×

Secure quantum private comparison of equality based on asymmetric \(W\) state. (English) Zbl 1300.94081

Summary: Recently, W. Liu et al. [Opt. Commun. 284, No. 12, 3160–3163 (2011), doi:10.1016/j.optcom.2011.02.017] proposed a protocol for quantum private comparison of equality (QPCE) based on symmetric \(W\) state. However, Y.-B. Li et al. [Eur. Phys. J. D 66, No. 4, 110 (2012), doi:10.1140/epjd/e2012-30065-9] pointed out that there is a flaw of information leak, and they proposed a new protocol based on EPR pairs. While examining these two protocols, we find that there exists a same flaw: the third party (TP) can know the comparison result. In this paper, through introducing and constructing a special class of asymmetric \(W\) state, a secure QPCE protocol based on this asymmetric \(W\) state is presented. Analysis shows the present protocol can not only effectively avoid the information leak found by Li et al., but also ensure TP would not get any information about the comparison result.

MSC:

94A60 Cryptography
81P94 Quantum cryptography (quantum-theoretic aspects)
PDFBibTeX XMLCite
Full Text: DOI arXiv

References:

[1] Liu, W., Wang, Y.B., Jiang, Z.T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284(12), 3160-3163 (2011). doi:10.1016/j.optcom.2011.02.017 · doi:10.1016/j.optcom.2011.02.017
[2] Li, Y.B., Wen, Q.Y., Gao, F., Jia, H.Y., Sun, Y.: Information leak in Liu et al.’s quantum private comparison and a new protocol. Eur. Phys. J. D 66(4) (2012). doi:10.1140/epjd/e2012-30065-9 · doi:10.1140/epjd/e2012-30065-9
[3] Yao, A. C., Protocols for secure computations, 3-5 Nov. 1982
[4] Boudot, F., Schoenmakers, B., Traore, J.: A fair and efficient solution to the socialist millionaires’ problem. Discrete Appl. Math. 111(1-2), 23-36 (2001). doi:10.1016/s0166-218x(00)00342-5 · Zbl 0978.68062 · doi:10.1016/s0166-218x(00)00342-5
[5] Li, R.H., Wu, C.K., Zhang, Y.Q.: A fair and efficient protocol for the millionaires’ problem. Chin. J. Electron. 18(2), 249-254 (2009)
[6] Luo, Y.L., Huang, L.S., Yang, W., Xu, W.J.: An efficient protocol for private comparison problem. Chin. J. Electron. 18(2), 205-209 (2009)
[7] Li, S.D., Wang, D.S., Dai, Y.Q.: Symmetric cryptographic protocols for extended millionaires’ problem. Sci. China Ser. F-Inf. Sci. 52(6), 974-982 (2009). doi:10.1007/s11432-009-0109-6 · Zbl 1181.94099 · doi:10.1007/s11432-009-0109-6
[8] Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A, Math. Theor. 42(5) (2009). doi:10.1088/1751-8113/42/5/055305 · Zbl 1156.81364 · doi:10.1088/1751-8113/42/5/055305
[9] Yang, C.W., Kao, S.H., Hwang, T.: Comment on “Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise”. Quantum Inf. Process. 12(8), 2871-2875 (2013). doi:10.1007/s11128-013-0569-x · Zbl 1283.81055 · doi:10.1007/s11128-013-0569-x
[10] Liu, B., Gao, F., Jia, H.Y., Huang, W., Zhang, W.W., Wen, Q.Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12(2), 887-897 (2013). doi:10.1007/s11128-012-0439-y · Zbl 1264.81142 · doi:10.1007/s11128-012-0439-y
[11] Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283(7), 1561-1565 (2010). doi:10.1016/j.optcom.2009.11.085 · doi:10.1016/j.optcom.2009.11.085
[12] Liu, W., Wang, Y.B.: Quantum private comparison based on GHZ entangled states. Int. J. Theor. Phys. 51(11), 3596-3604 (2012). doi:10.1007/s10773-012-1246-z · Zbl 1262.81041 · doi:10.1007/s10773-012-1246-z
[13] Liu, W.J., Liu, C., Liu, Z.H., Liu, J.F., Geng, H.T.: Same initial states attack in Yang et al.’s quantum private comparison protocol and the improvement. Int. J. Theor. Phys. (2013). doi:10.1007/s10773-013-1807-9 · Zbl 1284.81090 · doi:10.1007/s10773-013-1807-9
[14] Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11(2), 373-384 (2012). doi:10.1007/s11128-011-0251-0 · Zbl 1239.81037 · doi:10.1007/s11128-011-0251-0
[15] Chang, Y.J., Tsai, C.W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 12(2), 1077-1088 (2013). doi:10.1007/s11128-012-0454-z · Zbl 1264.81070 · doi:10.1007/s11128-012-0454-z
[16] Jia, H.Y., Wen, Q.Y., Li, Y.B., Gao, F.: Quantum private comparison using genuine four-particle entangled states. Int. J. Theor. Phys. 51(4), 1187-1194 (2012). doi:10.1007/s10773-011-0994-5 · Zbl 1248.81020 · doi:10.1007/s10773-011-0994-5
[17] Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z.: A protocol for the quantum private comparison of equality with χ-type state. Int. J. Theor. Phys. 51(1), 69-77 (2012). doi:10.1007/s10773-011-0878-8 · Zbl 1246.81047 · doi:10.1007/s10773-011-0878-8
[18] Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z., Cui, W.: New quantum private comparison protocol using χ-type state. Int. J. Theor. Phys. 51(6), 1953-1960 (2012). doi:10.1007/s10773-011-1073-7 · Zbl 1251.81033 · doi:10.1007/s10773-011-1073-7
[19] Sun, Z.W., Long, D.Y.: Quantum private comparison protocol based on cluster states. Int. J. Theor. Phys. 52(1), 212-218 (2013). doi:10.1007/s10773-012-1321-5 · Zbl 1264.81153 · doi:10.1007/s10773-012-1321-5
[20] Agrawal, P., Pati, A.: Perfect teleportation and superdense coding with W states. Phys. Rev. A 74(6) (2006). doi:10.1103/PhysRevA.74.062320 · doi:10.1103/PhysRevA.74.062320
[21] Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2010) · Zbl 1288.81001 · doi:10.1017/CBO9780511976667
[22] Helstrom, C.W.: Quantum Detection and Estimation Theory vol. 84. Academic Press, New York (1976) · Zbl 1332.81011
[23] Fuchs, C.A.: Information gain vs. state disturbance in quantum theory. Fortschr. Phys. 46(4-5), 535-565 (1998) · doi:10.1002/(SICI)1521-3978(199806)46:4/5<535::AID-PROP535>3.0.CO;2-0
[24] Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441-444 (2000). doi:10.1103/PhysRevLett.85.441 · doi:10.1103/PhysRevLett.85.441
[25] Lo, H.K.: A simple proof of the unconditional security of quantum key distribution. J. Phys. A, Math. Gen. 34(35), 6957-6967 (2001). doi:10.1088/0305-4470/34/35/321 · Zbl 0983.94514 · doi:10.1088/0305-4470/34/35/321
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.