Quantum Private Comparison Based on Four-Particle Cluster State DOI Creative Commons
Min Hou, Yue Wu

Applied Sciences, Journal Year: 2024, Volume and Issue: 14(22), P. 10759 - 10759

Published: Nov. 20, 2024

A quantum private comparison (QPC) protocol enables two parties to securely compare their data without disclosing the actual values one another, utilizing mechanics maintain confidentiality. Many current QPC protocols mainly concentrate on comparing equality of information between users during a single execution, which restricts scalability. To overcome this limitation, we present an efficient aimed at evaluating groups in execution. This is achieved by leveraging entanglement correlations each particle four-particle cluster state. In our approach, encode using bit flip or phase shift operators sequence they receive, then sent back semi-trusted party determines whether secrets are equal and communicates results users. By employing method facilitating distributed transmission sequence, achieves qubit efficiency 50%. Security analyses reveal that neither external attacks nor insider threats can successfully compromise confidentiality data.

Language: Английский

Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption DOI Creative Commons
Min Hou, Yue Wu

Applied Sciences, Journal Year: 2025, Volume and Issue: 15(2), P. 722 - 722

Published: Jan. 13, 2025

In this paper, we introduce a two-party quantum private comparison (QPC) protocol that employs single photons as resources and utilizes rotational encryption to safeguard the privacy of inputs. This enables two parties compare their data without disclosing any information beyond outcome comparison. The participants’ are encoded photons, which encrypted using method. These then transmitted semi-honest third party (TP), who conducts single-particle measurements determine if users’ equal subsequently announces results participants. By harnessing principles mechanics, ensure robust protection against potential eavesdropping participant attacks. contrast numerous existing QPC protocols rely on multi-qubit or d-dimensional states, our method exhibits superior efficiency practicality. Specifically, achieves qubit 50% by one bit classical information, easier prepare than states.

Language: Английский

Citations

1

Quantum Private Comparison Protocol with Cluster States DOI Creative Commons
Min Hou, Yue Wu

Axioms, Journal Year: 2025, Volume and Issue: 14(1), P. 70 - 70

Published: Jan. 19, 2025

In this paper, we introduce a quantum private comparison (QPC) protocol designed for two players to securely and privately assess the equality of their information. The utilizes four-particle cluster states prepared by semi-honest third party (TP), who strictly adheres without deviation or collusion with any participant. TP facilitates enabling users encode information through bit-flip phase-shift operators applied received sequences. Once is encoded, sequences are returned TP, can derive results accessing details This design ensures correctness, privacy, fairness throughout process. QPC robust against both external threats participant attacks due incorporation decoy-state method key distribution techniques. Additionally, employs unitary operations Bell-basis measurements, enhancing its technical feasibility practical implementation. Notably, proposed achieves qubit efficiency up 50%. efficiency, combined strong security features, establishes as promising solution comparisons within realm cryptography.

Language: Английский

Citations

1

Quantum Private Set Intersection Scheme Based on Bell States DOI Creative Commons
Min Hou, Yue Wu, Shibin Zhang

et al.

Axioms, Journal Year: 2025, Volume and Issue: 14(2), P. 120 - 120

Published: Feb. 7, 2025

In this paper, we introduce a quantum private set intersection (QPSI) scheme that leverages Bell states as information carriers. Our approach involves encoding sets into using unitary operations, enabling the computation of between two from different users while keeping their individual undisclosed to anyone except for result. our scheme, semi-honest third party (TP) distributes first and second qubits users. Each user encodes by applying operations on received according predefined rules. The modified sequence is encrypted then sent back TP, who can compute without learning any about users’ inputs. simulation outcomes IBM platform substantiate viability scheme. We analyze security privacy aspects sets, showing both external attacks internal threats do not compromise Furthermore, exhibits better practicality utilizing easily implementable rather than relying multiple encoded calculations.

Language: Английский

Citations

1

Efficient Quantum Private Comparison Based on GHZ States DOI Creative Commons
Min Hou, Yue Wu, Shibin Zhang

et al.

Entropy, Journal Year: 2024, Volume and Issue: 26(5), P. 413 - 413

Published: May 10, 2024

Quantum private comparison (QPC) is a fundamental cryptographic protocol that allows two parties to compare the equality of their inputs without revealing any information about those each other. In recent years, QPC protocols utilizing various quantum resources have been proposed. However, these lower utilization and qubit efficiency. To address this issue, we propose an efficient based on GHZ states, which leverages unique properties states rotation operations achieve secure comparison. The secret encoded in angles performed received sequence transmitted along circular mode. This results multiplexing enhances resources. Our does not require key distribution (QKD) for sharing ensure security inputs, resulting no consumption sharing. One state can be compared three bits classical comparison, leading efficiency reaching 100%. Compared with existing protocol, our key. It also demonstrates enhanced performance

Language: Английский

Citations

7

Quantum multi-party private set intersection using single photons DOI

Xi Huang,

Wenfang Zhang, Shibin Zhang

et al.

