Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
Applied Sciences,
Год журнала:
2025,
Номер
15(2), С. 722 - 722
Опубликована: Янв. 13, 2025
In
this
paper,
we
introduce
a
two-party
quantum
private
comparison
(QPC)
protocol
that
employs
single
photons
as
resources
and
utilizes
rotational
encryption
to
safeguard
the
privacy
of
inputs.
This
enables
two
parties
compare
their
data
without
disclosing
any
information
beyond
outcome
comparison.
The
participants’
are
encoded
photons,
which
encrypted
using
method.
These
then
transmitted
semi-honest
third
party
(TP),
who
conducts
single-particle
measurements
determine
if
users’
equal
subsequently
announces
results
participants.
By
harnessing
principles
mechanics,
ensure
robust
protection
against
potential
eavesdropping
participant
attacks.
contrast
numerous
existing
QPC
protocols
rely
on
multi-qubit
or
d-dimensional
states,
our
method
exhibits
superior
efficiency
practicality.
Specifically,
achieves
qubit
50%
by
one
bit
classical
information,
easier
prepare
than
states.
Язык: Английский
New Quantum Private Comparison Using Bell States
Entropy,
Год журнала:
2024,
Номер
26(8), С. 682 - 682
Опубликована: Авг. 13, 2024
Quantum
private
comparison
(QPC)
represents
a
cryptographic
approach
that
enables
two
parties
to
determine
whether
their
confidential
data
are
equivalent,
without
disclosing
the
actual
values.
Most
existing
QPC
protocols
utilizing
single
photons
or
Bell
states
considered
highly
feasible,
but
they
suffer
from
inefficiency.
To
address
this
issue,
we
present
novel
protocol
capitalizes
on
entanglement
property
of
and
local
operations
meet
requirements
efficiency.
In
proposed
protocol,
participants
with
inputs
perform
shared
received
semi-honest
third
party
(STP).
Afterward,
modified
qubits
returned
STP,
who
can
then
equality
relay
results
participants.
A
simulation
IBM
Cloud
Platform
confirmed
feasibility
our
security
analysis
further
demonstrated
STP
both
were
unable
learn
anything
about
individual
inputs.
other
protocols,
solution
offers
superior
performance
in
terms
Язык: Английский
Quantum Private Comparison Protocol with Cluster States
Axioms,
Год журнала:
2025,
Номер
14(1), С. 70 - 70
Опубликована: Янв. 19, 2025
In
this
paper,
we
introduce
a
quantum
private
comparison
(QPC)
protocol
designed
for
two
players
to
securely
and
privately
assess
the
equality
of
their
information.
The
utilizes
four-particle
cluster
states
prepared
by
semi-honest
third
party
(TP),
who
strictly
adheres
without
deviation
or
collusion
with
any
participant.
TP
facilitates
enabling
users
encode
information
through
bit-flip
phase-shift
operators
applied
received
sequences.
Once
is
encoded,
sequences
are
returned
TP,
can
derive
results
accessing
details
This
design
ensures
correctness,
privacy,
fairness
throughout
process.
QPC
robust
against
both
external
threats
participant
attacks
due
incorporation
decoy-state
method
key
distribution
techniques.
Additionally,
employs
unitary
operations
Bell-basis
measurements,
enhancing
its
technical
feasibility
practical
implementation.
Notably,
proposed
achieves
qubit
efficiency
up
50%.
efficiency,
combined
strong
security
features,
establishes
as
promising
solution
comparisons
within
realm
cryptography.
Язык: Английский
Efficient Quantum Private Comparison with Unitary Operations
Mathematics,
Год журнала:
2024,
Номер
12(22), С. 3541 - 3541
Опубликована: Ноя. 13, 2024
Quantum
private
comparison
(QPC)
is
a
crucial
component
of
quantum
multiparty
computing
(QMPC),
allowing
parties
to
compare
their
inputs
while
ensuring
that
no
sensitive
information
disclosed.
Many
existing
QPC
protocols
utilize
Bell
states
encounter
efficiency
challenges.
In
this
paper,
we
present
novel
and
efficient
protocol
capitalizes
on
the
distinct
characteristics
enable
secure
comparisons.
Our
method
transforms
into
unitary
operations
shared
states,
which
are
then
returned
third
party
obtain
results.
This
approach
enhances
decreases
reliance
complex
resources.
A
single
state
can
two
classical
bits,
achieving
qubit
100%.
We
illustrate
feasibility
through
simulation
IBM
Cloud
Platform.
The
security
analysis
confirms
our
resistant
both
eavesdropping
attacks
from
participants.
Язык: Английский
Quantum Private Comparison Based on Four-Particle Cluster State
Applied Sciences,
Год журнала:
2024,
Номер
14(22), С. 10759 - 10759
Опубликована: Ноя. 20, 2024
A
quantum
private
comparison
(QPC)
protocol
enables
two
parties
to
securely
compare
their
data
without
disclosing
the
actual
values
one
another,
utilizing
mechanics
maintain
confidentiality.
Many
current
QPC
protocols
mainly
concentrate
on
comparing
equality
of
information
between
users
during
a
single
execution,
which
restricts
scalability.
To
overcome
this
limitation,
we
present
an
efficient
aimed
at
evaluating
groups
in
execution.
This
is
achieved
by
leveraging
entanglement
correlations
each
particle
four-particle
cluster
state.
In
our
approach,
encode
using
bit
flip
or
phase
shift
operators
sequence
they
receive,
then
sent
back
semi-trusted
party
determines
whether
secrets
are
equal
and
communicates
results
users.
By
employing
method
facilitating
distributed
transmission
sequence,
achieves
qubit
efficiency
50%.
Security
analyses
reveal
that
neither
external
attacks
nor
insider
threats
can
successfully
compromise
confidentiality
data.
Язык: Английский
A Dynamic Semi-Quantum Private Comparison Protocol for Size Relations
Physica Scripta,
Год журнала:
2024,
Номер
99(12), С. 125114 - 125114
Опубликована: Ноя. 4, 2024
Abstract
Semi-quantum
private
comparison
allows
multiple
‘classical’
users
who
have
restricted
quantum
capabilities
to
compare
their
data
with
the
assistance
of
a
third
party.
In
this
work,
we
propose
novel
dynamic
semi-quantum
protocol
using
circular
transmission
mode
along
d
-dimensional
single-particle
states.
The
enables
size
relations
among
several
users,
while
party
can
only
determine
relative
sizes
without
accessing
users’
secret
information.
Security
evaluations
demonstrate
that
designed
withstands
typical
external
and
internal
attacks.
Compared
previous
works,
offers
improvements:
first,
it
supports
addition
or
removal
enhancing
applicability
in
practical
scenarios;
second,
eliminates
need
for
pre-shared
keys,
reducing
resource
consumption;
third,
avoids
use
high-dimensional
multi-particle
entangled
states,
thereby
feasibility
implementation.
Therefore,
proposed
may
more
potential
compared
protocols.
Язык: Английский