Quantum Private Comparison Based on Four-Particle Cluster State DOI Creative Commons
Min Hou, Yue Wu

Applied Sciences, Journal Year: 2024, Volume and Issue: 14(22), P. 10759 - 10759

Published: Nov. 20, 2024

A quantum private comparison (QPC) protocol enables two parties to securely compare their data without disclosing the actual values one another, utilizing mechanics maintain confidentiality. Many current QPC protocols mainly concentrate on comparing equality of information between users during a single execution, which restricts scalability. To overcome this limitation, we present an efficient aimed at evaluating groups in execution. This is achieved by leveraging entanglement correlations each particle four-particle cluster state. In our approach, encode using bit flip or phase shift operators sequence they receive, then sent back semi-trusted party determines whether secrets are equal and communicates results users. By employing method facilitating distributed transmission sequence, achieves qubit efficiency 50%. Security analyses reveal that neither external attacks nor insider threats can successfully compromise confidentiality data.

Language: Английский

Multi-party semi-quantum private comparison protocol of size relation based on d-dimensional single-particle states DOI

Li‐Hua Gong,

Yanyan Liu,

Jie‐Hui Huang

et al.

Chinese Journal of Physics, Journal Year: 2025, Volume and Issue: unknown

Published: Feb. 1, 2025

Citations

2

Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption DOI Creative Commons
Min Hou, Yue Wu

Applied Sciences, Journal Year: 2025, Volume and Issue: 15(2), P. 722 - 722

Published: Jan. 13, 2025

In this paper, we introduce a two-party quantum private comparison (QPC) protocol that employs single photons as resources and utilizes rotational encryption to safeguard the privacy of inputs. This enables two parties compare their data without disclosing any information beyond outcome comparison. The participants’ are encoded photons, which encrypted using method. These then transmitted semi-honest third party (TP), who conducts single-particle measurements determine if users’ equal subsequently announces results participants. By harnessing principles mechanics, ensure robust protection against potential eavesdropping participant attacks. contrast numerous existing QPC protocols rely on multi-qubit or d-dimensional states, our method exhibits superior efficiency practicality. Specifically, achieves qubit 50% by one bit classical information, easier prepare than states.

Language: Английский

Citations

1

Quantum Private Comparison Protocol with Cluster States DOI Creative Commons
Min Hou, Yue Wu

Axioms, Journal Year: 2025, Volume and Issue: 14(1), P. 70 - 70

Published: Jan. 19, 2025

In this paper, we introduce a quantum private comparison (QPC) protocol designed for two players to securely and privately assess the equality of their information. The utilizes four-particle cluster states prepared by semi-honest third party (TP), who strictly adheres without deviation or collusion with any participant. TP facilitates enabling users encode information through bit-flip phase-shift operators applied received sequences. Once is encoded, sequences are returned TP, can derive results accessing details This design ensures correctness, privacy, fairness throughout process. QPC robust against both external threats participant attacks due incorporation decoy-state method key distribution techniques. Additionally, employs unitary operations Bell-basis measurements, enhancing its technical feasibility practical implementation. Notably, proposed achieves qubit efficiency up 50%. efficiency, combined strong security features, establishes as promising solution comparisons within realm cryptography.

Language: Английский

Citations

1

New Quantum Private Comparison Using Bell States DOI Creative Commons
Min Hou, Yue Wu

Entropy, Journal Year: 2024, Volume and Issue: 26(8), P. 682 - 682

Published: Aug. 13, 2024

Quantum private comparison (QPC) represents a cryptographic approach that enables two parties to determine whether their confidential data are equivalent, without disclosing the actual values. Most existing QPC protocols utilizing single photons or Bell states considered highly feasible, but they suffer from inefficiency. To address this issue, we present novel protocol capitalizes on entanglement property of and local operations meet requirements efficiency. In proposed protocol, participants with inputs perform shared received semi-honest third party (STP). Afterward, modified qubits returned STP, who can then equality relay results participants. A simulation IBM Cloud Platform confirmed feasibility our security analysis further demonstrated STP both were unable learn anything about individual inputs. other protocols, solution offers superior performance in terms

Language: Английский

Citations

7

New Quantum Private Comparison Using Four-Particle Cluster State DOI Creative Commons
Min Hou, Yue Wu, Shibin Zhang

et al.

Entropy, Journal Year: 2024, Volume and Issue: 26(6), P. 512 - 512

Published: June 14, 2024

Quantum private comparison (QPC) enables two users to securely conduct comparisons in a network characterized by mutual distrust while guaranteeing the confidentiality of their inputs. Most previous QPC protocols were primarily used determine equality information between users, which constrained scalability. In this paper, we propose protocol that leverages entanglement correlation particles four-particle cluster state. This can compare groups within one execution, with each group consisting users. A semi-honest third party (TP), who will not deviate from execution or conspire any participant, is involved assisting achieve comparisons. Users encode inputs into specific angles rotational operations performed on received quantum sequence, then sent back TP. Security analysis shows both external attacks and insider threats are ineffective at stealing data. Finally, our some previously proposed protocols.

Language: Английский

Citations

5

Multiparty Quantum Private Comparison Using Rotation Operations DOI Creative Commons
Min Hou, Yue Wu

Axioms, Journal Year: 2025, Volume and Issue: 14(4), P. 274 - 274

Published: April 3, 2025

This paper presents a multiparty quantum private comparison (MQPC) protocol that facilitates multiple users to compare the equality of their inputs while preserving confidentiality each input through principles mechanics. In our approach, initially convert secret integers into binary representations, which are then encoded single photons act as carriers information. These single-photon states undergo encryption via rotational operations, effectively obscuring original before transmission semi-honest third party (TP). The TP decrypts and conducts Z-basis measurements derive results. To enhance security, incorporates decoy photons, enabling participants detect potential eavesdropping on channel. Importantly, even if or other attempt glean insights other’s inputs, operations ensures information remains inaccessible. demonstrates significant advancements in practicality compared existing MQPC frameworks rely complex technologies, such entanglement swapping multi-particle entanglement. By leveraging simplicity rotation measurements, is more accessible for implementation.

Language: Английский

Citations

0

Quantum Private Comparison Based on Four-Particle Cluster State DOI Creative Commons
Min Hou, Yue Wu

Applied Sciences, Journal Year: 2024, Volume and Issue: 14(22), P. 10759 - 10759

Published: Nov. 20, 2024

A quantum private comparison (QPC) protocol enables two parties to securely compare their data without disclosing the actual values one another, utilizing mechanics maintain confidentiality. Many current QPC protocols mainly concentrate on comparing equality of information between users during a single execution, which restricts scalability. To overcome this limitation, we present an efficient aimed at evaluating groups in execution. This is achieved by leveraging entanglement correlations each particle four-particle cluster state. In our approach, encode using bit flip or phase shift operators sequence they receive, then sent back semi-trusted party determines whether secrets are equal and communicates results users. By employing method facilitating distributed transmission sequence, achieves qubit efficiency 50%. Security analyses reveal that neither external attacks nor insider threats can successfully compromise confidentiality data.

Language: Английский

Citations

2