Loading…
Efficient Quantum Private Comparison without Sharing a Key
Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics. To improve the use of quantum resources and the efficiency of private comparison, a new QPC protocol based on GHZ-li...
Saved in:
Published in: | Entropy (Basel, Switzerland) Switzerland), 2023-11, Vol.25 (11), p.1552 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243 |
---|---|
cites | cdi_FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243 |
container_end_page | |
container_issue | 11 |
container_start_page | 1552 |
container_title | Entropy (Basel, Switzerland) |
container_volume | 25 |
creator | Li, Jian Che, Fanting Wang, Zhuo Fu, Anqi |
description | Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics. To improve the use of quantum resources and the efficiency of private comparison, a new QPC protocol based on GHZ-like states is proposed. The protocol adopts unitary operations to encode the secret information instead of performing quantum key distribution (QKD), which can reduce the amount of computation required to perform QKD and improve the utilization of quantum resources. The decoy photon technique used to detect channel eavesdropping ensures that the protocol is resistant to external attacks. The quantum efficiency of the protocol reaches 66%. Compared with many previous QPC schemes, the proposed protocol does not need to share a key and has advantages in quantum efficiency and quantum resources. |
doi_str_mv | 10.3390/e25111552 |
format | article |
fullrecord | <record><control><sourceid>gale_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_b1aa1b85b8ca4ed08d85aeaefabf51fe</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A774320055</galeid><doaj_id>oai_doaj_org_article_b1aa1b85b8ca4ed08d85aeaefabf51fe</doaj_id><sourcerecordid>A774320055</sourcerecordid><originalsourceid>FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243</originalsourceid><addsrcrecordid>eNpdkcFOHDEMhkeoSFDaQ99gJC70sNSZJJMMN7SiLSoSILhHnoyzZLUzWZIMFW_fdLdCFfLB1q_Pv225qr4wOOe8g2_USMaYlM1Bdcyg6xaCA3z4rz6qPqa0Bmh4w9rj6uLKOW89Tbm-n3HK81jfRf-CmeplGLcYfQpT_dvnpzDn-uGpCNOqxvoXvX6qDh1uEn3-l0-qx-9Xj8ufi5vbH9fLy5uFLfPyQkqlLbTOuhZE60DYDljnhABFvXI969vGDopaK7VqUQlwerder4RqBD-prve2Q8C12UY_Ynw1Ab3ZCSGuDMbs7YZMzxBZr2WvLQoaQA9aIiE57J1kjorX2d5rG8PzTCmb0SdLmw1OFOZkGt1xzRUHXdDTd-g6zHEqh-4o4J1UvFDne2qFZb6fXMgRbYmBRm_DRM4X_VIpwRsAKUvD132DjSGlSO7tIgbm7wfN2wf5HxqyixI</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2893039573</pqid></control><display><type>article</type><title>Efficient Quantum Private Comparison without Sharing a Key</title><source>Publicly Available Content Database</source><source>DOAJ Directory of Open Access Journals</source><source>PubMed Central</source><creator>Li, Jian ; Che, Fanting ; Wang, Zhuo ; Fu, Anqi</creator><creatorcontrib>Li, Jian ; Che, Fanting ; Wang, Zhuo ; Fu, Anqi</creatorcontrib><description>Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics. To improve the use of quantum resources and the efficiency of private comparison, a new QPC protocol based on GHZ-like states is proposed. The protocol adopts unitary operations to encode the secret information instead of performing quantum key distribution (QKD), which can reduce the amount of computation required to perform QKD and improve the utilization of quantum resources. The decoy photon technique used to detect channel eavesdropping ensures that the protocol is resistant to external attacks. The quantum efficiency of the protocol reaches 66%. Compared with many previous QPC schemes, the proposed protocol does not need to share a key and has advantages in quantum efficiency and quantum resources.</description><identifier>ISSN: 1099-4300</identifier><identifier>EISSN: 1099-4300</identifier><identifier>DOI: 10.3390/e25111552</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Analysis ; Communication ; Data encryption ; decoy photon ; Digital signatures ; Efficiency ; GHZ-like states ; Investment analysis ; Privacy ; Protocol ; Quantum cryptography ; Quantum efficiency ; Quantum mechanics ; quantum private comparison ; Safety and security measures ; Third party ; unitary operation ; Wealth</subject><ispartof>Entropy (Basel, Switzerland), 2023-11, Vol.25 (11), p.1552</ispartof><rights>COPYRIGHT 2023 MDPI AG</rights><rights>2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243</citedby><cites>FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243</cites><orcidid>0009-0006-5357-6443</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2893039573/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2893039573?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2100,25751,27922,27923,37010,37011,44588,74896</link.rule.ids></links><search><creatorcontrib>Li, Jian</creatorcontrib><creatorcontrib>Che, Fanting</creatorcontrib><creatorcontrib>Wang, Zhuo</creatorcontrib><creatorcontrib>Fu, Anqi</creatorcontrib><title>Efficient Quantum Private Comparison without Sharing a Key</title><title>Entropy (Basel, Switzerland)</title><description>Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics. To improve the use of quantum resources and the efficiency of private comparison, a new QPC protocol based on GHZ-like states is proposed. The protocol adopts unitary operations to encode the secret information instead of performing quantum key distribution (QKD), which can reduce the amount of computation required to perform QKD and improve the utilization of quantum resources. The decoy photon technique used to detect channel eavesdropping ensures that the protocol is resistant to external attacks. The quantum efficiency of the protocol reaches 66%. Compared with many previous QPC schemes, the proposed protocol does not need to share a key and has advantages in quantum efficiency and quantum resources.