Cryptanalysis and improvement of several quantum private comparison protocols

@article{Ji2019CryptanalysisAI,
  title={Cryptanalysis and improvement of several quantum private comparison protocols},
  author={Zhaoxu Ji and Peiru Fan and Huanguo Zhang and Houzhen Wang},
  journal={Communications in Theoretical Physics},
  year={2019},
  volume={72}
}
Recently, Wu et al (2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol (2017 Int. J. Theor. Phys. 56 1517), that is, a malicious participant can steal another’s secret data without being detected through an active attack means. In this paper, we show that Wu et al’s active attack is also effective for several other existing protocols, including the ones proposed by Ji et al and Zha et al (2016 Commun. Theor. Phys. 65… 
1 Citations

Tables from this paper

Quantum Secure Multi-party Summation Based on entanglement swapping

A quantum secure multi-party summation protocol, which allows multiple mutually distrustful parties to securely compute the summation of their secret data, and its security against some common attacks is analyzed, which shows that the presented protocol is secure in theory.

References

SHOWING 1-10 OF 57 REFERENCES

Greenberger-Horne-Zeilinger-based quantum private comparison protocol with bit-flipping

It is shown that TP cannot steal the participants’ data and the participants cannot steal each other’s data, and the existing attack means against QPC protocols are invalid for the proposed protocol.

Survey on quantum information security

This paper reviews the research and development of several important and well-studied branches of quantum cryptography in terms of theory and experiment, including quantum key distribution, quantum secret sharing, quantum secure direct communication, quantum signature, and quantum private query.

Joint design of coalition formation and semi-blind channel estimation in fog radio access networks

The simulation results show that a stable cluster formation is established by the proposed coalition game method and it outperforms compared with full coordinated schemes.

Entanglement swapping of Bell states and a special class of Greenberger-Horne-Zeilinger states.

A special class of Greenberger-Horne-Zeilinger states is introduced and the entanglement swapping between them is considered, showing the usefulness of the proposed entanglements swapping schemes in quantum cryptography.

Entanglement-based quantum private comparison protocol with bit-flipping

By introducing a semi-honest third party, a novel QPC protocol using (n+1)-qubit (n\ge2) Greenberger-Horne-Zeilinger (GHZ) states as information carriers is proposed, making both outsider and insider attacks invalid.

Multiparty Quantum Private Comparison of Size Relation Based on Single-Particle States

Using single-particle states, a multiparty quantum privacy comparison size relationship (QPCSR) protocol is proposed and security analysis shows that this protocol not only resists outside attack and participant attack, but also resists the semi-honest third-party attack.

Two-party quantum private comparison protocol with maximally entangled seven-qubit state

This paper investigates the utility of the maximally entangled seven-qubit state for QPC, and proposes a new protocol which enables two parties to compare their secret data with each other for equality without disclosing theirsecret data.

A Novel and Efficient Quantum Private Comparison Scheme

This paper presents a novel and efficient quantum private comparison scheme that provides higher communication efficiency because a secret-by-secret comparison instead of a bit- by-bit comparison is used.

Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state

Various kinds of attacks have been analyzed, which show that the proposed QPC protocol is secure against the outside and participants attacks.
...