Loading…

Efficient Quantum Private Comparison without Sharing a Key

Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics. To improve the use of quantum resources and the efficiency of private comparison, a new QPC protocol based on GHZ-li...

Full description

Saved in:
Bibliographic Details
Published in:Entropy (Basel, Switzerland) Switzerland), 2023-11, Vol.25 (11), p.1552
Main Authors: Li, Jian, Che, Fanting, Wang, Zhuo, Fu, Anqi
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243
cites cdi_FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243
container_end_page
container_issue 11
container_start_page 1552
container_title Entropy (Basel, Switzerland)
container_volume 25
creator Li, Jian
Che, Fanting
Wang, Zhuo
Fu, Anqi
description Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics. To improve the use of quantum resources and the efficiency of private comparison, a new QPC protocol based on GHZ-like states is proposed. The protocol adopts unitary operations to encode the secret information instead of performing quantum key distribution (QKD), which can reduce the amount of computation required to perform QKD and improve the utilization of quantum resources. The decoy photon technique used to detect channel eavesdropping ensures that the protocol is resistant to external attacks. The quantum efficiency of the protocol reaches 66%. Compared with many previous QPC schemes, the proposed protocol does not need to share a key and has advantages in quantum efficiency and quantum resources.
doi_str_mv 10.3390/e25111552
format article
fullrecord <record><control><sourceid>gale_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_b1aa1b85b8ca4ed08d85aeaefabf51fe</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A774320055</galeid><doaj_id>oai_doaj_org_article_b1aa1b85b8ca4ed08d85aeaefabf51fe</doaj_id><sourcerecordid>A774320055</sourcerecordid><originalsourceid>FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243</originalsourceid><addsrcrecordid>eNpdkcFOHDEMhkeoSFDaQ99gJC70sNSZJJMMN7SiLSoSILhHnoyzZLUzWZIMFW_fdLdCFfLB1q_Pv225qr4wOOe8g2_USMaYlM1Bdcyg6xaCA3z4rz6qPqa0Bmh4w9rj6uLKOW89Tbm-n3HK81jfRf-CmeplGLcYfQpT_dvnpzDn-uGpCNOqxvoXvX6qDh1uEn3-l0-qx-9Xj8ufi5vbH9fLy5uFLfPyQkqlLbTOuhZE60DYDljnhABFvXI969vGDopaK7VqUQlwerder4RqBD-prve2Q8C12UY_Ynw1Ab3ZCSGuDMbs7YZMzxBZr2WvLQoaQA9aIiE57J1kjorX2d5rG8PzTCmb0SdLmw1OFOZkGt1xzRUHXdDTd-g6zHEqh-4o4J1UvFDne2qFZb6fXMgRbYmBRm_DRM4X_VIpwRsAKUvD132DjSGlSO7tIgbm7wfN2wf5HxqyixI</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2893039573</pqid></control><display><type>article</type><title>Efficient Quantum Private Comparison without Sharing a Key</title><source>Publicly Available Content Database</source><source>DOAJ Directory of Open Access Journals</source><source>PubMed Central</source><creator>Li, Jian ; Che, Fanting ; Wang, Zhuo ; Fu, Anqi</creator><creatorcontrib>Li, Jian ; Che, Fanting ; Wang, Zhuo ; Fu, Anqi</creatorcontrib><description>Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics. To improve the use of quantum resources and the efficiency of private comparison, a new QPC protocol based on GHZ-like states is proposed. The protocol adopts unitary operations to encode the secret information instead of performing quantum key distribution (QKD), which can reduce the amount of computation required to perform QKD and improve the utilization of quantum resources. The decoy photon technique used to detect channel eavesdropping ensures that the protocol is resistant to external attacks. The quantum efficiency of the protocol reaches 66%. Compared with many previous QPC schemes, the proposed protocol does not need to share a key and has advantages in quantum efficiency and quantum resources.</description><identifier>ISSN: 1099-4300</identifier><identifier>EISSN: 1099-4300</identifier><identifier>DOI: 10.3390/e25111552</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Analysis ; Communication ; Data encryption ; decoy photon ; Digital signatures ; Efficiency ; GHZ-like states ; Investment analysis ; Privacy ; Protocol ; Quantum cryptography ; Quantum efficiency ; Quantum mechanics ; quantum private comparison ; Safety and security measures ; Third party ; unitary operation ; Wealth</subject><ispartof>Entropy (Basel, Switzerland), 2023-11, Vol.25 (11), p.1552</ispartof><rights>COPYRIGHT 2023 MDPI AG</rights><rights>2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243</citedby><cites>FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243</cites><orcidid>0009-0006-5357-6443</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2893039573/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2893039573?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2100,25751,27922,27923,37010,37011,44588,74896</link.rule.ids></links><search><creatorcontrib>Li, Jian</creatorcontrib><creatorcontrib>Che, Fanting</creatorcontrib><creatorcontrib>Wang, Zhuo</creatorcontrib><creatorcontrib>Fu, Anqi</creatorcontrib><title>Efficient Quantum Private Comparison without Sharing a Key</title><title>Entropy (Basel, Switzerland)</title><description>Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics. To improve the use of quantum resources and the efficiency of private comparison, a new QPC protocol based on GHZ-like states is proposed. The protocol adopts unitary operations to encode the secret information instead of performing quantum key distribution (QKD), which can reduce the amount of computation required to perform QKD and improve the utilization of quantum resources. The decoy photon technique used to detect channel eavesdropping ensures that the protocol is resistant to external attacks. The quantum efficiency of the protocol reaches 66%. Compared with many previous QPC schemes, the proposed protocol does not need to share a key and has advantages in quantum efficiency and quantum resources.