2018
DOI: 10.1142/s0219749918500478
|View full text |Cite
|
Sign up to set email alerts
|

Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment

Abstract: Private comparison is a primitive for many cryptographic tasks, and recently several schemes for the quantum private comparison (QPC) have been proposed, where two users can compare the equality of their secrets with the help of a semi-honest third party (TP) without knowing each other's secret and without disclosing the same to the TP. In the exisiting schemes, secrecy is obtained by using conjugate coding, and considering all participants as quantum users who can perform measurement(s) and/or create states i… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
72
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 77 publications
(73 citation statements)
references
References 54 publications
1
72
0
Order By: Relevance
“…Protocol: SQPC Protocol [143] 1. Parties A and B, using the fully quantum third-party, first run a mediated SQKD protocol (such as the one in [76]) to establish a shared secret key which only A and B know, but not the third party.…”
Section: Other Cryptographic Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Protocol: SQPC Protocol [143] 1. Parties A and B, using the fully quantum third-party, first run a mediated SQKD protocol (such as the one in [76]) to establish a shared secret key which only A and B know, but not the third party.…”
Section: Other Cryptographic Protocolsmentioning
confidence: 99%
“…A security analysis and also the effects of noise, was performed on this protocol in [143]. Other SQPC protocols have been proposed.…”
mentioning
confidence: 99%
“…After the semi-quantum environment was proposed, various kinds of semi-quantum protocols have been proposed for different security issues, some of which are SQKD for different situations [17][18][19][20][21][22][23][24][25][26], semi-quantum communication [27][28][29], semi-quantum secret sharing [30][31][32], semi-quantum private comparison [33,34], and semi-quantum information splitting [35], among others. According to the existing semi-quantum protocols , this study summarizes the semi-quantum environments and the quantum capabilities of the classical participants in Table 1.…”
Section: Introductionmentioning
confidence: 99%
“…Beyond key distribution itself, the semi-quantum model has been used for other cryptographic tasks including secret sharing [23,24,25,26], direct communication [27,28,29], and quantum private comparison [30,31,32,33]. There has also been work recently in analyzing SQKD protocols in more practical settings (where it is impossible for B to accurately perform the Measure and Resend operation as he cannot prepare a photon in exactly the same state it was received) [2,34,35].…”
mentioning
confidence: 99%
“…1 − S(A|E) (since we are assuming a symmetric attack in both protocols thus A's key bit is unbiased and, so, equally likely to be 0 or 1 yielding S(A) = 1). In this case, it is trivial algebra to show (using Equation 30 and basic definitions of mutual information): Figure 6 shows a comparison of S(A|E) for our protocol and BB84 with CAD in the independent case; Figure 7 shows the same but for the dependent channel case. For the dependent case, Eve's uncertainty is far greater than BB84 [2] in all cases except for MODE-2 when Q > 25%.…”
mentioning
confidence: 99%