Advertisement

International Journal of Theoretical Physics

, Volume 57, Issue 7, pp 2034–2040 | Cite as

Intercept-Resend-Measure Attack Towards Quantum Private Comparison Protocol Using Genuine Four-Particle Entangled States and its Improvement

  • Hong-Ming Pan
Article

Abstract

Recently, Jia et al. proposed the quantum private comparison protocol with the genuine four-particle entangled states (Jia et al., Int. J. Theor. Phys. 51(4), 1187–1194 (2012)). Jia et al. claimed that in this protocol, TP cannot obtain Alice and Bob’s secrets and only knows their comparison result. However, in this paper, we demonstrate that if TP is a genuine semi-honest third party, he can totally obtain Alice and Bob’s secrets by launching a particular intercept-resend-measure attack. After suggesting the intercept-resend-measure attack strategy from TP first, we put forward one corresponding improvement to prevent this attack.

Keywords

Quantum private comparison Genuine four-particle entangled states Third party Intercept-resend-measure attack 

Notes

Compliance with Ethical Standards

Conflict of interests

The author declares that he has no conflict of interest.

References

  1. 1.
    Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A. Math. Theor. 42, 055305 (2009)ADSMathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Yang, Y.G., Gao, W.F., Wen, Q.Y.: Secure quantum private comparison. Phys. Scr. 80, 065002 (2009)ADSCrossRefzbMATHGoogle Scholar
  3. 3.
    Yang, Y.G., Xia, J., Jia, X., Shi, L., Zhang, H.: New quantum private comparison protocol without entanglement. Int. J. Quantum. Inf. 10, 1250065 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Ye, T.Y.: Quantum private comparison via cavity QED. Commun. Theor. Phys. 67(2), 147–156 (2017)ADSCrossRefGoogle Scholar
  5. 5.
    Liu, W., Wang, Y.B., Cui, W.: Quantum private comparison protocol based on Bell entangled states. Commun. Theor. Phys. 57, 583–588 (2012)ADSMathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum. Inf. Process. 11, 373–384 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Wang, C., Xu, G., Yang, Y.X.: Cryptanalysis and improvements for the quantum private comparison protocol using EPR pairs. Int. J. Quantum. Inf. 11, 1350039 (2013)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Yang, Y.G., Xia, J., Jia, X., Zhang, H.: Comment on quantum private comparison protocols with a semi-honest third party. Quantum. Inf. Process. 12, 877–885 (2013)ADSMathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Zhang, W.W., Zhang, K.J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum. Inf. Process. 12, 1981–1990 (2013)ADSMathSciNetCrossRefGoogle Scholar
  10. 10.
    Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561 (2010)ADSCrossRefGoogle Scholar
  11. 11.
    Lin, J., Tseng, H.Y., Hwang, T.: Intercept-resend attacks on Chen et al.’s quantum private comparison protocol and the improvements. Opt. Commun. 284, 2412–2414 (2011)ADSCrossRefGoogle Scholar
  12. 12.
    Liu, W., Wang, Y.B.: Quantum private comparison based on GHZ entangled states. Int. J. Theor. Phys. 51, 3596–3604 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Liu, W., Wang, Y.B., Jiang, Z.T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284, 3160–3163 (2011)ADSCrossRefGoogle Scholar
  14. 14.
    Zhang, W.W., Li, D., Li, Y.B.: Quantum private comparison protocol with W States. Int. J. Theor. Phys. 53(5), 1723–1729 (2014)CrossRefGoogle Scholar
  15. 15.
    Xu, G.A., Chen, X.B., Wei, Z.H., Li, M.J., Yang, Y.X.: An efficient protocol for the quantum private comparison of equality with a four-qubit cluster state. Int. J. Quantum. Inf. 10, 1250045 (2012)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Sun, Z.W., Long, D.Y.: Quantum private comparison protocol based on cluster states. Int. J. Theor. Phys. 52, 212–218 (2013)MathSciNetCrossRefzbMATHGoogle Scholar
  17. 17.
    Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z.: A protocol for the quantum private comparison of equality with χ-type state. Int. J. Theor. Phys. 51, 69–77 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  18. 18.
    Jia, H.Y., Wen, Q.Y., Li, Y.B., Cao, F.: Quantum private comparison using genuine four-particle entangled states. Int. J. Theor. Phys. 51(4), 1187–1194 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  19. 19.
    Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z., Cui, W.: New quantum private comparison protocol using χ-type state. Int. J. Theor. Phys. 51, 1953–1960 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  20. 20.
    Ye, T.Y., Ji, Z.X.: Two-party quantum private comparison with five-qubit entangled states. Int. J. Theor. Phys. 56(5), 1517–1529 (2017)MathSciNetCrossRefzbMATHGoogle Scholar
  21. 21.
    Ji, Z.X., Ye, T.Y.: Quantum private comparison of equal information based on highly entangled six-qubit genuine state. Commun. Theor. Phys. 65(6), 711–715 (2016)ADSMathSciNetCrossRefzbMATHGoogle Scholar
  22. 22.
    Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56(2), 1154–1162 (1997)ADSCrossRefGoogle Scholar
  23. 23.
    Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. Proc. IEEE Int. Conf. Comput. Syst. Signal Process. 175–179 (1984)Google Scholar
  24. 24.
    Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661–663 (1991)ADSMathSciNetCrossRefzbMATHGoogle Scholar
  25. 25.
    Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell theorem. Phys. Rev. Lett. 68, 557–559 (1992)ADSMathSciNetCrossRefzbMATHGoogle Scholar
  26. 26.
    Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)ADSCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Hangzhou College of CommerceZhejiang Gongshang UniversityHangzhouPeople’s Republic of China

Personalised recommendations