Intercept-Resend-Measure Attack Towards Quantum Private Comparison Protocol Using Genuine Four-Particle Entangled States and its Improvement

Article
  • 9 Downloads

Abstract

Recently, Jia et al. proposed the quantum private comparison protocol with the genuine four-particle entangled states (Jia et al., Int. J. Theor. Phys. 51(4), 1187–1194 (2012)). Jia et al. claimed that in this protocol, TP cannot obtain Alice and Bob’s secrets and only knows their comparison result. However, in this paper, we demonstrate that if TP is a genuine semi-honest third party, he can totally obtain Alice and Bob’s secrets by launching a particular intercept-resend-measure attack. After suggesting the intercept-resend-measure attack strategy from TP first, we put forward one corresponding improvement to prevent this attack.

Keywords

Quantum private comparison Genuine four-particle entangled states Third party Intercept-resend-measure attack 

Notes

Compliance with Ethical Standards

Conflict of interests

The author declares that he has no conflict of interest.

References

  1. 1.
    Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A. Math. Theor. 42, 055305 (2009)ADSMathSciNetCrossRefMATHGoogle Scholar
  2. 2.
    Yang, Y.G., Gao, W.F., Wen, Q.Y.: Secure quantum private comparison. Phys. Scr. 80, 065002 (2009)ADSCrossRefMATHGoogle Scholar
  3. 3.
    Yang, Y.G., Xia, J., Jia, X., Shi, L., Zhang, H.: New quantum private comparison protocol without entanglement. Int. J. Quantum. Inf. 10, 1250065 (2012)MathSciNetCrossRefMATHGoogle Scholar
  4. 4.
    Ye, T.Y.: Quantum private comparison via cavity QED. Commun. Theor. Phys. 67(2), 147–156 (2017)ADSCrossRefGoogle Scholar
  5. 5.
    Liu, W., Wang, Y.B., Cui, W.: Quantum private comparison protocol based on Bell entangled states. Commun. Theor. Phys. 57, 583–588 (2012)ADSMathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum. Inf. Process. 11, 373–384 (2012)MathSciNetCrossRefMATHGoogle Scholar
  7. 7.
    Wang, C., Xu, G., Yang, Y.X.: Cryptanalysis and improvements for the quantum private comparison protocol using EPR pairs. Int. J. Quantum. Inf. 11, 1350039 (2013)MathSciNetCrossRefMATHGoogle Scholar
  8. 8.
    Yang, Y.G., Xia, J., Jia, X., Zhang, H.: Comment on quantum private comparison protocols with a semi-honest third party. Quantum. Inf. Process. 12, 877–885 (2013)ADSMathSciNetCrossRefMATHGoogle Scholar
  9. 9.
    Zhang, W.W., Zhang, K.J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum. Inf. Process. 12, 1981–1990 (2013)ADSMathSciNetCrossRefGoogle Scholar
  10. 10.
    Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561 (2010)ADSCrossRefGoogle Scholar
  11. 11.
    Lin, J., Tseng, H.Y., Hwang, T.: Intercept-resend attacks on Chen et al.’s quantum private comparison protocol and the improvements. Opt. Commun. 284, 2412–2414 (2011)ADSCrossRefGoogle Scholar
  12. 12.
    Liu, W., Wang, Y.B.: Quantum private comparison based on GHZ entangled states. Int. J. Theor. Phys. 51, 3596–3604 (2012)MathSciNetCrossRefMATHGoogle Scholar
  13. 13.
    Liu, W., Wang, Y.B., Jiang, Z.T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284, 3160–3163 (2011)ADSCrossRefGoogle Scholar
  14. 14.
    Zhang, W.W., Li, D., Li, Y.B.: Quantum private comparison protocol with W States. Int. J. Theor. Phys. 53(5), 1723–1729 (2014)CrossRefGoogle Scholar
  15. 15.
    Xu, G.A., Chen, X.B., Wei, Z.H., Li, M.J., Yang, Y.X.: An efficient protocol for the quantum private comparison of equality with a four-qubit cluster state. Int. J. Quantum. Inf. 10, 1250045 (2012)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Sun, Z.W., Long, D.Y.: Quantum private comparison protocol based on cluster states. Int. J. Theor. Phys. 52, 212–218 (2013)MathSciNetCrossRefMATHGoogle Scholar
  17. 17.
    Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z.: A protocol for the quantum private comparison of equality with χ-type state. Int. J. Theor. Phys. 51, 69–77 (2012)MathSciNetCrossRefMATHGoogle Scholar
  18. 18.
    Jia, H.Y., Wen, Q.Y., Li, Y.B., Cao, F.: Quantum private comparison using genuine four-particle entangled states. Int. J. Theor. Phys. 51(4), 1187–1194 (2012)MathSciNetCrossRefMATHGoogle Scholar
  19. 19.
    Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z., Cui, W.: New quantum private comparison protocol using χ-type state. Int. J. Theor. Phys. 51, 1953–1960 (2012)MathSciNetCrossRefMATHGoogle Scholar
  20. 20.
    Ye, T.Y., Ji, Z.X.: Two-party quantum private comparison with five-qubit entangled states. Int. J. Theor. Phys. 56(5), 1517–1529 (2017)MathSciNetCrossRefMATHGoogle Scholar
  21. 21.
    Ji, Z.X., Ye, T.Y.: Quantum private comparison of equal information based on highly entangled six-qubit genuine state. Commun. Theor. Phys. 65(6), 711–715 (2016)ADSMathSciNetCrossRefMATHGoogle Scholar
  22. 22.
    Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56(2), 1154–1162 (1997)ADSCrossRefGoogle Scholar
  23. 23.
    Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. Proc. IEEE Int. Conf. Comput. Syst. Signal Process. 175–179 (1984)Google Scholar
  24. 24.
    Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661–663 (1991)ADSMathSciNetCrossRefMATHGoogle Scholar
  25. 25.
    Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell theorem. Phys. Rev. Lett. 68, 557–559 (1992)ADSMathSciNetCrossRefMATHGoogle Scholar
  26. 26.
    Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)ADSCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Hangzhou College of CommerceZhejiang Gongshang UniversityHangzhouPeople’s Republic of China

Personalised recommendations