A class of protocols for quantum private comparison based on the symmetry of states
- 191 Downloads
In this paper, a class of protocols for quantum private comparison is investigated. The main feature is that the symmetry of quantum states is utilized. First of all, we design a new protocol for quantum private comparison via the \(\chi \)-type state as a special example. Then, through the in-deep research and analysis on the quantum carrier, it is found that lots of quantum states with the symmetrical characteristic can be utilized to perform the protocol successfully. It is an attractive advantage in the practical application. What is more, two players are only required to be equipped with the unitary operation machines. It means that our protocols can easily be realized and have a broad scope of application. Finally, the analyses on the protocols’ security, which are mainly ensured by the symmetry of quantum states and the property of the decoy state, are given in detail.
KeywordsQuantum private comparison Symmetry \(\chi \)-Type state Security
Project supported by NSFC (Grant Nos. 61272514, 61003287, 61170272, 61121061, 61161140320), NCET (Grant No. NCET-13-0681), the Specialized Research Fund for the Doctoral Program of Higher Education (20100005120002), the Fok Ying Tong Education Foundation (No. 131067) and the Fundamental Research Funds for the Central Universities (No. BUPT2012RC0221).
- 1.Yao, A.C.: Protocols for secure computations. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS’ 82). IEEE Computer Society, Washington, DC, USA (1982)Google Scholar
- 2.Goldreich, O., Micali, S. Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Conference on Theory of Computing. ACM, New York, NY, USA (1987)Google Scholar
- 8.Chen, X.B., Su, Y., Niu, X.X., Yang, Y.X.: Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf. Process. Online (2012). doi: 10.1007/s11128-012-0505-5
- 15.Biham, E., Boyer, M., Brassard, G., Van De Graaf, J., Mor, T.: Security of Quantum Key Distribution Against All Collective Attacks. arXiv, preprint quant-ph/9801022 (1998)Google Scholar