Physica Scripta,
Journal Year:
2024,
Volume and Issue:
99(12), P. 125114 - 125114
Published: Nov. 4, 2024
Abstract
Semi-quantum
private
comparison
allows
multiple
‘classical’
users
who
have
restricted
quantum
capabilities
to
compare
their
data
with
the
assistance
of
a
third
party.
In
this
work,
we
propose
novel
dynamic
semi-quantum
protocol
using
circular
transmission
mode
along
d
-dimensional
single-particle
states.
The
enables
size
relations
among
several
users,
while
party
can
only
determine
relative
sizes
without
accessing
users’
secret
information.
Security
evaluations
demonstrate
that
designed
withstands
typical
external
and
internal
attacks.
Compared
previous
works,
offers
improvements:
first,
it
supports
addition
or
removal
enhancing
applicability
in
practical
scenarios;
second,
eliminates
need
for
pre-shared
keys,
reducing
resource
consumption;
third,
avoids
use
high-dimensional
multi-particle
entangled
states,
thereby
feasibility
implementation.
Therefore,
proposed
may
more
potential
compared
protocols.
Laser Physics Letters,
Journal Year:
2024,
Volume and Issue:
21(5), P. 055209 - 055209
Published: April 10, 2024
Abstract
Based
on
Bell
states,
a
new
semi-quantum
private
comparison
protocol
is
proposed
that
enables
two
classical
users
to
securely
compare
the
equality
of
their
information
with
aid
semi-honest
third
party.
Different
from
existing
protocols,
participants
in
presented
do
not
need
measure
and
prepare
any
quantum
state,
which
only
reduces
consumption
devices,
but
also
greatly
improves
feasibility
protocol.
Performing
different
unitary
operations
received
particles,
can
secret
information.
Besides,
devised
has
higher
qubit
efficiency
than
other
similar
counterparts,
since
two-bit
privacy
each
time
one
qubit.
Meanwhile,
after
completing
process,
all
states
could
be
reused
they
still
retain
corresponding
entanglement
property,
facilitates
recycle
resources.
Security
analyses
indicate
designed
scheme
secure
against
external
attack
internal
attack.
Moreover,
involved
our
are
simulated
IBM
Quantum
Experience
demonstrate
effectiveness
security
scheme.
Axioms,
Journal Year:
2025,
Volume and Issue:
14(2), P. 120 - 120
Published: Feb. 7, 2025
In
this
paper,
we
introduce
a
quantum
private
set
intersection
(QPSI)
scheme
that
leverages
Bell
states
as
information
carriers.
Our
approach
involves
encoding
sets
into
using
unitary
operations,
enabling
the
computation
of
between
two
from
different
users
while
keeping
their
individual
undisclosed
to
anyone
except
for
result.
our
scheme,
semi-honest
third
party
(TP)
distributes
first
and
second
qubits
users.
Each
user
encodes
by
applying
operations
on
received
according
predefined
rules.
The
modified
sequence
is
encrypted
then
sent
back
TP,
who
can
compute
without
learning
any
about
users’
inputs.
simulation
outcomes
IBM
platform
substantiate
viability
scheme.
We
analyze
security
privacy
aspects
sets,
showing
both
external
attacks
internal
threats
do
not
compromise
Furthermore,
exhibits
better
practicality
utilizing
easily
implementable
rather
than
relying
multiple
encoded
calculations.
Entropy,
Journal Year:
2024,
Volume and Issue:
26(5), P. 413 - 413
Published: May 10, 2024
Quantum
private
comparison
(QPC)
is
a
fundamental
cryptographic
protocol
that
allows
two
parties
to
compare
the
equality
of
their
inputs
without
revealing
any
information
about
those
each
other.
In
recent
years,
QPC
protocols
utilizing
various
quantum
resources
have
been
proposed.
However,
these
lower
utilization
and
qubit
efficiency.
To
address
this
issue,
we
propose
an
efficient
based
on
GHZ
states,
which
leverages
unique
properties
states
rotation
operations
achieve
secure
comparison.
The
secret
encoded
in
angles
performed
received
sequence
transmitted
along
circular
mode.
This
results
multiplexing
enhances
resources.
Our
does
not
require
key
distribution
(QKD)
for
sharing
ensure
security
inputs,
resulting
no
consumption
sharing.
One
state
can
be
compared
three
bits
classical
comparison,
leading
efficiency
reaching
100%.
Compared
with
existing
protocol,
our
key.
It
also
demonstrates
enhanced
performance
Frontiers in Physics,
Journal Year:
2024,
Volume and Issue:
12
Published: June 19, 2024
The
socialist
millionaire
problem
aims
to
compare
the
equality
of
two
inputs
from
users
while
keeping
their
undisclosed
anyone.
Quantum
private
comparison
(QPC),
whose
security
relies
on
principles
quantum
mechanics,
can
solve
this
and
achieve
information-theoretic
information
processing.
current
QPC
protocols
mainly
utilize
bitwise
XOR
operation
implement
comparison,
leading
insufficient
security.
In
paper,
we
propose
a
rotation
operation-based
protocol
problem,
which
utilizes
Bell
states
as
resources
operations
for
classical
calculations.
proposed
only
easy-to-implement
technologies
such
states,
operations,
Bell-basis
measurements,
making
it
more
practical.
analysis
demonstrates
that
our
meet
both
correctness
requirements.
Compared
with
existing
protocols,
has
improved
performance
in
terms
practicability
Advanced Quantum Technologies,
Journal Year:
2024,
Volume and Issue:
unknown
Published: Dec. 18, 2024
Abstract
A
new
multi‐party
semi‐quantum
private
comparison
protocol
of
size
relation
is
designed
based
on
d
‐level
GHZ
states.
Multiple
classical
participants
could
compare
their
privacies
while
keeping
them
secure
under
an
ideal
environment.
Compared
with
some
similar
protocols,
the
in
do
not
need
to
prepare
and
measure
quantum
Besides,
qubit
efficiency
reaches
33.33%.
It
demonstrated
that
output
result
proposed
correct.
Finally,
security
analysis
manifests
behaves
well
withstanding
intercept‐resend
attack,
measure‐resend
entanglement
Trojan
horse
so
on.
Entropy,
Journal Year:
2024,
Volume and Issue:
26(6), P. 512 - 512
Published: June 14, 2024
Quantum
private
comparison
(QPC)
enables
two
users
to
securely
conduct
comparisons
in
a
network
characterized
by
mutual
distrust
while
guaranteeing
the
confidentiality
of
their
inputs.
Most
previous
QPC
protocols
were
primarily
used
determine
equality
information
between
users,
which
constrained
scalability.
In
this
paper,
we
propose
protocol
that
leverages
entanglement
correlation
particles
four-particle
cluster
state.
This
can
compare
groups
within
one
execution,
with
each
group
consisting
users.
A
semi-honest
third
party
(TP),
who
will
not
deviate
from
execution
or
conspire
any
participant,
is
involved
assisting
achieve
comparisons.
Users
encode
inputs
into
specific
angles
rotational
operations
performed
on
received
quantum
sequence,
then
sent
back
TP.
Security
analysis
shows
both
external
attacks
and
insider
threats
are
ineffective
at
stealing
data.
Finally,
our
some
previously
proposed
protocols.