Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
Min Hou,
No information about this author
Yue Wu
No information about this author
Applied Sciences,
Journal Year:
2025,
Volume and Issue:
15(2), P. 722 - 722
Published: Jan. 13, 2025
In
this
paper,
we
introduce
a
two-party
quantum
private
comparison
(QPC)
protocol
that
employs
single
photons
as
resources
and
utilizes
rotational
encryption
to
safeguard
the
privacy
of
inputs.
This
enables
two
parties
compare
their
data
without
disclosing
any
information
beyond
outcome
comparison.
The
participants’
are
encoded
photons,
which
encrypted
using
method.
These
then
transmitted
semi-honest
third
party
(TP),
who
conducts
single-particle
measurements
determine
if
users’
equal
subsequently
announces
results
participants.
By
harnessing
principles
mechanics,
ensure
robust
protection
against
potential
eavesdropping
participant
attacks.
contrast
numerous
existing
QPC
protocols
rely
on
multi-qubit
or
d-dimensional
states,
our
method
exhibits
superior
efficiency
practicality.
Specifically,
achieves
qubit
50%
by
one
bit
classical
information,
easier
prepare
than
states.
Language: Английский
Quantum Private Comparison Protocol with Cluster States
Min Hou,
No information about this author
Yue Wu
No information about this author
Axioms,
Journal Year:
2025,
Volume and Issue:
14(1), P. 70 - 70
Published: Jan. 19, 2025
In
this
paper,
we
introduce
a
quantum
private
comparison
(QPC)
protocol
designed
for
two
players
to
securely
and
privately
assess
the
equality
of
their
information.
The
utilizes
four-particle
cluster
states
prepared
by
semi-honest
third
party
(TP),
who
strictly
adheres
without
deviation
or
collusion
with
any
participant.
TP
facilitates
enabling
users
encode
information
through
bit-flip
phase-shift
operators
applied
received
sequences.
Once
is
encoded,
sequences
are
returned
TP,
can
derive
results
accessing
details
This
design
ensures
correctness,
privacy,
fairness
throughout
process.
QPC
robust
against
both
external
threats
participant
attacks
due
incorporation
decoy-state
method
key
distribution
techniques.
Additionally,
employs
unitary
operations
Bell-basis
measurements,
enhancing
its
technical
feasibility
practical
implementation.
Notably,
proposed
achieves
qubit
efficiency
up
50%.
efficiency,
combined
strong
security
features,
establishes
as
promising
solution
comparisons
within
realm
cryptography.
Language: Английский
Quantum Private Set Intersection Scheme Based on Bell States
Min Hou,
No information about this author
Yue Wu,
No information about this author
Shibin Zhang
No information about this author
et al.
Axioms,
Journal Year:
2025,
Volume and Issue:
14(2), P. 120 - 120
Published: Feb. 7, 2025
In
this
paper,
we
introduce
a
quantum
private
set
intersection
(QPSI)
scheme
that
leverages
Bell
states
as
information
carriers.
Our
approach
involves
encoding
sets
into
using
unitary
operations,
enabling
the
computation
of
between
two
from
different
users
while
keeping
their
individual
undisclosed
to
anyone
except
for
result.
our
scheme,
semi-honest
third
party
(TP)
distributes
first
and
second
qubits
users.
Each
user
encodes
by
applying
operations
on
received
according
predefined
rules.
The
modified
sequence
is
encrypted
then
sent
back
TP,
who
can
compute
without
learning
any
about
users’
inputs.
simulation
outcomes
IBM
platform
substantiate
viability
scheme.
We
analyze
security
privacy
aspects
sets,
showing
both
external
attacks
internal
threats
do
not
compromise
Furthermore,
exhibits
better
practicality
utilizing
easily
implementable
rather
than
relying
multiple
encoded
calculations.
Language: Английский
New Quantum Private Comparison Using Bell States
Min Hou,
No information about this author
Yue Wu
No information about this author
Entropy,
Journal Year:
2024,
Volume and Issue:
26(8), P. 682 - 682
Published: Aug. 13, 2024
Quantum
private
comparison
(QPC)
represents
a
cryptographic
approach
that
enables
two
parties
to
determine
whether
their
confidential
data
are
equivalent,
without
disclosing
the
actual
values.
Most
existing
QPC
protocols
utilizing
single
photons
or
Bell
states
considered
highly
feasible,
but
they
suffer
from
inefficiency.
