Efficient Quantum Private Comparison with Unitary Operations DOI Creative Commons
Min Hou, Yue Wu

Mathematics, Journal Year: 2024, Volume and Issue: 12(22), P. 3541 - 3541

Published: Nov. 13, 2024

Quantum private comparison (QPC) is a crucial component of quantum multiparty computing (QMPC), allowing parties to compare their inputs while ensuring that no sensitive information disclosed. Many existing QPC protocols utilize Bell states encounter efficiency challenges. In this paper, we present novel and efficient protocol capitalizes on the distinct characteristics enable secure comparisons. Our method transforms into unitary operations shared states, which are then returned third party obtain results. This approach enhances decreases reliance complex resources. A single state can two classical bits, achieving qubit 100%. We illustrate feasibility through simulation IBM Cloud Platform. The security analysis confirms our resistant both eavesdropping attacks from participants.

Language: Английский

Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption DOI Creative Commons
Min Hou, Yue Wu

Applied Sciences, Journal Year: 2025, Volume and Issue: 15(2), P. 722 - 722

Published: Jan. 13, 2025

In this paper, we introduce a two-party quantum private comparison (QPC) protocol that employs single photons as resources and utilizes rotational encryption to safeguard the privacy of inputs. This enables two parties compare their data without disclosing any information beyond outcome comparison. The participants’ are encoded photons, which encrypted using method. These then transmitted semi-honest third party (TP), who conducts single-particle measurements determine if users’ equal subsequently announces results participants. By harnessing principles mechanics, ensure robust protection against potential eavesdropping participant attacks. contrast numerous existing QPC protocols rely on multi-qubit or d-dimensional states, our method exhibits superior efficiency practicality. Specifically, achieves qubit 50% by one bit classical information, easier prepare than states.

Language: Английский

Citations

1

Quantum Private Comparison Protocol with Cluster States DOI Creative Commons
Min Hou, Yue Wu

Axioms, Journal Year: 2025, Volume and Issue: 14(1), P. 70 - 70

Published: Jan. 19, 2025

In this paper, we introduce a quantum private comparison (QPC) protocol designed for two players to securely and privately assess the equality of their information. The utilizes four-particle cluster states prepared by semi-honest third party (TP), who strictly adheres without deviation or collusion with any participant. TP facilitates enabling users encode information through bit-flip phase-shift operators applied received sequences. Once is encoded, sequences are returned TP, can derive results accessing details This design ensures correctness, privacy, fairness throughout process. QPC robust against both external threats participant attacks due incorporation decoy-state method key distribution techniques. Additionally, employs unitary operations Bell-basis measurements, enhancing its technical feasibility practical implementation. Notably, proposed achieves qubit efficiency up 50%. efficiency, combined strong security features, establishes as promising solution comparisons within realm cryptography.

Language: Английский

Citations

1

New Quantum Private Comparison Using Bell States DOI Creative Commons
Min Hou, Yue Wu

Entropy, Journal Year: 2024, Volume and Issue: 26(8), P. 682 - 682

Published: Aug. 13, 2024

Quantum private comparison (QPC) represents a cryptographic approach that enables two parties to determine whether their confidential data are equivalent, without disclosing the actual values. Most existing QPC protocols utilizing single photons or Bell states considered highly feasible, but they suffer from inefficiency. To address this issue, we present novel protocol capitalizes on entanglement property of and local operations meet requirements efficiency. In proposed protocol, participants with inputs perform shared received semi-honest third party (STP). Afterward, modified qubits returned STP, who can then equality relay results participants. A simulation IBM Cloud Platform confirmed feasibility our security analysis further demonstrated STP both were unable learn anything about individual inputs. other protocols, solution offers superior performance in terms

Language: Английский

Citations

7

Multi‐Party Semi‐Quantum Private Comparison Protocol of Size Relation with d‐Level GHZ States DOI Open Access
Nanrun Zhou,

Zhen‐Yong Chen,

Yanyan Liu

et al.

Advanced Quantum Technologies, Journal Year: 2024, Volume and Issue: unknown

Published: Dec. 18, 2024

Abstract A new multi‐party semi‐quantum private comparison protocol of size relation is designed based on d ‐level GHZ states. Multiple classical participants could compare their privacies while keeping them secure under an ideal environment. Compared with some similar protocols, the in do not need to prepare and measure quantum Besides, qubit efficiency reaches 33.33%. It demonstrated that output result proposed correct. Finally, security analysis manifests behaves well withstanding intercept‐resend attack, measure‐resend entanglement Trojan horse so on.

Language: Английский

Citations

6

Efficient Quantum Private Comparison with Unitary Operations DOI Creative Commons
Min Hou, Yue Wu

Mathematics, Journal Year: 2024, Volume and Issue: 12(22), P. 3541 - 3541

Published: Nov. 13, 2024

Quantum private comparison (QPC) is a crucial component of quantum multiparty computing (QMPC), allowing parties to compare their inputs while ensuring that no sensitive information disclosed. Many existing QPC protocols utilize Bell states encounter efficiency challenges. In this paper, we present novel and efficient protocol capitalizes on the distinct characteristics enable secure comparisons. Our method transforms into unitary operations shared states, which are then returned third party obtain results. This approach enhances decreases reliance complex resources. A single state can two classical bits, achieving qubit 100%. We illustrate feasibility through simulation IBM Cloud Platform. The security analysis confirms our resistant both eavesdropping attacks from participants.

Language: Английский

Citations

5