Cryptanalysis and improvement of Wu-Cai-Wu-Zhang's quantum private
comparison protocol
- URL: http://arxiv.org/abs/1908.09169v2
- Date: Sat, 22 Jul 2023 20:19:37 GMT
- Title: Cryptanalysis and improvement of Wu-Cai-Wu-Zhang's quantum private
comparison protocol
- Authors: Guang Ping He
- Abstract summary: The authors discussed the shortcomings in the security of a quantum private comparison protocol that we previously proposed.
Here we analysis the information leaked in their protocol, and find that it is even less secure than our protocol in certain cases.
We propose an improved version which has the following advantages: (1) no entanglement needed, (2) quantum memory is no longer required, and (3) less information leaked.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In a recent paper (Int. J. Quantum Inf. 17 (2019) 1950026), the authors
discussed the shortcomings in the security of a quantum private comparison
protocol that we previously proposed (Int. J. Quantum Inf. 15 (2017) 1750014).
They also proposed a new protocol aimed to avoid these problems. Here we
analysis the information leaked in their protocol, and find that it is even
less secure than our protocol in certain cases. We further propose an improved
version which has the following advantages: (1) no entanglement needed, (2)
quantum memory is no longer required, and (3) less information leaked.
Therefore, better security and great feasibility are both achieved.
Related papers
- Quantum position verification in one shot: parallel repetition of the $f$-BB84 and $f$-routing protocols [0.0]
We show that security for a one-round protocol can rely on the size of the classical information rather than quantum resources.
We establish parallel repetition of the $f$-BB84 and $f$-routing QPV protocols.
arXiv Detail & Related papers (2025-03-12T17:00:32Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a brand new quantum digital signature protocol without a trusted third party only with qubit technology to further improve the security.
We prove that the protocol has information-theoretical unforgeability. Moreover, it satisfies other important secure properties, including asymmetry, undeniability, and expandability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - An Improved Quantum Private Set Intersection Protocol Based on Hadamard
Gates [22.0983572289132]
We find the participant can deduce the other party's private information, which violates the security requirement of private set computation.
In order to solve this problem, an improved private set intersection protocol based on Hadamard gate is proposed.
arXiv Detail & Related papers (2023-10-01T16:21:44Z) - An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol
Using Bell States [16.277401577186605]
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al.
Zhu et al. pointed out that there are some security flaws and proposed an improved version.
This study shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.
arXiv Detail & Related papers (2023-09-22T09:02:18Z) - Quantum Two-Way Communication Protocol Beyond Superdense Coding [36.25599253958745]
We introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs.
The proposed protocol gives a 50% increase in both data rate and energy efficiency compared to the classical protocol.
arXiv Detail & Related papers (2023-09-06T08:48:07Z) - Collective attack free controlled quantum key agreement without quantum
memory [0.0]
We present a new protocol for controlled quantum key agreement and another protocol for key agreement with a specific focus on the security analysis.
Specifically, detailed security proof is provided against impersonated fraudulent attack and collective attacks.
arXiv Detail & Related papers (2023-08-10T09:51:23Z) - Secure Key from Quantum Discord [22.97866257572447]
We show how to make use of discord to analyze security in a specific quantum cryptography protocol.
Our method is robust against imperfections in qubit sources and qubit measurements as well as basis misalignment due to quantum channels.
arXiv Detail & Related papers (2023-04-12T14:21:49Z) - New protocols for quantum key distribution with explicit upper and lower
bound on secret-key rate [0.0]
We present two new schemes for quantum key distribution (QKD) which neither require entanglement nor require an ideal single photon source.
The proposed protocols can be implemented using realistic single photon sources which are commercially available.
arXiv Detail & Related papers (2022-12-26T11:14:39Z) - Geometry of Banach spaces: a new route towards Position Based
Cryptography [65.51757376525798]
We study Position Based Quantum Cryptography (PBQC) from the perspective of geometric functional analysis and its connections with quantum games.
The main question we are interested in asks for the optimal amount of entanglement that a coalition of attackers have to share in order to compromise the security of any PBQC protocol.
We show that the understanding of the type properties of some more involved Banach spaces would allow to drop out the assumptions and lead to unconditional lower bounds on the resources used to attack our protocol.
arXiv Detail & Related papers (2021-03-30T13:55:11Z) - Secure Multi-Party Quantum Conference and Xor Computation [3.490038106567192]
A Measurement Device Independent Quantum Dialogue protocol has been proposed (Quantum Information Processing 16.12: 305) in 2017.
We first generalize this protocol to a three-party quantum conference and then to a multi-party quantum conference.
We also propose a protocol for quantum multi-party XOR computation.
arXiv Detail & Related papers (2021-01-14T12:03:08Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Improving the Security of "Measurement-Device-Independent Quantum
Communication without Encryption" [3.490038106567192]
Niu et al. proposed a measurement-device-independent quantum secure direct communication protocol using Einstein-Podolsky-Rosen pairs and generalized it to a quantum dialogue protocol.
By analyzing these protocols we find some security issues in both these protocols.
In this work, we show that both the protocols are not secure against information leakage, and a third party can get half of the secret information without any active attack.
arXiv Detail & Related papers (2020-06-09T13:56:46Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.