Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States

Private comparison allows n(n ≥ 2) participants who do not trust each other to compare whether their secret data are the same, without leaking the secret data of their own. Quantum private comparison (QPC) uses quantum mechanics to accomplish the comparison. In this paper, we present a si...

Full description

Bibliographic Details
Main Authors: Zhaoxu Ji, Huanguo Zhang, Houzhen Wang
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8678627/
id doaj-f13570aeebf84bd09bf45f40509a76a0
record_format Article
spelling doaj-f13570aeebf84bd09bf45f40509a76a02021-03-29T22:20:16ZengIEEEIEEE Access2169-35362019-01-017446134462110.1109/ACCESS.2019.29066878678627Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled StatesZhaoxu Ji0https://orcid.org/0000-0002-3084-6205Huanguo Zhang1Houzhen Wang2Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, ChinaKey Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, ChinaKey Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, ChinaPrivate comparison allows n(n ≥ 2) participants who do not trust each other to compare whether their secret data are the same, without leaking the secret data of their own. Quantum private comparison (QPC) uses quantum mechanics to accomplish the comparison. In this paper, we present a simple and effective method which can design QPC protocols based on multi-particle entangled states including the genuinely entangled five-qubit state, the generalized Brown state, the genuine six-qubit entangled state, etc. We take the Bell state and the genuinely entangled five-qubit state as examples, respectively, to present two QPC protocols, where a semi-honest third party who assists two participants in implementing the protocols is assumed. A key feature of our protocols is that quantum states are prepared by two participants rather than by the third party, which effectively prevents the third party from preparing fake quantum states, thus improving the security of the protocols. In addition, we use the entanglement properties of multi-particle entangled states and collaborative computing between participants for privacy protection, and we use QKD to ensure the security of the cooperative computing when two participants are in different locations. We show that the security of our protocols towards both outsider and insider attacks can be guaranteed.https://ieeexplore.ieee.org/document/8678627/Information securityquantum cryptographyquantum private comparisonquantum entanglementquantum computing
collection DOAJ
language English
format Article
sources DOAJ
author Zhaoxu Ji
Huanguo Zhang
Houzhen Wang
spellingShingle Zhaoxu Ji
Huanguo Zhang
Houzhen Wang
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States
IEEE Access
Information security
quantum cryptography
quantum private comparison
quantum entanglement
quantum computing
author_facet Zhaoxu Ji
Huanguo Zhang
Houzhen Wang
author_sort Zhaoxu Ji
title Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States
title_short Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States
title_full Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States
title_fullStr Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States
title_full_unstemmed Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States
title_sort quantum private comparison protocols with a number of multi-particle entangled states
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description Private comparison allows n(n ≥ 2) participants who do not trust each other to compare whether their secret data are the same, without leaking the secret data of their own. Quantum private comparison (QPC) uses quantum mechanics to accomplish the comparison. In this paper, we present a simple and effective method which can design QPC protocols based on multi-particle entangled states including the genuinely entangled five-qubit state, the generalized Brown state, the genuine six-qubit entangled state, etc. We take the Bell state and the genuinely entangled five-qubit state as examples, respectively, to present two QPC protocols, where a semi-honest third party who assists two participants in implementing the protocols is assumed. A key feature of our protocols is that quantum states are prepared by two participants rather than by the third party, which effectively prevents the third party from preparing fake quantum states, thus improving the security of the protocols. In addition, we use the entanglement properties of multi-particle entangled states and collaborative computing between participants for privacy protection, and we use QKD to ensure the security of the cooperative computing when two participants are in different locations. We show that the security of our protocols towards both outsider and insider attacks can be guaranteed.
topic Information security
quantum cryptography
quantum private comparison
quantum entanglement
quantum computing
url https://ieeexplore.ieee.org/document/8678627/
work_keys_str_mv AT zhaoxuji quantumprivatecomparisonprotocolswithanumberofmultiparticleentangledstates
AT huanguozhang quantumprivatecomparisonprotocolswithanumberofmultiparticleentangledstates
AT houzhenwang quantumprivatecomparisonprotocolswithanumberofmultiparticleentangledstates
_version_ 1724191909018075136