Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state
- 61 Downloads
Quantum private comparison (QPC) protocol can guarantee the two participants to compare the equality of their private information without leaking them. Based on the entanglement swapping between the four-qubit cluster state and extended Bell state, an efficient QPC protocol has been proposed. Three bits of the secret inputs have been compared in each comparison time, which improves the efficiency compared with the previous QPC protocols’ one or two bits. Then, based on a random sequence pre-shared between the two participants, the semi-honest third party can only execute the protocol’s process without obtaining the information of the participants’ secrets and comparison results. Last, various kinds of attacks have been analyzed, which show that the proposed protocol is secure against the outside and participants attacks.
KeywordsQuantum private comparison Entanglement swapping Cluster state Semi-honest third party
Project supported by the National Natural Science Foundation of China (Grant Nos. U1636106 and 61671087), Natural Science Foundation of Beijing Municipality under Grant 4182006, The Major Science and Technology Support Program of Guizhou Province under Grant 20183001, The Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data under Grant 2018BDKFJJ016 and BUPT Excellent Ph.D. Students Foundation (Grant No. CX2019227).
- 1.Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179. IEEE, New York (1984)Google Scholar
- 5.Li, J., Li, N., Li, L.L., Wang, T.: One step quantum key distribution based on EPR entanglement. Sci. Rep. 6(28767), 1–6 (2016)Google Scholar
- 15.Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, pp. 160–164 (1982)Google Scholar
- 16.Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: a review and open problems. In: Proceedings of the 2001 Workshop on New Security Paradigms, Cloudcroft, America, pp. 13–22. ACM, New York (2001)Google Scholar
- 37.Xu, L., Wang, J., Ahmed, H., et al.: A new quantum private comparison protocol. In: AOPC 2017: Fiber Optic Sensing and Optical Communications. International Society for Optics and Photonics, vol. 10464, p. 104640M (2017)Google Scholar