Advertisement

Quantum Information Processing

, Volume 13, Issue 1, pp 85–100 | Cite as

A class of protocols for quantum private comparison based on the symmetry of states

  • Xiu-Bo Chen
  • Zhao Dou
  • Gang Xu
  • Cong Wang
  • Yi-Xian Yang
Article

Abstract

In this paper, a class of protocols for quantum private comparison is investigated. The main feature is that the symmetry of quantum states is utilized. First of all, we design a new protocol for quantum private comparison via the \(\chi \)-type state as a special example. Then, through the in-deep research and analysis on the quantum carrier, it is found that lots of quantum states with the symmetrical characteristic can be utilized to perform the protocol successfully. It is an attractive advantage in the practical application. What is more, two players are only required to be equipped with the unitary operation machines. It means that our protocols can easily be realized and have a broad scope of application. Finally, the analyses on the protocols’ security, which are mainly ensured by the symmetry of quantum states and the property of the decoy state, are given in detail.

Keywords

Quantum private comparison Symmetry \(\chi \)-Type state Security 

Notes

Acknowledgments

Project supported by NSFC (Grant Nos. 61272514, 61003287, 61170272, 61121061, 61161140320), NCET (Grant No. NCET-13-0681), the Specialized Research Fund for the Doctoral Program of Higher Education (20100005120002), the Fok Ying Tong Education Foundation (No. 131067) and the Fundamental Research Funds for the Central Universities (No. BUPT2012RC0221).

References

  1. 1.
    Yao, A.C.: Protocols for secure computations. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS’ 82). IEEE Computer Society, Washington, DC, USA (1982)Google Scholar
  2. 2.
    Goldreich, O., Micali, S. Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Conference on Theory of Computing. ACM, New York, NY, USA (1987)Google Scholar
  3. 3.
    Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy states and two-photon entanglement. J. Phys. A: Math. Theor. 42, 055305 (2009)MathSciNetCrossRefADSMATHGoogle Scholar
  4. 4.
    Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561–1565 (2010)CrossRefADSGoogle Scholar
  5. 5.
    Liu, W., Wang, Y.B., Jiang, Z.T.: An efficient protocol for the quantum private comparison of equality with w state. Opt. Commun. 284, 3160–3163 (2011)CrossRefADSGoogle Scholar
  6. 6.
    Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using epr pairs. Quantum Inf. Process. 11, 373–384 (2012)MathSciNetCrossRefMATHGoogle Scholar
  7. 7.
    Chang, Y.-J., Tsai, C.-W., Hwang, T.: Multi-user private comparison protocol using ghz class states. Quantum Inf. Process. 12, 1077–1088 (2013)MathSciNetCrossRefADSMATHGoogle Scholar
  8. 8.
    Chen, X.B., Su, Y., Niu, X.X., Yang, Y.X.: Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf. Process. Online (2012). doi: 10.1007/s11128-012-0505-5
  9. 9.
    Xu, G.A., Chen, X.B., Wei, Z.H., Yang, Y.X.: An efficient protocol for the quantum private comparison of equality with a four-qubit cluster state. Int. J. Quant. Inform. 10, 1250045 (2012)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Nie, Y., Li, Y., Liu, J., Sang, M.: Quantum state sharing of an arbitrary three-qubit state by using four sets of w-class states. Opt. Commun. 284, 1457–1460 (2010)CrossRefADSGoogle Scholar
  11. 11.
    Chen, X.B., Yang, S., Xu, G., Su, Y., Yang, Y.X.: Cryptanalysis of the quantum state sharing protocol using four sets of w-class states. Int. J. Quant. Inform. 11, 1350010 (2013)MathSciNetCrossRefMATHGoogle Scholar
  12. 12.
    Chen, X.B., Yang, S., Su, Y., Yang, Y.X.: Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the ghz state. Phys. Scr. 86, 055002 (2012)CrossRefADSMATHGoogle Scholar
  13. 13.
    Liu, X.F., Pan, R.J.: Cryptanalysis of quantum secret sharing based on ghz states. Phys. Scr. 84, 045015 (2011)CrossRefADSMATHGoogle Scholar
  14. 14.
    Wang, C., Xu, G., Yang, Y.X.: Cryptanalysis and improvement for the quantum private comparison protocol using epr pairs Int. J. Quant. Inform. 11, 1350039 (2013)MathSciNetCrossRefMATHGoogle Scholar
  15. 15.
    Biham, E., Boyer, M., Brassard, G., Van De Graaf, J., Mor, T.: Security of Quantum Key Distribution Against All Collective Attacks. arXiv, preprint quant-ph/9801022 (1998)Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Xiu-Bo Chen
    • 1
    • 2
    • 3
  • Zhao Dou
    • 1
    • 3
  • Gang Xu
    • 1
    • 2
    • 3
  • Cong Wang
    • 2
  • Yi-Xian Yang
    • 1
  1. 1.Information Security Center, State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.School of Software EngineeringBeijing University of Posts and TelecommunicationsBeijingChina
  3. 3.State Key Laboratory of Information Security, Institute of Information EngineeringChinese Academy of SciencesBeijingChina

Personalised recommendations