Skip to main content
Log in

Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

We investigate the quantum sealed-bid auction protocol proposed by Zhao et al. (Opt Commun 283:1394, 2010). It uses M groups n-particle GHZ states to represent bids and a post-confirmation mechanism to guarantee the honesty of the quantum sealed-bid auction. However, in our opinion the protocol still does not complete the task of a sealed-bid auction fairly. It is shown that a large group of dishonest bidders can collude to obtain all the other one’s secret bids before the opening phase of the auction with a probability polynomially close to one. Moreover, a simple feasible improvement of the protocol is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Naseri M.: Secure quantum sealed-bid auction. Opt. Commun. 282, 1939 (2009)

    Article  ADS  Google Scholar 

  2. Yang Y.G., Naseri M., Wen Q.Y.: Improved secure quantum sealed-bid auction. Opt. Commun. 282, 4167 (2009)

    Article  ADS  Google Scholar 

  3. Qin S.J., Gao F., Wen Q.Y., Meng L.M., Zhu F.C.: Cryptanalysis and improvement of a secure quantum sealed-bid auction. Opt. Commun. 282, 4014 (2009)

    Article  ADS  Google Scholar 

  4. Zheng, Y.Q., Zhao, Z.W.: Comment on: “Secure quantum sealed-bid auction” [Opt. Comm. 282 (2009) 1939]. Opt. Commun. 282, 4182 (2009)

    Article  ADS  Google Scholar 

  5. Zhao Z.W., Naseri M., Zheng Y.Q.: Secure quantum sealed-bid auction with post-confirmation. Opt. Commun. 283, 3194 (2010)

    Article  ADS  Google Scholar 

  6. Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360, 748 (2007)

    Article  ADS  Google Scholar 

  7. Qin S.J., Wen Q.Y., Zhu F.C.: An external attack on the Brádler-Dušek protocol. J. Phys. B 40, 4661 (2007)

    Article  MATH  ADS  Google Scholar 

  8. Gao F., Lin S., Wen Q.Y., Zhu F.C.: A special eavesdropping on one-sender versus N-receiver QSDC protocol. Chin. Phys. Lett. 25, 1561 (2008)

    Article  ADS  Google Scholar 

  9. Gao F., Qin S.J., Wen Q.Y., Zhu F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. Opt. Commun. 283, 192 (2010)

    Article  ADS  Google Scholar 

  10. Qin S.J., Gao F., Guo F.Z., Wen Q.Y.: Comment on “Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair”. Phys. Rev. A 82, 036301 (2010)

    Article  MathSciNet  MATH  ADS  Google Scholar 

  11. Qin S.J., Gao F., Wen Q.Y., Meng L.M., Zhu F.C.: Cryptanalysis and improvement of a DSQC using four-particle entangled state and entanglement swapping. opt. Commun. 282, 4014 (2009)

    Article  ADS  Google Scholar 

  12. Deng F.G., Li X.H., Li C.Y., Zhou P., Liang Y.J., Zhou H.Y.: Multiparty quantum secret report. Chin. Phys. Lett. 23, 1676 (2006)

    Article  ADS  Google Scholar 

  13. Hughes R., Morgan G., Peterson C.: Quantum key distribution over a 48 km optical fibre network. J. Mod. Opt. 47(23), 533 (2000)

    MathSciNet  ADS  Google Scholar 

  14. Deng F.G., Long G.L: Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys. Rev. A 70(1), 012311 (2004)

    Article  ADS  Google Scholar 

  15. Li C.X., Zhou H.Y., Wang Y., Deng F.G.: Secure quantum key distribution network with bell states and local unitary operations. Chin. Phys. Lett. 22, 1049 (2005)

    Article  ADS  Google Scholar 

  16. Li C.Y., Li X.H., Deng F.G., Zhou P., Liang Y.J., Zhou H.Y.: Efficient quantum cryptography network without entanglement and quantum memory. Chin. Phys. Lett. 23, 2896 (2006)

    Article  ADS  Google Scholar 

  17. Helstrorm CW: Quantum Detection and Estimation Theory. Academic, New York (1976)

    Google Scholar 

  18. Gao F., Guo F.Z., Wen Q.Y., Zhu F.C.: Forcible-measurement attack on quantum secure direct communication protocol with cluster state. Chin. Phys. Lett. 25, 2766 (2008)

    Article  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li-Bao He.

Rights and permissions

Reprints and permissions

About this article

Cite this article

He, LB., Huang, LS., Yang, W. et al. Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation. Quantum Inf Process 11, 1359–1369 (2012). https://doi.org/10.1007/s11128-011-0275-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-011-0275-5

Keywords

Navigation