Modern Physics Letters A,
Journal Year:
2023,
Volume and Issue:
38(30n31)
Published: Oct. 10, 2023
Lots
of
ready
quantum
private
comparison
(QPC)
protocols
usually
only
judge
whether
two
users’
data
are
equal,
whereas
the
magnitude
(QPMC)
protocol
can
compare
numbers,
whose
results
greater
than,
equal
and
less
than.
It
is
by
announcing
a
result
bits
in
that
existent
QPMC
determine
size
relationships
whole
data.
Although
announcement
leaks
no
information
to
outside
attackers,
yet
it
alerts
participants
know
each
other’s
value
certain
bit.
This
termed
as
bit
leakage
this
paper.
In
order
remedy
shortage,
paper
proposes
novel
using
type
Bell
state.
The
thoroughly
analyzed,
correct
secure.
Also,
proves
free
leakage.
Additionally,
because
easier
implement
usage
state,
counts
better
alternative
for
QPMC.
Laser Physics Letters,
Journal Year:
2024,
Volume and Issue:
21(5), P. 055209 - 055209
Published: April 10, 2024
Abstract
Based
on
Bell
states,
a
new
semi-quantum
private
comparison
protocol
is
proposed
that
enables
two
classical
users
to
securely
compare
the
equality
of
their
information
with
aid
semi-honest
third
party.
Different
from
existing
protocols,
participants
in
presented
do
not
need
measure
and
prepare
any
quantum
state,
which
only
reduces
consumption
devices,
but
also
greatly
improves
feasibility
protocol.
Performing
different
unitary
operations
received
particles,
can
secret
information.
Besides,
devised
has
higher
qubit
efficiency
than
other
similar
counterparts,
since
two-bit
privacy
each
time
one
qubit.
Meanwhile,
after
completing
process,
all
states
could
be
reused
they
still
retain
corresponding
entanglement
property,
facilitates
recycle
resources.
Security
analyses
indicate
designed
scheme
secure
against
external
attack
internal
attack.
Moreover,
involved
our
are
simulated
IBM
Quantum
Experience
demonstrate
effectiveness
security
scheme.
EPJ Quantum Technology,
Journal Year:
2024,
Volume and Issue:
11(1)
Published: March 13, 2024
Abstract
In
this
paper,
by
utilizing
d
-dimensional
single-particle
states,
three
semiquantum
cryptography
protocols,
i.e.,
the
multi-party
private
comparison
(MSQPC)
protocol,
multiplication
(MSQM)
protocol
and
summation
(MSQS)
can
be
achieved
simultaneously
under
assistance
of
two
semi-honest
quantum
third
parties
(TPs).
Here,
proposed
MSQPC
scheme
is
only
which
devoted
to
judging
size
relationship
secret
integers
from
more
than
participants
without
a
pre-shared
key.
And
MSQM
absorbs
innovative
concept
semiquantumness
into
for
first
time,
calculate
modulo
inputs
users.
As
MSQS
it
aims
accomplish
addition
users’
integers.
Neither
entanglement
swapping
nor
unitary
operations
are
necessary
in
protocols.
The
security
analysis
verifies
detail
that
both
external
attacks
internal
resisted
Zhongguo kexue. Wulixue Lixue Tianwenxue,
Journal Year:
2024,
Volume and Issue:
54(4), P. 240311 - 240311
Published: Feb. 21, 2024
This
paper
presents
a
novel
quantum
secure
multi-party
summation
protocol
based
on
one-direction
walks
circle
(ODQWC),
which
allows
the
computation
of
different
integer
sequences
from
"n"
secret
holders.
Crucially,
it
ensures
that
this
process
does
not
infringe
privacy
these
holders
by
delivering
walk
states
in
circular
pattern.
Our
proposed
employs
two-particle
product
rather
than
entangled
as
initial
resource
and
eliminates
need
for
to
perform
entanglement
swapping
operations.
Instead,
emphasizes
imposing
evolution
operators
states.
Additionally,
our
requires
single-particle
measurements.
Security
analysis
validates
can
effectively
counter
external
attacks
those
initiated
participants.
Under
specific
conditions,
be
adapted
into
bit
ODQWC.
Modern Physics Letters A,
Journal Year:
2024,
Volume and Issue:
39(10)
Published: March 28, 2024
This
study
identifies
a
participant
attack
vulnerability
in
Li
et
al.’s
SQPC
protocol.
The
allows
malicious
participant,
Bob,
to
obtain
the
Alice’s
secret
information
by
intercepting
and
measuring
photons
sent
Alice,
later
decrypting
encrypted
comparison
result.
An
improved
protocol
is
proposed
address
this
problem.
key
enhancement
introducing
mutual
eavesdropping
check
requiring
third
party
participants
verify
they
same
photon
measurement
results.
enables
detecting
attacks
like
one
identified.
not
only
withstands
from
internal
but
also
achieves
quantum
efficiency
almost
equivalent
Thus,
presents
more
secure
without
compromising
efficiency.
Entropy,
Journal Year:
2023,
Volume and Issue:
25(11), P. 1552 - 1552
Published: Nov. 17, 2023
Quantum
private
comparison
(QPC)
allows
at
least
two
users
to
compare
the
equality
of
their
secret
information,
for
which
security
is
based
on
properties
quantum
mechanics.
To
improve
use
resources
and
efficiency
comparison,
a
new
QPC
protocol
GHZ-like
states
proposed.
The
adopts
unitary
operations
encode
information
instead
performing
key
distribution
(QKD),
can
reduce
amount
computation
required
perform
QKD
utilization
resources.
decoy
photon
technique
used
detect
channel
eavesdropping
ensures
that
resistant
external
attacks.
reaches
66%.
Compared
with
many
previous
schemes,
proposed
does
not
need
share
has
advantages
in