Twice-Hadamard-CNOT attack on Li et al.’s fault-tolerant quantum private comparison and the improved scheme

Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-Horne-Zeilinger (GHZ) states and error-correcting code (ECC) [Int. J. Theor. Phys. 52, 2818 (2013)], claiming it is fault-tolerant and could be performed in a non-ideal scenario. However, there exists a fatal loophole in their private comparison scheme under a special attack, namely the twice-Hadamard-CNOT attack. Specifically, a malicious party may intercept the other party’s particles and execute Hadamard operations on the intercepted particles as well as on his or her own particles. Then, the malicious party could sequentially perform a controlled-NOT (CNOT) operation between intercepted particles and the auxiliary particles, as well as between his or her own particles and the auxiliary particles prepared in advance. By measuring the auxiliary particles, the secret input will be revealed to the malicious party without being detected. For resisting this special attack, a feasible improved scheme is proposed by introducing a permutation operator before the third party (TP) sends the particle sequences to each participant.

[1]  Tian-Yin Wang,et al.  Fault-Tolerate Quantum Private Comparison Based on GHZ States and ECC , 2013, 1405.6765.

[2]  Wei-Wei Zhang,et al.  Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party , 2013, Quantum Inf. Process..

[3]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[4]  Qiaoyan Wen,et al.  Quantum Private Comparison Using Genuine Four-Particle Entangled States , 2012 .

[5]  Bin Liu,et al.  Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels , 2013 .

[6]  Chen Hanwu,et al.  An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication , 2009 .

[7]  Huantong Geng,et al.  Same Initial States Attack in Yang et al.’s Quantum Private Comparison Protocol and the Improvement , 2013, 1312.5562.

[8]  Qiaoyan Wen,et al.  An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .

[9]  Chao Liu,et al.  Quantum Private Comparison: A Review , 2013, ArXiv.

[10]  Tzonelih Hwang,et al.  Intercept–resend attacks on Chen et al.'s quantum private comparison protocol and the improvements , 2011 .

[11]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[12]  Pan Qing,et al.  Continuous variable quantum communication with bright entangled optical beams , 2006 .

[13]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[14]  Tzonelih Hwang,et al.  New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.

[15]  Su-Juan Qin,et al.  Quantum asymmetric cryptography with symmetric keys , 2008, 0810.2859.

[16]  Yu Zheng,et al.  Cryptanalysis and Improvement of Quantum Private Comparison Protocol Based on Bell Entangled States , 2014, 1405.6455.

[17]  Wen Liu,et al.  Quantum Private Comparison Based on GHZ Entangled States , 2012 .

[18]  Ching Ying Lin,et al.  CNOT extraction attack on “quantum asymmetric cryptography with symmetric keys” , 2014 .

[19]  Kimble,et al.  Unconditional quantum teleportation , 1998, Science.

[20]  Zhihao Liu,et al.  Improvement on "an efficient protocol for the quantum private comparison of equality with W state" , 2014 .

[21]  Yixian Yang,et al.  An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement , 2010 .

[22]  Kuang Le-Man,et al.  Quantum repeaters based on CNOT gate under decoherence , 2007 .

[23]  R. Cleve,et al.  HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.

[24]  Wenjie Liu,et al.  Selection of unitary operations in quantum secret sharing without entanglement , 2011, Science China Information Sciences.

[25]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[26]  Mu-Sheng Jiang,et al.  Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices , 2014, Frontiers of Physics.

[27]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[28]  Wang Chuan,et al.  Quantum secure direct communication and deterministic secure quantum communication , 2007 .

[29]  Chun-Wei Yang,et al.  Quantum private comparison of equality protocol without a third party , 2014, Quantum Inf. Process..

[30]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[31]  Li Zhi-qiang,et al.  Efficient Quantum Secure Direct Communication with Authentication , 2007 .

[32]  H. Weinfurter,et al.  Experimental quantum teleportation , 1997, Nature.

[33]  Yan Chang,et al.  Controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad , 2014 .

[34]  Wen Liu,et al.  An efficient protocol for the quantum private comparison of equality with W state , 2011 .