Advertisement

Information leak in Liu et al.’s quantum private comparison and a new protocol

  • Y. B. LiEmail author
  • Q. Y. Wen
  • F. Gao
  • H. Y. Jia
  • Y. Sun
Regular Article

Abstract

In a recent paper [W. Liu, Y.B. Wang, Z.T. Jiang, Opt. Commun. 284, 3160 (2011)], a quantum private comparison (QPC) protocol based on W states was presented. Compared to the previous QPCs, the protocol is promising for that it can prevent the comparison result from revealing to the third party. However, this study point out that a flaw of information leak is existent in the protocol. And a new QPC which can avoid the flaw and has higher efficiency is proposed in this paper.

Keywords

Quantum Information 

References

  1. 1.
    C.H. Bennett, G. Brassard, Quantum cryptography: public-key distribution and coin tossing, in Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India (IEE Press, New York, 1984), p. 175Google Scholar
  2. 2.
    C.H. Bennett, Phys. Rev. Lett. 68, 3121 (1992)MathSciNetADSzbMATHCrossRefGoogle Scholar
  3. 3.
    X.B. Wang, Phys. Rev. Lett. 92, 077902 (2004)ADSCrossRefGoogle Scholar
  4. 4.
    Q. Zhang, J. Yin, T.Y. Chen, S. Lu, J. Zhang, X.Q. Li, T. Yang, X.B. Wang, J.W. Pan, Phys. Rev. A 73, 020301 (2006)ADSCrossRefGoogle Scholar
  5. 5.
    Y. Sun, Q.Y. Wen, F. Gao, F.C. Zhu, Phys. Rev. A 80, 032321 (2009)ADSCrossRefGoogle Scholar
  6. 6.
    Y.G. Tan, Q.Y. Cai, Eur. Phys. J. D 56, 449 (2010)ADSCrossRefGoogle Scholar
  7. 7.
    T. Hwang, C.C. Hwang, C.W. Tsai, Eur. Phys. J. D 61, 785 (2011)ADSCrossRefGoogle Scholar
  8. 8.
    A. Karlsson, M. Koashi, N. Imoto, Phys. Rev. A 59, 162 (1999)ADSCrossRefGoogle Scholar
  9. 9.
    M. Hillery, V. Buzěk, A. Berthiaume, Phys. Rev. A 59, 1829 (1999)MathSciNetADSCrossRefGoogle Scholar
  10. 10.
    G.P. Guo, G.C. Guo, Phys. Lett. A 310, 247 (2003)MathSciNetADSzbMATHCrossRefGoogle Scholar
  11. 11.
    S.J. Qin, F. Gao, Q.Y. Wen, F.C. Zhu, Phys. Rev. A 76, 062324 (2007)ADSCrossRefGoogle Scholar
  12. 12.
    L.F. Han, Y.M. Liu, H. Yuan, Z.J. Zhang, Chin. Phys. Lett. 24, 3312 (2007)ADSCrossRefGoogle Scholar
  13. 13.
    T.Y. Wang, Q.Y. Wen, F. Gao, S. Lin, F.C. Zhu, Phys. Lett. A 65, 373 (2008)Google Scholar
  14. 14.
    F.Z. Guo, S.J. Qin, F. Gao, S. Lin, Q.Y. Wen, F.C. Zhu, Eur. Phys. J. D 56, 445 (2010)ADSCrossRefGoogle Scholar
  15. 15.
    Y. Xia, J. Song, P.M. Lu, H.S. Song, Eur. Phys. J. D 61, 493 (2011)ADSCrossRefGoogle Scholar
  16. 16.
    K. Bostroem, T. Felbinger, Phys. Rev. Lett. 89, 187902 (2002)ADSCrossRefGoogle Scholar
  17. 17.
    F.G. Deng, G.L. Long, X.S. Liu, Phys. Rev. A 68, 042317 (2003)ADSCrossRefGoogle Scholar
  18. 18.
    S. Lin, Q.Y. Wen, F. Gao, F.C. Zhu, Phys. Rev. A 78, 064304 (2008)ADSCrossRefGoogle Scholar
  19. 19.
    F. Gao, S.J. Qin, Q.Y. Wen, F.C. Zhu, Opt. Commun. 283, 192 (2010)ADSCrossRefGoogle Scholar
  20. 20.
    C.W. Tsai, C.R. Hsieh, T. Hwang, Eur. Phys. J. D 61, 779 (2011)ADSCrossRefGoogle Scholar
