A Dynamic Semi-Quantum Private Comparison Protocol for Size Relations DOI
Chong‐Qiang Ye, Xiaoyu Chen, Jian Li

et al.

Physica Scripta, Journal Year: 2024, Volume and Issue: 99(12), P. 125114 - 125114

Published: Nov. 4, 2024

Abstract Semi-quantum private comparison allows multiple ‘classical’ users who have restricted quantum capabilities to compare their data with the assistance of a third party. In this work, we propose novel dynamic semi-quantum protocol using circular transmission mode along d -dimensional single-particle states. The enables size relations among several users, while party can only determine relative sizes without accessing users’ secret information. Security evaluations demonstrate that designed withstands typical external and internal attacks. Compared previous works, offers improvements: first, it supports addition or removal enhancing applicability in practical scenarios; second, eliminates need for pre-shared keys, reducing resource consumption; third, avoids use high-dimensional multi-particle entangled states, thereby feasibility implementation. Therefore, proposed may more potential compared protocols.

Language: Английский

Efficient Quantum Private Comparison with Unitary Operations DOI Creative Commons
Min Hou, Yue Wu

Mathematics, Journal Year: 2024, Volume and Issue: 12(22), P. 3541 - 3541

Published: Nov. 13, 2024

Quantum private comparison (QPC) is a crucial component of quantum multiparty computing (QMPC), allowing parties to compare their inputs while ensuring that no sensitive information disclosed. Many existing QPC protocols utilize Bell states encounter efficiency challenges. In this paper, we present novel and efficient protocol capitalizes on the distinct characteristics enable secure comparisons. Our method transforms into unitary operations shared states, which are then returned third party obtain results. This approach enhances decreases reliance complex resources. A single state can two classical bits, achieving qubit 100%. We illustrate feasibility through simulation IBM Cloud Platform. The security analysis confirms our resistant both eavesdropping attacks from participants.

Language: Английский

Citations

5

Circular mediated semi-quantum key distribution DOI
Chong‐Qiang Ye, Jian Li, Xiu‐Bo Chen

et al.

Quantum Information Processing, Journal Year: 2023, Volume and Issue: 22(4)

Published: April 8, 2023

Language: Английский

Citations

12

Efficient and secure semi-quantum private comparison protocol using three-particle GHZ-like states against participant attack DOI
Chun‐Wei Yang, Yu-Yun Huang, Jason Lin

et al.

Modern Physics Letters A, Journal Year: 2024, Volume and Issue: 39(10)

Published: March 28, 2024

This study identifies a participant attack vulnerability in Li et al.’s SQPC protocol. The allows malicious participant, Bob, to obtain the Alice’s secret information by intercepting and measuring photons sent Alice, later decrypting encrypted comparison result. An improved protocol is proposed address this problem. key enhancement introducing mutual eavesdropping check requiring third party participants verify they same photon measurement results. enables detecting attacks like one identified. not only withstands from internal but also achieves quantum efficiency almost equivalent Thus, presents more secure without compromising efficiency.

Language: Английский

Citations

4

Semiquantum private comparison via cavity QED DOI

Xin Xu,

Jiang-Yuan Lian,

Tian-Yu Ye

et al.

Quantum Information Processing, Journal Year: 2024, Volume and Issue: 23(5)

Published: May 7, 2024

Language: Английский

Citations

4

A quantum solution to blind millionaire problem with only single-particle states DOI Creative Commons

Kunchi Hou,

Huixin Sun,

Yao Yao

et al.

EPJ Quantum Technology, Journal Year: 2025, Volume and Issue: 12(1)

Published: Jan. 23, 2025

Language: Английский

Citations

0

Semiquantum private comparison based on Bell states without quantum measurements from the classical user DOI

Mao-Jie Geng,

Xia Li, Tian-Yu Ye

et al.

Laser Physics Letters, Journal Year: 2024, Volume and Issue: 21(10), P. 105205 - 105205

Published: Sept. 4, 2024

Abstract In this paper, we propose a novel semiquantum private comparison (SQPC) protocol based on Bell states, which enables one quantum user and classical to compare the equality of their inputs with help semi-honest third party (TP). TP is assumed be in sense that she may take all possible attacks steal users’ except conspiring anyone. The security analysis validates our can resist not only from internal participants but also an external eavesdropper. Besides, asks perform basis measurements does need entanglement swapping; it releases conducting having memory. Moreover, advantage over previous SQPC protocols states qubit efficiency. Finally, generalized into its counterpart collective-dephasing noise channel.

Language: Английский

Citations

3

A feasible semi-quantum private comparison based on entanglement swapping of Bell states DOI
Chong‐Qiang Ye, Jian Li, Xiu‐Bo Chen

et al.

Physica A Statistical Mechanics and its Applications, Journal Year: 2023, Volume and Issue: 625, P. 129023 - 129023

Published: July 10, 2023

Language: Английский

Citations

8

Multiparty semiquantum key agreement with d-level single-particle states DOI

Tian-Jie Xu,

Zhi-Gang Gan,

Tian-Yu Ye

et al.

Physica A Statistical Mechanics and its Applications, Journal Year: 2023, Volume and Issue: 625, P. 128991 - 128991

Published: June 22, 2023

Language: Английский

Citations

5

Multi-party private size comparison protocol under the semi-quantum condition DOI
Bing Wang,

Li-Hua Gong,

Sanqiu Liu

et al.

Laser Physics Letters, Journal Year: 2023, Volume and Issue: 20(10), P. 105202 - 105202

Published: Aug. 18, 2023

Abstract Based on d -dimensional multiparticle maximal entangled states, a novel multi-party private comparison protocol under semi-quantum condition is proposed. With the help of semi-honest quantum third party, $N$?> N classical participants can determine size relationship their privacies while keeping them in devised protocol. Compared with some similar protocols, presented performs better terms security and qubit efficiency. In addition, effectiveness correctness our are verified examples proofs. By decoy particles pre-shared keys, defend against internal external attacks.

Language: Английский

Citations

5

Secure Three-Party Quantum Summation based on W-class States DOI
Qi Cheng, Haozhen Situ, Qiong Huang

et al.

International Journal of Theoretical Physics, Journal Year: 2024, Volume and Issue: 63(4)

Published: April 23, 2024

Language: Английский

Citations

1