Bit leakage-resistant quantum private magnitude comparison DOI
Yan‐Feng Lang

Modern Physics Letters A, Journal Year: 2023, Volume and Issue: 38(30n31)

Published: Oct. 10, 2023

Lots of ready quantum private comparison (QPC) protocols usually only judge whether two users’ data are equal, whereas the magnitude (QPMC) protocol can compare numbers, whose results greater than, equal and less than. It is by announcing a result bits in that existent QPMC determine size relationships whole data. Although announcement leaks no information to outside attackers, yet it alerts participants know each other’s value certain bit. This termed as bit leakage this paper. In order remedy shortage, paper proposes novel using type Bell state. The thoroughly analyzed, correct secure. Also, proves free leakage. Additionally, because easier implement usage state, counts better alternative for QPMC.

Language: Английский

Novel semi-quantum private comparison protocol with Bell states DOI

Li‐Hua Gong,

Mao-Long Li,

Hao Cao

et al.

Laser Physics Letters, Journal Year: 2024, Volume and Issue: 21(5), P. 055209 - 055209

Published: April 10, 2024

Abstract Based on Bell states, a new semi-quantum private comparison protocol is proposed that enables two classical users to securely compare the equality of their information with aid semi-honest third party. Different from existing protocols, participants in presented do not need measure and prepare any quantum state, which only reduces consumption devices, but also greatly improves feasibility protocol. Performing different unitary operations received particles, can secret information. Besides, devised has higher qubit efficiency than other similar counterparts, since two-bit privacy each time one qubit. Meanwhile, after completing process, all states could be reused they still retain corresponding entanglement property, facilitates recycle resources. Security analyses indicate designed scheme secure against external attack internal attack. Moreover, involved our are simulated IBM Quantum Experience demonstrate effectiveness security scheme.

Language: Английский

Citations

26

Hybrid protocols for multi-party semiquantum private comparison, multiplication and summation without a pre-shared key based on d-dimensional single-particle states DOI Creative Commons

Jiang-Yuan Lian,

Tian-Yu Ye

EPJ Quantum Technology, Journal Year: 2024, Volume and Issue: 11(1)

Published: March 13, 2024

Abstract In this paper, by utilizing d -dimensional single-particle states, three semiquantum cryptography protocols, i.e., the multi-party private comparison (MSQPC) protocol, multiplication (MSQM) protocol and summation (MSQS) can be achieved simultaneously under assistance of two semi-honest quantum third parties (TPs). Here, proposed MSQPC scheme is only which devoted to judging size relationship secret integers from more than participants without a pre-shared key. And MSQM absorbs innovative concept semiquantumness into for first time, calculate modulo inputs users. As MSQS it aims accomplish addition users’ integers. Neither entanglement swapping nor unitary operations are necessary in protocols. The security analysis verifies detail that both external attacks internal resisted

Language: Английский

Citations

12

A quantum secure multi-party summation protocol based on one-direction quantum walks on a circle DOI Open Access

Jin-Tao WANG,

Xia Li, Tian-Yu Ye

et al.

Zhongguo kexue. Wulixue Lixue Tianwenxue, Journal Year: 2024, Volume and Issue: 54(4), P. 240311 - 240311

Published: Feb. 21, 2024

This paper presents a novel quantum secure multi-party summation protocol based on one-direction walks circle (ODQWC), which allows the computation of different integer sequences from "n" secret holders. Crucially, it ensures that this process does not infringe privacy these holders by delivering walk states in circular pattern. Our proposed employs two-particle product rather than entangled as initial resource and eliminates need for to perform entanglement swapping operations. Instead, emphasizes imposing evolution operators states. Additionally, our requires single-particle measurements. Security analysis validates can effectively counter external attacks those initiated participants. Under specific conditions, be adapted into bit ODQWC.

Language: Английский

Citations

5

Efficient and secure semi-quantum private comparison protocol using three-particle GHZ-like states against participant attack DOI
Chun‐Wei Yang, Yu-Yun Huang, Jason Lin

et al.

Modern Physics Letters A, Journal Year: 2024, Volume and Issue: 39(10)

Published: March 28, 2024

This study identifies a participant attack vulnerability in Li et al.’s SQPC protocol. The allows malicious participant, Bob, to obtain the Alice’s secret information by intercepting and measuring photons sent Alice, later decrypting encrypted comparison result. An improved protocol is proposed address this problem. key enhancement introducing mutual eavesdropping check requiring third party participants verify they same photon measurement results. enables detecting attacks like one identified. not only withstands from internal but also achieves quantum efficiency almost equivalent Thus, presents more secure without compromising efficiency.

Language: Английский

Citations

4

Semiquantum private comparison via cavity QED DOI

Xin Xu,

Jiang-Yuan Lian,

Tian-Yu Ye

et al.

Quantum Information Processing, Journal Year: 2024, Volume and Issue: 23(5)

Published: May 7, 2024

Language: Английский

Citations

4

A quantum solution to blind millionaire problem with only single-particle states DOI Creative Commons

Kunchi Hou,

Huixin Sun,

Yao Yao

et al.

EPJ Quantum Technology, Journal Year: 2025, Volume and Issue: 12(1)

Published: Jan. 23, 2025

Language: Английский

Citations

0

A feasible semi-quantum private comparison based on entanglement swapping of Bell states DOI
Chong‐Qiang Ye, Jian Li, Xiu‐Bo Chen

et al.

Physica A Statistical Mechanics and its Applications, Journal Year: 2023, Volume and Issue: 625, P. 129023 - 129023

Published: July 10, 2023

Language: Английский

Citations

8

Efficient Quantum Private Comparison without Sharing a Key DOI Creative Commons

Jian Li,

Fanting Che, Zhuo Wang

et al.

Entropy, Journal Year: 2023, Volume and Issue: 25(11), P. 1552 - 1552

Published: Nov. 17, 2023

Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which security is based on properties quantum mechanics. To improve use resources and efficiency comparison, a new QPC protocol GHZ-like states proposed. The adopts unitary operations encode information instead performing key distribution (QKD), can reduce amount computation required perform QKD utilization resources. decoy photon technique used detect channel eavesdropping ensures that resistant external attacks. reaches 66%. Compared with many previous schemes, proposed does not need share has advantages in

Language: Английский

Citations

6

Hierarchical quantum rotation operation sharing with multiparty users DOI
Weimin Shi,

Mengxuan Bai,

Yi‐Hua Zhou

et al.

Quantum Information Processing, Journal Year: 2024, Volume and Issue: 23(5)

Published: May 17, 2024

Language: Английский

Citations

2

Secure Three-Party Quantum Summation based on W-class States DOI
Qi Cheng, Haozhen Situ, Qiong Huang

et al.

International Journal of Theoretical Physics, Journal Year: 2024, Volume and Issue: 63(4)

Published: April 23, 2024

Language: Английский

Citations

1