexamined , 2008 .

[5]  Hao Liang,et al.  Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution , 2010 .

[6]  Deng Fu-Guo,et al.  Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)] , 2006 .

[7]  Fei Gao,et al.  A simple participant attack on the brádler-dušek protocol , 2007, Quantum Inf. Comput..

[8]  Dominic Mayers Unconditionally secure quantum bit commitment is impossible , 1997 .

[9]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[10]  Fei Gao,et al.  Postprocessing of the Oblivious Key in Quantum Private Query , 2014, IEEE Journal of Selected Topics in Quantum Electronics.

[11]  Dong Hoon Lee,et al.  Privacy-preserving disjunctive normal form operations on distributed sets , 2013, Inf. Sci..

[12]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[13]  Qiao-Yan Wen,et al.  Comment on "experimental demonstration of a quantum protocol for Byzantine agreement and liar detection". , 2008, Physical review letters.

[14]  Craig Gentry,et al.  Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..

[15]  Qiaoyan Wen,et al.  Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .

[16]  Qiaoyan Wen,et al.  Improving the security of multiparty quantum secret sharing against an attack with a fake signal , 2006 .

[17]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[18]  Kaushik Chakraborty,et al.  Arbitrarily long relativistic bit commitment , 2015, Physical review letters.

[19]  Su-Juan Qin,et al.  Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state , 2010 .

[20]  N. Gisin,et al.  Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.

[21]  Antoni Wojcik,et al.  Comment on 'Quantum dense key distribution' , 2005 .

[22]  Christoph Simon,et al.  Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.

[23]  Christoph Pacher,et al.  Attacks on quantum key distribution protocols that employ non-ITS authentication , 2012, Quantum Information Processing.

[24]  Qiao-Yan Wen,et al.  Improved secure quantum sealed-bid auction , 2009 .

[25]  Yanbing Liu,et al.  Cryptanalysis and improvement of verifiable quantum (k, n) secret sharing , 2016, Quantum Inf. Process..

[26]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[27]  Hoi-Kwong Lo,et al.  Insecurity of Quantum Secure Computations , 1996, ArXiv.

[28]  Qing-yu Cai,et al.  The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.

[29]  Fei Gao,et al.  Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols , 2010, IEEE Journal of Quantum Electronics.

[30]  Hoi-Kwong Lo,et al.  Some attacks on quantum-based cryptographic protocols , 2005, Quantum Inf. Comput..

[31]  Yi Mu,et al.  An efficient quantum scheme for Private Set Intersection , 2016, Quantum Inf. Process..

[32]  Wen Qiao-Yan,et al.  Teleportation attack on the QSDC protocol with a random basis and order , 2008 .

[33]  Bo Zhang,et al.  Cryptanalysis and improvement of quantum private comparison of equality protocol without a third party , 2015, Quantum Inf. Process..

[34]  Guang-Can Guo,et al.  Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61 , 052312 (2000)] , 2001 .

[35]  Christian Schaffner,et al.  Cryptography from noisy storage. , 2007, Physical review letters.

[36]  Qiaoyan Wen,et al.  Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)] , 2011, Quantum Inf. Process..

[37]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[38]  Bin Liu,et al.  QKD-based quantum private query without a failure probability , 2015, Science China Physics, Mechanics & Astronomy.

[39]  Sungyoung Lee,et al.  Privacy-aware searching with oblivious term matching for cloud storage , 2012, The Journal of Supercomputing.

[40]  Fei Gao,et al.  Practical quantum private query with better performance in resisting joint-measurement attack , 2016 .

[41]  Wen Qiao-Yan,et al.  A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol , 2008 .

[42]  Hung-Min Sun,et al.  A communication-efficient private matching scheme in Client-Server model , 2014, Inf. Sci..

[43]  Justin Zhijun Zhan,et al.  Using Private Matching for Securely Querying Genomic Sequences , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[44]  Dan Boneh,et al.  Location Privacy via Private Proximity Testing , 2011, NDSS.

[45]  Moti Yung,et al.  Efficient robust private set intersection , 2009, Int. J. Appl. Cryptogr..

[46]  Adan Cabello Reply to `Comment on ``Quantum key distribution without alternative measurements''' , 2000 .