To
address
this
issue,
we
present
novel
protocol
capitalizes
on
entanglement
property
of
and
local
operations
meet
requirements
efficiency.
In
proposed
protocol,
participants
with
inputs
perform
shared
received
semi-honest
third
party
(STP).
Afterward,
modified
qubits
returned
STP,
who
can
then
equality
relay
results
participants.
A
simulation
IBM
Cloud
Platform
confirmed
feasibility
our
security
analysis
further
demonstrated
STP
both
were
unable
learn
anything
about
individual
inputs.
other
protocols,
solution
offers
superior
performance
in
terms
Language: Английский
Efficient Quantum Private Comparison with Unitary Operations
Min Hou,
No information about this author
Yue Wu
No information about this author
Mathematics,
Journal Year:
2024,
Volume and Issue:
12(22), P. 3541 - 3541
Published: Nov. 13, 2024
Quantum
private
comparison
(QPC)
is
a
crucial
component
of
quantum
multiparty
computing
(QMPC),
allowing
parties
to
compare
their
inputs
while
ensuring
that
no
sensitive
information
disclosed.
Many
existing
QPC
protocols
utilize
Bell
states
encounter
efficiency
challenges.
In
this
paper,
we
present
novel
and
efficient
protocol
capitalizes
on
the
distinct
characteristics
enable
secure
comparisons.
Our
method
transforms
into
unitary
operations
shared
states,
which
are
then
returned
third
party
obtain
results.
This
approach
enhances
decreases
reliance
complex
resources.
A
single
state
can
two
classical
bits,
achieving
qubit
100%.
We
illustrate
feasibility
through
simulation
IBM
Cloud
Platform.
The
security
analysis
confirms
our
resistant
both
eavesdropping
attacks
from
participants.
Language: Английский
Multiparty Quantum Private Comparison Using Rotation Operations
Min Hou,
No information about this author
Yue Wu
No information about this author
Axioms,
Journal Year:
2025,
Volume and Issue:
14(4), P. 274 - 274
Published: April 3, 2025
This
paper
presents
a
multiparty
quantum
private
comparison
(MQPC)
protocol
that
facilitates
multiple
users
to
compare
the
equality
of
their
inputs
while
preserving
confidentiality
each
input
through
principles
mechanics.
In
our
approach,
initially
convert
secret
integers
into
binary
representations,
which
are
then
encoded
single
photons
act
as
carriers
information.
These
single-photon
states
undergo
encryption
via
rotational
operations,
effectively
obscuring
original
before
transmission
semi-honest
third
party
(TP).
The
TP
decrypts
and
conducts
Z-basis
measurements
derive
results.
To
enhance
security,
incorporates
decoy
photons,
enabling
participants
detect
potential
eavesdropping
on
channel.
Importantly,
even
if
or
other
attempt
glean
insights
other’s
inputs,
operations
ensures
information
remains
inaccessible.
demonstrates
significant
advancements
in
practicality
compared
existing
MQPC
frameworks
rely
complex
technologies,
such
entanglement
swapping
multi-particle
entanglement.
By
leveraging
simplicity
rotation
measurements,
is
more
accessible
for
implementation.
Language: Английский
Quantum Private Comparison Based on Four-Particle Cluster State
Min Hou,
No information about this author
Yue Wu
No information about this author
Applied Sciences,
Journal Year:
2024,
Volume and Issue:
14(22), P. 10759 - 10759
Published: Nov. 20, 2024
A
quantum
private
comparison
(QPC)
protocol
enables
two
parties
to
securely
compare
their
data
without
disclosing
the
actual
values
one
another,
utilizing
mechanics
maintain
confidentiality.
Many
current
QPC
protocols
mainly
concentrate
on
comparing
equality
of
information
between
users
during
a
single
execution,
which
restricts
scalability.
To
overcome
this
limitation,
we
present
an
efficient
aimed
at
evaluating
groups
in
execution.
This
is
achieved
by
leveraging
entanglement
correlations
each
particle
four-particle
cluster
state.
In
our
approach,
encode
using
bit
flip
or
phase
shift
operators
sequence
they
receive,
then
sent
back
semi-trusted
party
determines
whether
secrets
are
equal
and
communicates
results
users.
By
employing
method
facilitating
distributed
transmission
sequence,
achieves
qubit
efficiency
50%.
Security
analyses
reveal
that
neither
external
attacks
nor
insider
threats
can
successfully
compromise
confidentiality
data.
Language: Английский