Physica Scripta,
Journal Year:
2024,
Volume and Issue:
99(12), P. 125114 - 125114
Published: Nov. 4, 2024
Abstract
Semi-quantum
private
comparison
allows
multiple
‘classical’
users
who
have
restricted
quantum
capabilities
to
compare
their
data
with
the
assistance
of
a
third
party.
In
this
work,
we
propose
novel
dynamic
semi-quantum
protocol
using
circular
transmission
mode
along
d
-dimensional
single-particle
states.
The
enables
size
relations
among
several
users,
while
party
can
only
determine
relative
sizes
without
accessing
users’
secret
information.
Security
evaluations
demonstrate
that
designed
withstands
typical
external
and
internal
attacks.
Compared
previous
works,
offers
improvements:
first,
it
supports
addition
or
removal
enhancing
applicability
in
practical
scenarios;
second,
eliminates
need
for
pre-shared
keys,
reducing
resource
consumption;
third,
avoids
use
high-dimensional
multi-particle
entangled
states,
thereby
feasibility
implementation.
Therefore,
proposed
may
more
potential
compared
protocols.
Mathematics,
Journal Year:
2024,
Volume and Issue:
12(22), P. 3541 - 3541
Published: Nov. 13, 2024
Quantum
private
comparison
(QPC)
is
a
crucial
component
of
quantum
multiparty
computing
(QMPC),
allowing
parties
to
compare
their
inputs
while
ensuring
that
no
sensitive
information
disclosed.
Many
existing
QPC
protocols
utilize
Bell
states
encounter
efficiency
challenges.
In
this
paper,
we
present
novel
and
efficient
protocol
capitalizes
on
the
distinct
characteristics
enable
secure
comparisons.
Our
method
transforms
into
unitary
operations
shared
states,
which
are
then
returned
third
party
obtain
results.
This
approach
enhances
decreases
reliance
complex
resources.
A
single
state
can
two
classical
bits,
achieving
qubit
100%.
We
illustrate
feasibility
through
simulation
IBM
Cloud
Platform.
The
security
analysis
confirms
our
resistant
both
eavesdropping
attacks
from
participants.
Modern Physics Letters A,
Journal Year:
2024,
Volume and Issue:
39(10)
Published: March 28, 2024
This
study
identifies
a
participant
attack
vulnerability
in
Li
et
al.’s
SQPC
protocol.
The
allows
malicious
participant,
Bob,
to
obtain
the
Alice’s
secret
information
by
intercepting
and
measuring
photons
sent
Alice,
later
decrypting
encrypted
comparison
result.
An
improved
protocol
is
proposed
address
this
problem.
key
enhancement
introducing
mutual
eavesdropping
check
requiring
third
party
participants
verify
they
same
photon
measurement
results.
enables
detecting
attacks
like
one
identified.
not
only
withstands
from
internal
but
also
achieves
quantum
efficiency
almost
equivalent
Thus,
presents
more
secure
without
compromising
efficiency.
Laser Physics Letters,
Journal Year:
2024,
Volume and Issue:
21(10), P. 105205 - 105205
Published: Sept. 4, 2024
Abstract
In
this
paper,
we
propose
a
novel
semiquantum
private
comparison
(SQPC)
protocol
based
on
Bell
states,
which
enables
one
quantum
user
and
classical
to
compare
the
equality
of
their
inputs
with
help
semi-honest
third
party
(TP).
TP
is
assumed
be
in
sense
that
she
may
take
all
possible
attacks
steal
users’
except
conspiring
anyone.
The
security
analysis
validates
our
can
resist
not
only
from
internal
participants
but
also
an
external
eavesdropper.
Besides,
asks
perform
basis
measurements
does
need
entanglement
swapping;
it
releases
conducting
having
memory.
Moreover,
advantage
over
previous
SQPC
protocols
states
qubit
efficiency.
Finally,
generalized
into
its
counterpart
collective-dephasing
noise
channel.
Laser Physics Letters,
Journal Year:
2023,
Volume and Issue:
20(10), P. 105202 - 105202
Published: Aug. 18, 2023
Abstract
Based
on
d
-dimensional
multiparticle
maximal
entangled
states,
a
novel
multi-party
private
comparison
protocol
under
semi-quantum
condition
is
proposed.
With
the
help
of
semi-honest
quantum
third
party,
$N$?>
N
classical
participants
can
determine
size
relationship
their
privacies
while
keeping
them
in
devised
protocol.
Compared
with
some
similar
protocols,
presented
performs
better
terms
security
and
qubit
efficiency.
In
addition,
effectiveness
correctness
our
are
verified
examples
proofs.
By
decoy
particles
pre-shared
keys,
defend
against
internal
external
attacks.