</description><subject>Analysis</subject><subject>Communication</subject><subject>Data encryption</subject><subject>decoy photon</subject><subject>Digital signatures</subject><subject>Efficiency</subject><subject>GHZ-like states</subject><subject>Investment analysis</subject><subject>Privacy</subject><subject>Protocol</subject><subject>Quantum cryptography</subject><subject>Quantum efficiency</subject><subject>Quantum mechanics</subject><subject>quantum private comparison</subject><subject>Safety and security measures</subject><subject>Third party</subject><subject>unitary operation</subject><subject>Wealth</subject><issn>1099-4300</issn><issn>1099-4300</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpdkcFOHDEMhkeoSFDaQ99gJC70sNSZJJMMN7SiLSoSILhHnoyzZLUzWZIMFW_fdLdCFfLB1q_Pv225qr4wOOe8g2_USMaYlM1Bdcyg6xaCA3z4rz6qPqa0Bmh4w9rj6uLKOW89Tbm-n3HK81jfRf-CmeplGLcYfQpT_dvnpzDn-uGpCNOqxvoXvX6qDh1uEn3-l0-qx-9Xj8ufi5vbH9fLy5uFLfPyQkqlLbTOuhZE60DYDljnhABFvXI969vGDopaK7VqUQlwerder4RqBD-prve2Q8C12UY_Ynw1Ab3ZCSGuDMbs7YZMzxBZr2WvLQoaQA9aIiE57J1kjorX2d5rG8PzTCmb0SdLmw1OFOZkGt1xzRUHXdDTd-g6zHEqh-4o4J1UvFDne2qFZb6fXMgRbYmBRm_DRM4X_VIpwRsAKUvD132DjSGlSO7tIgbm7wfN2wf5HxqyixI</recordid><startdate>20231101</startdate><enddate>20231101</enddate><creator>Li, Jian</creator><creator>Che, Fanting</creator><creator>Wang, Zhuo</creator><creator>Fu, Anqi</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FR3</scope><scope>HCIFZ</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>7X8</scope><scope>DOA</scope><orcidid>https://orcid.org/0009-0006-5357-6443</orcidid></search><sort><creationdate>20231101</creationdate><title>Efficient Quantum Private Comparison without Sharing a Key</title><author>Li, Jian ; Che, Fanting ; Wang, Zhuo ; Fu, Anqi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Analysis</topic><topic>Communication</topic><topic>Data encryption</topic><topic>decoy photon</topic><topic>Digital signatures</topic><topic>Efficiency</topic><topic>GHZ-like states</topic><topic>Investment analysis</topic><topic>Privacy</topic><topic>Protocol</topic><topic>Quantum cryptography</topic><topic>Quantum efficiency</topic><topic>Quantum mechanics</topic><topic>quantum private comparison</topic><topic>Safety and security measures</topic><topic>Third party</topic><topic>unitary operation</topic><topic>Wealth</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Jian</creatorcontrib><creatorcontrib>Che, Fanting</creatorcontrib><creatorcontrib>Wang, Zhuo</creatorcontrib><creatorcontrib>Fu, Anqi</creatorcontrib><collection>CrossRef</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>SciTech Premium Collection</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>MEDLINE - Academic</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Entropy (Basel, Switzerland)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Jian</au><au>Che, Fanting</au><au>Wang, Zhuo</au><au>Fu, Anqi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Efficient Quantum Private Comparison without Sharing a Key</atitle><jtitle>Entropy (Basel, Switzerland)</jtitle><date>2023-11-01</date><risdate>2023</risdate><volume>25</volume><issue>11</issue><spage>1552</spage><pages>1552-</pages><issn>1099-4300</issn><eissn>1099-4300</eissn><abstract>Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics. To improve the use of quantum resources and the efficiency of private comparison, a new QPC protocol based on GHZ-like states is proposed. The protocol adopts unitary operations to encode the secret information instead of performing quantum key distribution (QKD), which can reduce the amount of computation required to perform QKD and improve the utilization of quantum resources. The decoy photon technique used to detect channel eavesdropping ensures that the protocol is resistant to external attacks. The quantum efficiency of the protocol reaches 66%. Compared with many previous QPC schemes, the proposed protocol does not need to share a key and has advantages in quantum efficiency and quantum resources.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/e25111552</doi><orcidid>https://orcid.org/0009-0006-5357-6443</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1099-4300
ispartof Entropy (Basel, Switzerland), 2023-11, Vol.25 (11), p.1552
issn 1099-4300
1099-4300
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_b1aa1b85b8ca4ed08d85aeaefabf51fe
source Publicly Available Content Database; DOAJ Directory of Open Access Journals; PubMed Central
subjects Analysis
Communication
Data encryption
decoy photon
Digital signatures
Efficiency
GHZ-like states
Investment analysis
Privacy
Protocol
Quantum cryptography
Quantum efficiency
Quantum mechanics
quantum private comparison
Safety and security measures
Third party
unitary operation
Wealth
title Efficient Quantum Private Comparison without Sharing a Key
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T08%3A27%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Efficient%20Quantum%20Private%20Comparison%20without%20Sharing%20a%20Key&rft.jtitle=Entropy%20(Basel,%20Switzerland)&rft.au=Li,%20Jian&rft.date=2023-11-01&rft.volume=25&rft.issue=11&rft.spage=1552&rft.pages=1552-&rft.issn=1099-4300&rft.eissn=1099-4300&rft_id=info:doi/10.3390/e25111552&rft_dat=%3Cgale_doaj_%3EA774320055%3C/gale_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c430t-5578c06fcf6046f04c9019f4407eb7fb1b62cd7e6c5876a740f800232b747243%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2893039573&rft_id=info:pmid/&rft_galeid=A774320055&rfr_iscdi=true