Quantum Private Comparison Based on Four-Particle Cluster State DOI Creative Commons
Min Hou, Yue Wu

Applied Sciences, Journal Year: 2024, Volume and Issue: 14(22), P. 10759 - 10759

Published: Nov. 20, 2024

A quantum private comparison (QPC) protocol enables two parties to securely compare their data without disclosing the actual values one another, utilizing mechanics maintain confidentiality. Many current QPC protocols mainly concentrate on comparing equality of information between users during a single execution, which restricts scalability. To overcome this limitation, we present an efficient aimed at evaluating groups in execution. This is achieved by leveraging entanglement correlations each particle four-particle cluster state. In our approach, encode using bit flip or phase shift operators sequence they receive, then sent back semi-trusted party determines whether secrets are equal and communicates results users. By employing method facilitating distributed transmission sequence, achieves qubit efficiency 50%. Security analyses reveal that neither external attacks nor insider threats can successfully compromise confidentiality data.

Language: Английский

Novel semi-quantum private comparison protocol with Bell states DOI

Li‐Hua Gong,

Mao-Long Li,

Hao Cao

et al.

Laser Physics Letters, Journal Year: 2024, Volume and Issue: 21(5), P. 055209 - 055209

Published: April 10, 2024

Abstract Based on Bell states, a new semi-quantum private comparison protocol is proposed that enables two classical users to securely compare the equality of their information with aid semi-honest third party. Different from existing protocols, participants in presented do not need measure and prepare any quantum state, which only reduces consumption devices, but also greatly improves feasibility protocol. Performing different unitary operations received particles, can secret information. Besides, devised has higher qubit efficiency than other similar counterparts, since two-bit privacy each time one qubit. Meanwhile, after completing process, all states could be reused they still retain corresponding entanglement property, facilitates recycle resources. Security analyses indicate designed scheme secure against external attack internal attack. Moreover, involved our are simulated IBM Quantum Experience demonstrate effectiveness security scheme.

Language: Английский

Citations

26

Efficient Quantum Private Comparison Based on GHZ States DOI Creative Commons
Min Hou, Yue Wu, Shibin Zhang

et al.

Entropy, Journal Year: 2024, Volume and Issue: 26(5), P. 413 - 413

Published: May 10, 2024

Quantum private comparison (QPC) is a fundamental cryptographic protocol that allows two parties to compare the equality of their inputs without revealing any information about those each other. In recent years, QPC protocols utilizing various quantum resources have been proposed. However, these lower utilization and qubit efficiency. To address this issue, we propose an efficient based on GHZ states, which leverages unique properties states rotation operations achieve secure comparison. The secret encoded in angles performed received sequence transmitted along circular mode. This results multiplexing enhances resources. Our does not require key distribution (QKD) for sharing ensure security inputs, resulting no consumption sharing. One state can be compared three bits classical comparison, leading efficiency reaching 100%. Compared with existing protocol, our key. It also demonstrates enhanced performance

Language: Английский

Citations

7

Multi‐Party Semi‐Quantum Private Comparison Protocol of Size Relation with d‐Level GHZ States DOI Open Access
Nanrun Zhou,

Zhen‐Yong Chen,

Yanyan Liu

et al.

Advanced Quantum Technologies, Journal Year: 2024, Volume and Issue: unknown

Published: Dec. 18, 2024

Abstract A new multi‐party semi‐quantum private comparison protocol of size relation is designed based on d ‐level GHZ states. Multiple classical participants could compare their privacies while keeping them secure under an ideal environment. Compared with some similar protocols, the in do not need to prepare and measure quantum Besides, qubit efficiency reaches 33.33%. It demonstrated that output result proposed correct. Finally, security analysis manifests behaves well withstanding intercept‐resend attack, measure‐resend entanglement Trojan horse so on.

Language: Английский

Citations

6

New Quantum Private Comparison Using Four-Particle Cluster State DOI Creative Commons
Min Hou, Yue Wu, Shibin Zhang

et al.

Entropy, Journal Year: 2024, Volume and Issue: 26(6), P. 512 - 512

Published: June 14, 2024

Quantum private comparison (QPC) enables two users to securely conduct comparisons in a network characterized by mutual distrust while guaranteeing the confidentiality of their inputs. Most previous QPC protocols were primarily used determine equality information between users, which constrained scalability. In this paper, we propose protocol that leverages entanglement correlation particles four-particle cluster state. This can compare groups within one execution, with each group consisting users. A semi-honest third party (TP), who will not deviate from execution or conspire any participant, is involved assisting achieve comparisons. Users encode inputs into specific angles rotational operations performed on received quantum sequence, then sent back TP. Security analysis shows both external attacks and insider threats are ineffective at stealing data. Finally, our some previously proposed protocols.

Language: Английский

Citations

5

Quantum-Resistant Cryptography DOI
Agung Mulyo Widodo, Princy Pappachan, Binastya Anggara Sekti

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 100 - 130

Published: July 12, 2024

Quantum-resistant cryptography develops cryptographic protocols and algorithms that can withstand attacks from quantum computers. Quantum computers solve certain mathematical problems much faster than classical computers, making current encryption techniques like RSA ECC vulnerable to such as Shor's algorithm. To address this, quantum-resistant focuses on creating new based are difficult for efficiently. Examples include lattice-based, code-based, hash-based, multivariate polynomial cryptography. The National Institute of Standards Technology (NIST) is leading efforts standardize these ensure they compatible with various systems applications. While offer protection, may involve higher computational complexity larger key sizes compared traditional methods, posing implementation challenges ongoing research aims address.

Language: Английский

Citations

4

Quantum Private Comparison Based on Four-Particle Cluster State DOI Creative Commons
Min Hou, Yue Wu

Applied Sciences, Journal Year: 2024, Volume and Issue: 14(22), P. 10759 - 10759

Published: Nov. 20, 2024

A quantum private comparison (QPC) protocol enables two parties to securely compare their data without disclosing the actual values one another, utilizing mechanics maintain confidentiality. Many current QPC protocols mainly concentrate on comparing equality of information between users during a single execution, which restricts scalability. To overcome this limitation, we present an efficient aimed at evaluating groups in execution. This is achieved by leveraging entanglement correlations each particle four-particle cluster state. In our approach, encode using bit flip or phase shift operators sequence they receive, then sent back semi-trusted party determines whether secrets are equal and communicates results users. By employing method facilitating distributed transmission sequence, achieves qubit efficiency 50%. Security analyses reveal that neither external attacks nor insider threats can successfully compromise confidentiality data.

Language: Английский

Citations

2