Two-party quantum private comparison based on eight-qubit entangled
state
- URL: http://arxiv.org/abs/2101.02054v3
- Date: Sat, 14 May 2022 03:17:10 GMT
- Title: Two-party quantum private comparison based on eight-qubit entangled
state
- Authors: Peiru Fan, Atta Ur Rahman, Zhaoxu Ji, Xiangmin Ji, Zhiqiang Hao,
Huanguo Zhang
- Abstract summary: The purpose of quantum private comparison (QPC) is to solve "Tierce problem" using quantum mechanics laws.
We consider for the first time the usefulness of eight-qubit entangled states for QPC by proposing a new protocol.
- Score: 0.7130302992490973
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The purpose of quantum private comparison (QPC) is to solve "Tierce problem"
using quantum mechanics laws, where the "Tierce problem" is to judge whether
the secret data of two participants are equal under the condition of protecting
data privacy. Here we consider for the first time the usefulness of eight-qubit
entangled states for QPC by proposing a new protocol. The proposed protocol
only adopts necessary quantum technologies such as preparing quantum states and
quantum measurements without using any other quantum technologies (e.g. unitary
operations and entanglement swapping), thus the protocol has advantages in
quantum device consumption. The measurements adopted only include
single-particle measurements, which is easier to implement than entangled-state
measurements under the existing technical conditions. The proposed protocol
takes advantage of the entanglement characteristics of the eight-qubit
entangled state, and uses joint computation, decoy photon technology, the keys
generated by a quantum key distribution protocol to ensure data privacy. We
show that when all singleparticle measurements in the proposed protocol are
replaced by Bell measurements, the purpose of the protocol can also be
achieved. We also show that the proposed protocol can be changed into a
semi-quantum protocol with a few small changes.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Non-unitary Coupled Cluster Enabled by Mid-circuit Measurements on Quantum Computers [37.69303106863453]
We propose a state preparation method based on coupled cluster (CC) theory, which is a pillar of quantum chemistry on classical computers.
Our approach leads to a reduction of the classical computation overhead, and the number of CNOT and T gates by 28% and 57% on average.
arXiv Detail & Related papers (2024-06-17T14:10:10Z) - A Feasible Semi-quantum Private Comparison Based on Entanglement
Swapping of Bell States [5.548873288570182]
We propose a feasible semi-quantum private comparison protocol based on entanglement swapping of Bell states.
Security analysis shows that our protocol is resilient to both external and internal attacks.
Our proposed approach showcases the potential applications of entanglement swapping in the field of semi-quantum cryptography.
arXiv Detail & Related papers (2023-05-12T13:28:44Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Resource analysis for quantum-aided Byzantine agreement with the four-qubit singlet state [1.2094859111770522]
In distributed computing, a Byzantine fault is a condition where a component behaves inconsistently, showing different symptoms to different components of the system.
Our work highlights important engineering aspects of the future deployment of quantum communication protocols with multi-qubit entangled states.
arXiv Detail & Related papers (2022-07-11T15:17:58Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Measure-resend semi-quantum private comparison without entanglement [0.0]
Our protocol allows two classical users to compare the equality of their private secrets under the help of a quantum third party.
The quantum TP is semi-honest in the sense that he is allowed to misbehave on his own but cannot conspire with either of users.
arXiv Detail & Related papers (2022-05-13T00:43:05Z) - A lightweight three-user secure quantum summation protocol without a
third party based on single-particle states [0.0]
A lightweight three-user secure quantum summation protocol is put forward by using single-particle states.
This protocol only requires single-particle states rather than quantum entangled states as the initial quantum resource.
Security analysis proves that this protocol is secure against both the outside attacks and the participant attacks.
arXiv Detail & Related papers (2022-04-03T04:58:24Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Benchmarking of Quantum Protocols [0.9176056742068812]
We consider several quantum protocols that enable promising functionalities and services in near-future quantum networks.
We use NetSquid simulation platform to evaluate the effect of various sources of noise on the performance of these protocols.
arXiv Detail & Related papers (2021-11-03T21:17:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.