Cryptanalysis and Improvement of Ye et al’s Quantum Private Comparison Protocol
Recently, Ye et al. (Int. J. Theor. Phys. 56, 1517–1529, 2017) proposed a quantum private comparison (QPC) protocol based on five-qubit entanglement state. Two parties can verify that their secret information is equal or not with the help of the semi-honest third party (TP). However, in this paper we will point out the Ye et al.’s initial protocol is not safe under a special participant attack. That is a malicious participant can get the other party’s secret input information illegally under the forgery attack. Furthermore, we give two possible improvement protocols, which can perform this protocol secure against this kind of attack.
KeywordsCryptanalysis Quantum private comparison Participant attack
The authors are supported by the National Natural Science Foundation of China under Grant Nos. 11725524, 61471356, Major State Basic Research Development Program of China Nos. 2014CB340600, Natural Science Foundation of HeBei Province Nos. F2017201199, Science and technology research project of Hebei higher education Nos. QN2017020.
- 1.Li, Y.M., Wang, X.Y., Bai, Z.L., et al.: Continuous variable quantum key distribution. Chin. Phys. B 5(4), 102–108 (2017)Google Scholar
- 12.Gao, X., Zhang, S.B., Chang, Y., et al.: Cryptanalysis of the quantum private comparison protocol based on the entanglement swapping between three-particle W-class state and bell state. Int. J. Theor. Phys. 1–7 (2018)Google Scholar
- 16.Wang, F., Luo, M., Huiran, L.I., et al: Quantum private comparison based on quantum dense coding. Sc. China 59(11), 112501 (2016)Google Scholar
- 18.Lang Y.F.: Semi-quantum private comparison using single photons. Int. J. Theor. Phys. (2):1–8 (2018)Google Scholar