</description><subject>Analysis</subject><subject>Communication</subject><subject>Data encryption</subject><subject>decoy photon</subject><subject>Digital signatures</subject><subject>Efficiency</subject><subject>GHZ-like states</subject><subject>Investment analysis</subject><subject>Privacy</subject><subject>Protocol</subject><subject>Quantum cryptography</subject><subject>Quantum efficiency</subject><subject>Quantum mechanics</subject><subject>quantum private comparison</subject><subject>Safety and security measures</subject><subject>Third party</subject><subject>unitary operation</subject><subject>Wealth</subject><issn>1099-4300</issn><issn>1099-4300</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpdkcFOHDEMhkeoSFDaQ99gJC70sNSZJJMMN7SiLSoSILhHnoyzZLUzWZIMFW_fdLdCFfLB1q_Pv225qr4wOOe8g2_USMaYlM1Bdcyg6xaCA3z4rz6qPqa0Bmh4w9rj6uLKOW89Tbm-n3HK81jfRf-CmeplGLcYfQpT_dvnpzDn-uGpCNOqxvoXvX6qDh1uEn3-l0-qx-9Xj8ufi5vbH9fLy5uFLfPyQkqlLbTOuhZE60DYDljnhABFvXI969vGDopaK7VqUQlwerder4RqBD-prve2Q8C12UY_Ynw1Ab3ZCSGuDMbs7YZMzxBZr2WvLQoaQA9aIiE57J1kjorX2d5rG8PzTCmb0SdLmw1OFOZkGt1xzRUHXdDTd-g6zHEqh-4o4J1UvFDne2qFZb6fXMgRbYmBRm_DRM4X_VIpwRsAKUvD132DjSGlSO7tIgbm7wfN2wf5HxqyixI</recordid><startdate>20231101</startdate><enddate>20231101</enddate><creator>Li, Jian</creator><creator>Che, Fanting</creator><creator>Wang, Zhuo</creator><creator>Fu, Anqi</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FR3</scope><scope>HCIFZ</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>7X8</scope><scope>DOA</scope><orcidid>https://orcid.org/0009-0006-5357-6443</orcidid></search><sort><creationdate>20231101</creationdate><title>Efficient Quantum Private Comparison without Sharing a Key</title><author>Li, Jian ; Che, Fanting ; Wang, Zhuo ; Fu, Anqi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Analysis</topic><topic>Communication</topic><topic>Data encryption</topic><topic>decoy photon</topic><topic>Digital signatures</topic><topic>Efficiency</topic><topic>GHZ-like states</topic><topic>Investment analysis</topic><topic>Privacy</topic><topic>Protocol</topic><topic>Quantum cryptography</topic><topic>Quantum efficiency</topic><topic>Quantum mechanics</topic><topic>quantum private comparison</topic><topic>Safety and security measures</topic><topic>Third party</topic><topic>unitary operation</topic><topic>Wealth</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Jian</creatorcontrib><creatorcontrib>Che, Fanting</creatorcontrib><creatorcontrib>Wang, Zhuo</creatorcontrib><creatorcontrib>Fu, Anqi</creatorcontrib><collection>CrossRef</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>SciTech Premium Collection</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>MEDLINE - Academic</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Entropy (Basel, Switzerland)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Jian</au><au>Che, Fanting</au><au>Wang, Zhuo</au><au>Fu, Anqi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Efficient Quantum Private Comparison without Sharing a Key</atitle><jtitle>Entropy (Basel, Switzerland)</jtitle><date>2023-11-01</date><risdate>2023</risdate><volume>25</volume><issue>11</issue><spage>1552</spage><pages>1552-</pages><issn>1099-4300</issn><eissn>1099-4300</eissn><abstract>Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics. To improve the use of quantum resources and the efficiency of private comparison, a new QPC protocol based on GHZ-like states is proposed. The protocol adopts unitary operations to encode the secret information instead of performing quantum key distribution (QKD), which can reduce the amount of computation required to perform QKD and improve the utilization of quantum resources. The decoy photon technique used to detect channel eavesdropping ensures that the protocol is resistant to external attacks. The quantum efficiency of the protocol reaches 66%. Compared with many previous QPC schemes, the proposed protocol does not need to share a key and has advantages in quantum efficiency and quantum resources.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/e25111552</doi><orcidid>https://orcid.org/0009-0006-5357-6443</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1099-4300 |
ispartof | Entropy (Basel, Switzerland), 2023-11, Vol.25 (11), p.1552 |
issn | 1099-4300 1099-4300 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_b1aa1b85b8ca4ed08d85aeaefabf51fe |
source | Publicly Available Content Database; DOAJ Directory of Open Access Journals; PubMed Central |
subjects | Analysis Communication Data encryption decoy photon Digital signatures Efficiency GHZ-like states Investment analysis Privacy Protocol Quantum cryptography Quantum efficiency Quantum mechanics quantum private comparison Safety and security measures Third party unitary operation Wealth |
title | Efficient Quantum Private Comparison without Sharing a Key |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T08%3A27%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Efficient%20Quantum%20Private%20Comparison%20without%20Sharing%20a%20Key&rft.jtitle=Entropy%20(Basel,%20Switzerland)&rft.au=Li,%20Jian&rft.date=2023-11-01&rft.volume=25&rft.issue=11&rft.spage=1552&rft.pages=1552-&rft.issn=1099-4300&rft.eissn=1099-4300&rft_id=info:doi/10.3390/e25111552&rft_dat=%3Cgale_doaj_%3EA774320055%3C/gale_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2893039573&rft_id=info:pmid/&rft_galeid=A774320055&rfr_iscdi=true |