Abstract
Recently, Li et al. (Int. J. Theor. Phys. 55, 1710–1718, 2016) proposed a Quantum Private Comparison (QPC) protocol based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State. Two parties can check whether their secret information is equal or not with the help of the semi-honest third party (TP). However in this paper, we will point out this kind of semi-honest TP is unreasonable. If we relax the constraint of the semi-honest TP, by using the fake signal attack, TP can know the whole secret information illegally. At last, we give our improvement, which can make this protocol more secure.
Similar content being viewed by others
References
Bennett, C.H., Brassard, G.: . In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing. IEEE, New York (1984)
Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., et al.: Rev. Mod. Phys. 81, 130 (2009)
Lo, H.K., Ma, X.F., Chen, K.: Phys. Rev. Lett. 94, 230504 (2005)
Bai, Z.L., Wang, X.Y., Yang, S.S., et al.: Sci. China Phys. Mech. Astron. 59, 614201 (2016)
Huang, W., Su, Q., Xu, B.J., et al.: Sci. China Phys. Mech. Astron. 59, 120311 (2016)
Deng, F.G., Long, G.L., Liu, X.S.: Phys. Rev. A 68, 042317 (2003)
Deng, F.G., Long, G.L.: Phys. Rev. A 69, 052319 (2004)
Wang, T.Y., Wen, Q.Y., Chen, X.B.: Opt. Commun. 281, 6130 (2008)
Zhang, Z.J.: Phys. Lett. A 342, 60 (2005)
Giovannetti, V., Lloyd, S., Maccone, L.: Phys. Rev. Lett. 100, 230502 (2008)
Jakobi, M., Simon, C., Gisin, N.: Phys. Rev. A 83, 022301 (2011)
Yang, Y.G., Wen, Q.Y.: J. Phys. A-Math. Theor. 42, 055305 (2009)
Tseng, H.Y., Lin, J., Hwang, T.: Quantum Inf. Process. 11, 373 (2012)
Yao, C.: . In: 23rd IEEE Symposium on Foundations of Computer Science. Chicago (1982)
Boudot, F., Schoenmakers, B., Traore, J.: Discrete Appl. Math. 23, 111 (2001)
Chen, X.B., Xu, G., Niu, X.X., et al.: Opt. Commun. 283, 1561 (2010)
Lin, J., Tseng, H.Y., Hwang, T.: Opt. Commun. 284, 2412 (2011)
Tseng, H.Y., Lin, J., Hwang, T.: Quantum Inf. Process. 11, 373 (2012)
Yang, Y.G., Wen, Q.Y.: J. Phys. A: Math. Theor. 42, 055305 (2009)
Yang, Y.G., Xia, J., Jia, X., et al.: Quantum Inf. Process. 12, 877 (2013)
Chang, Y.J., Tsai, C.W., Hwang, T.: Quantum Inf. Process. 12, 1077A (2013)
Yan, C., Chun, X.X., Shi, B.Z., et al.: Chin. Phys. Lett. 33, 010301 (2016)
Chang, C.H., Hwang, T., Gope, P.: Int. J. Theor. Phys. 55, 2125 (2016)
Li, J., Jia, L., Zhou, H.-F., Zhang, T.-T., et al.: Int. J. Theor. Phys. 55, 1710 (2016)
Lo, H.K.: Phys. Rev. A 56, 1154 (1997)
Jakobi, M., Simon, C., Gisin, N., et al.: Phys. Rev. A 83, 022301 (2011)
Gao, F., Liu, B., Wen, Q.Y., et al.: Opt. Exp. 20, 17411 (2012)
Gao, F., Liu, B., Huang, W., Wen, Q.Y.: IEEE J. Sel. Top. Quantum 21, 6600111 (2015)
Liu, B., Gao, F., Huang, W., Wen, Q.Y.: Sci. China Phys. Mech. Astron. 58, 100301 (2015)
Wei, C.Y., Wang, T.Y., Gao, F.: Phys. Rev. A 93, 042318 (2016)
Wei, C.Y., Cai, X.Q., Liu, B., et al: IEEE Trans. Comput. 67, 2 (2018)
Acknowledgments
The authors would like to thank the anonymous reviewers and editors who have helped to improve the paper.
Supported by the National Natural Science Foundation of China under Grant Nos. 61572086 and 61402058, Sichuan innovation team of quantum security communication under Grant Nos. sc2016009 the Application Foundation Project of Sichuan Province of China (2017JY0168) and National Undergraduate Training Program for Innovation and Entrepreneurship under Grant Nos. 201710621027.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Gao, X., Zhang, SB., Chang, Y. et al. Cryptanalysis of the Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State. Int J Theor Phys 57, 1716–1722 (2018). https://doi.org/10.1007/s10773-018-3697-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-018-3697-3