Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States
Private comparison allows n(n ≥ 2) participants who do not trust each other to compare whether their secret data are the same, without leaking the secret data of their own. Quantum private comparison (QPC) uses quantum mechanics to accomplish the comparison. In this paper, we present a si...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8678627/ |
id |
doaj-f13570aeebf84bd09bf45f40509a76a0 |
---|---|
record_format |
Article |
spelling |
doaj-f13570aeebf84bd09bf45f40509a76a02021-03-29T22:20:16ZengIEEEIEEE Access2169-35362019-01-017446134462110.1109/ACCESS.2019.29066878678627Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled StatesZhaoxu Ji0https://orcid.org/0000-0002-3084-6205Huanguo Zhang1Houzhen Wang2Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, ChinaKey Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, ChinaKey Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, ChinaPrivate comparison allows n(n ≥ 2) participants who do not trust each other to compare whether their secret data are the same, without leaking the secret data of their own. Quantum private comparison (QPC) uses quantum mechanics to accomplish the comparison. In this paper, we present a simple and effective method which can design QPC protocols based on multi-particle entangled states including the genuinely entangled five-qubit state, the generalized Brown state, the genuine six-qubit entangled state, etc. We take the Bell state and the genuinely entangled five-qubit state as examples, respectively, to present two QPC protocols, where a semi-honest third party who assists two participants in implementing the protocols is assumed. A key feature of our protocols is that quantum states are prepared by two participants rather than by the third party, which effectively prevents the third party from preparing fake quantum states, thus improving the security of the protocols. In addition, we use the entanglement properties of multi-particle entangled states and collaborative computing between participants for privacy protection, and we use QKD to ensure the security of the cooperative computing when two participants are in different locations. We show that the security of our protocols towards both outsider and insider attacks can be guaranteed.https://ieeexplore.ieee.org/document/8678627/Information securityquantum cryptographyquantum private comparisonquantum entanglementquantum computing |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Zhaoxu Ji Huanguo Zhang Houzhen Wang |
spellingShingle |
Zhaoxu Ji Huanguo Zhang Houzhen Wang Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States IEEE Access Information security quantum cryptography quantum private comparison quantum entanglement quantum computing |
author_facet |
Zhaoxu Ji Huanguo Zhang Houzhen Wang |
author_sort |
Zhaoxu Ji |
title |
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States |
title_short |
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States |
title_full |
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States |
title_fullStr |
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States |
title_full_unstemmed |
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States |
title_sort |
quantum private comparison protocols with a number of multi-particle entangled states |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
Private comparison allows n(n ≥ 2) participants who do not trust each other to compare whether their secret data are the same, without leaking the secret data of their own. Quantum private comparison (QPC) uses quantum mechanics to accomplish the comparison. In this paper, we present a simple and effective method which can design QPC protocols based on multi-particle entangled states including the genuinely entangled five-qubit state, the generalized Brown state, the genuine six-qubit entangled state, etc. We take the Bell state and the genuinely entangled five-qubit state as examples, respectively, to present two QPC protocols, where a semi-honest third party who assists two participants in implementing the protocols is assumed. A key feature of our protocols is that quantum states are prepared by two participants rather than by the third party, which effectively prevents the third party from preparing fake quantum states, thus improving the security of the protocols. In addition, we use the entanglement properties of multi-particle entangled states and collaborative computing between participants for privacy protection, and we use QKD to ensure the security of the cooperative computing when two participants are in different locations. We show that the security of our protocols towards both outsider and insider attacks can be guaranteed. |
topic |
Information security quantum cryptography quantum private comparison quantum entanglement quantum computing |
url |
https://ieeexplore.ieee.org/document/8678627/ |
work_keys_str_mv |
AT zhaoxuji quantumprivatecomparisonprotocolswithanumberofmultiparticleentangledstates AT huanguozhang quantumprivatecomparisonprotocolswithanumberofmultiparticleentangledstates AT houzhenwang quantumprivatecomparisonprotocolswithanumberofmultiparticleentangledstates |
_version_ |
1724191909018075136 |