  21. 21.
    C.H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, W.K. Wootters, Phys. Rev. Lett. 70, 1895 (1993)MathSciNetADSzbMATHCrossRefGoogle Scholar
  22. 22.
    D. Bouwmeester, J.W. Pan, K. Mattle, M. Eibl, H. Weinfurter, A. Zeilinger, Nature 390, 575 (1997)ADSCrossRefGoogle Scholar
  23. 23.
    Z.J. Zhang, Y.M. Liu, Z.X. Man, Commun. Theor. Phys. 44, 847 (2005)ADSCrossRefGoogle Scholar
  24. 24.
    X.B. Chen, Q.Y. Wen, F.C. Zhu, Int. J. Quantum Inf. 5, 717 (2007)zbMATHCrossRefGoogle Scholar
  25. 25.
    I. Chakrabarty, Eur. Phys. J. D 57, 265 (2010)ADSCrossRefGoogle Scholar
  26. 26.
    J. Anders, D.E. Browne, Phys. Rev. Lett. 102, 050502 (2009)MathSciNetADSCrossRefGoogle Scholar
  27. 27.
    A.C. Yao, Protocols for Secure Computation, in Proc. of the 23rd Annual IEEE Symposium on Foundations of Computer Science (IEEE Computer Society, Washington, DC, 1982), p. 160Google Scholar
  28. 28.
    O. Goldreich, S. Micali, A. Wigderson, How to play a mental game, in Annual ACM Symposium on Theory of Computing (ACM, New York, 1987), p. 218Google Scholar
  29. 29.
    Y. Li, Q. Wen, S. Qin, Phys. Rev. A 84, 016301 (2011)ADSCrossRefGoogle Scholar
  30. 30.
    K. Loukopoulos, D.E. Browne, Phys. Rev. A 81, 062336 (2010)ADSCrossRefGoogle Scholar
  31. 31.
    Y.G. Yang, Z. Zhou, Y.W. Teng, Q.Y. Wen, Eur. Phys. J. D 61, 773 (2011)ADSCrossRefGoogle Scholar
  32. 32.
    D. Mayers, Phys. Rev. Lett. 78, 3414 (1997)ADSCrossRefGoogle Scholar
  33. 33.
    H.K. Lo, H.F. Chau, Phys. Rev. Lett. 78, 3410 (1997)ADSCrossRefGoogle Scholar
  34. 34.
    Y.G. Yang, Q.Y. Wen, J. Phys. A Math. Theor. 42, 055305 (2009)MathSciNetADSCrossRefGoogle Scholar
  35. 35.
    Y.G. Yang, W.F. Cao, Q.Y. Wen, Phys. Scr. 80, 065002 (2009)ADSCrossRefGoogle Scholar
  36. 36.
    X.B. Chen, G. Xu, X.X. Niu, Q.Y. Wen, Y.X. Yang, Opt. Commun. 283, 1561 (2010)ADSCrossRefGoogle Scholar
  37. 37.
    J. Lin, H.Y. Tseng, T. Hwang, Opt. Commun. 284, 2412 (2011)ADSCrossRefGoogle Scholar
  38. 38.
    H.Y. Tseng, J. Lin, T. Hwang, Quantum Inf. Process. 11, 373 (2012)CrossRefGoogle Scholar
  39. 39.
    W. Liu, Y.B. Wang, Z.T. Jiang, Opt. Commun. 284, 3160 (2011)ADSCrossRefGoogle Scholar
  40. 40.
    C.W. Helstrom, Quantum detection and estimation theory (Academic Press, New York, 1976)Google Scholar
  41. 41.
    C.A. Fuchs, Fortschr. Phys. 46, 535 (1998)MathSciNetCrossRefGoogle Scholar

Copyright information

© EDP Sciences, SIF, Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Y. B. Li
    • 1
    • 2
    • 3
    Email author
  • Q. Y. Wen
    • 1
  • F. Gao
    • 1
  • H. Y. Jia
    • 1
  • Y. Sun
    • 3
  1. 1.State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijingP.R. China
  2. 2.State Key Laboratory of Integrated Services NetworkXidian UniversityXi’anP.R. China
  3. 3.Beijing Electronic Science and Technology InstituteBeijingP.R. China

Personalised recommendations