Physica A Statistical Mechanics and its Applications, Journal Year: 2024, Volume and Issue: 649, P. 129974 - 129974

Published: July 20, 2024

Language: Английский

Citations

7

New Quantum Private Comparison Using Bell States DOI Creative Commons
Min Hou, Yue Wu

Entropy, Journal Year: 2024, Volume and Issue: 26(8), P. 682 - 682

Published: Aug. 13, 2024

Quantum private comparison (QPC) represents a cryptographic approach that enables two parties to determine whether their confidential data are equivalent, without disclosing the actual values. Most existing QPC protocols utilizing single photons or Bell states considered highly feasible, but they suffer from inefficiency. To address this issue, we present novel protocol capitalizes on entanglement property of and local operations meet requirements efficiency. In proposed protocol, participants with inputs perform shared received semi-honest third party (STP). Afterward, modified qubits returned STP, who can then equality relay results participants. A simulation IBM Cloud Platform confirmed feasibility our security analysis further demonstrated STP both were unable learn anything about individual inputs. other protocols, solution offers superior performance in terms

Language: Английский

Citations

7

Quantum private comparison for the socialist millionaire problem DOI Creative Commons
Min Hou,

Shi-Yao Sun,

Wei Zhang

et al.

Frontiers in Physics, Journal Year: 2024, Volume and Issue: 12

Published: June 19, 2024

The socialist millionaire problem aims to compare the equality of two inputs from users while keeping their undisclosed anyone. Quantum private comparison (QPC), whose security relies on principles quantum mechanics, can solve this and achieve information-theoretic information processing. current QPC protocols mainly utilize bitwise XOR operation implement comparison, leading insufficient security. In paper, we propose a rotation operation-based protocol problem, which utilizes Bell states as resources operations for classical calculations. proposed only easy-to-implement technologies such states, operations, Bell-basis measurements, making it more practical. analysis demonstrates that our meet both correctness requirements. Compared with existing protocols, has improved performance in terms practicability

Language: Английский

Citations

6

New Quantum Private Comparison Using Four-Particle Cluster State DOI Creative Commons
Min Hou, Yue Wu, Shibin Zhang

et al.

Entropy, Journal Year: 2024, Volume and Issue: 26(6), P. 512 - 512

Published: June 14, 2024

Quantum private comparison (QPC) enables two users to securely conduct comparisons in a network characterized by mutual distrust while guaranteeing the confidentiality of their inputs. Most previous QPC protocols were primarily used determine equality information between users, which constrained scalability. In this paper, we propose protocol that leverages entanglement correlation particles four-particle cluster state. This can compare groups within one execution, with each group consisting users. A semi-honest third party (TP), who will not deviate from execution or conspire any participant, is involved assisting achieve comparisons. Users encode inputs into specific angles rotational operations performed on received quantum sequence, then sent back TP. Security analysis shows both external attacks and insider threats are ineffective at stealing data. Finally, our some previously proposed protocols.

Language: Английский

Citations

5

Efficient Quantum Private Comparison with Unitary Operations DOI Creative Commons
Min Hou, Yue Wu

Mathematics, Journal Year: 2024, Volume and Issue: 12(22), P. 3541 - 3541

Published: Nov. 13, 2024

Quantum private comparison (QPC) is a crucial component of quantum multiparty computing (QMPC), allowing parties to compare their inputs while ensuring that no sensitive information disclosed. Many existing QPC protocols utilize Bell states encounter efficiency challenges. In this paper, we present novel and efficient protocol capitalizes on the distinct characteristics enable secure comparisons. Our method transforms into unitary operations shared states, which are then returned third party obtain results. This approach enhances decreases reliance complex resources. A single state can two classical bits, achieving qubit 100%. We illustrate feasibility through simulation IBM Cloud Platform. The security analysis confirms our resistant both eavesdropping attacks from participants.

Language: Английский

Citations

5

A quantum solution to blind millionaire problem with only single-particle states DOI Creative Commons

Kunchi Hou,

Huixin Sun,

Yao Yao

et al.

EPJ Quantum Technology, Journal Year: 2025, Volume and Issue: 12(1)

Published: Jan. 23, 2025

Language: Английский

Citations

0