Multi-party quantum private comparison based on entanglement swapping of
Bell entangled states within d-level quantum system
- URL: http://arxiv.org/abs/2205.06932v1
- Date: Sat, 14 May 2022 00:08:36 GMT
- Title: Multi-party quantum private comparison based on entanglement swapping of
Bell entangled states within d-level quantum system
- Authors: Tian-Yu Ye, Jia-Li Hu
- Abstract summary: MQPC scheme is suggested based on entanglement swapping of Bell entangled states within d-level quantum system.
Security analysis shows that both the outside attack and the participant attack are ineffective.
Scheme has distinct advantages on quantum resource, quantum measurement of third party (TP) and qubit efficiency.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this paper, a multi-party quantum private comparison (MQPC) scheme is
suggested based on entanglement swapping of Bell entangled states within
d-level quantum system, which can accomplish the equality comparison of secret
binary sequences from n users via one execution of scheme. Detailed security
analysis shows that both the outside attack and the participant attack are
ineffective. The suggested scheme needn't establish a private key among n users
beforehand through the quantum key distribution (QKD) method to encrypt the
secret binary sequences. Compared with previous MQPC scheme based on d-level
Cat states and d-level Bell entangled states, the suggested scheme has distinct
advantages on quantum resource, quantum measurement of third party (TP) and
qubit efficiency.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Twin-field-based multi-party quantum key agreement [0.0]
We study a method to extend the twin-field key distribution protocol to a scheme for multi-party quantum key agreement.
We derive the key rate based on the entanglement-based source-replacement scheme.
arXiv Detail & Related papers (2024-09-06T11:51:10Z) - Benchmarking Variational Quantum Eigensolvers for Entanglement Detection in Many-Body Hamiltonian Ground States [37.69303106863453]
Variational quantum algorithms (VQAs) have emerged in recent years as a promise to obtain quantum advantage.
We use a specific class of VQA named variational quantum eigensolvers (VQEs) to benchmark them at entanglement witnessing and entangled ground state detection.
Quantum circuits whose structure is inspired by the Hamiltonian interactions presented better results on cost function estimation than problem-agnostic circuits.
arXiv Detail & Related papers (2024-07-05T12:06:40Z) - Non-unitary Coupled Cluster Enabled by Mid-circuit Measurements on Quantum Computers [37.69303106863453]
We propose a state preparation method based on coupled cluster (CC) theory, which is a pillar of quantum chemistry on classical computers.
Our approach leads to a reduction of the classical computation overhead, and the number of CNOT and T gates by 28% and 57% on average.
arXiv Detail & Related papers (2024-06-17T14:10:10Z) - A Feasible Semi-quantum Private Comparison Based on Entanglement
Swapping of Bell States [5.548873288570182]
We propose a feasible semi-quantum private comparison protocol based on entanglement swapping of Bell states.
Security analysis shows that our protocol is resilient to both external and internal attacks.
Our proposed approach showcases the potential applications of entanglement swapping in the field of semi-quantum cryptography.
arXiv Detail & Related papers (2023-05-12T13:28:44Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - A Four-Party Quantum Secret-Sharing Scheme based on Grover's Search
Algorithm [3.706222947143855]
The work presents an amalgam of quantum search algorithm (QSA) and quantum secret sharing (QSS)
The proposed QSS scheme utilizes Grover's three-particle quantum state.
The security analysis shows the scheme is stringent against malicious participants or eavesdroppers.
arXiv Detail & Related papers (2021-11-17T06:48:23Z) - Overcoming the rate-distance limit of device-independent quantum key
distribution [7.864517207531803]
Device-independent quantum key distribution (DIQKD) exploits the violation of a Bell inequality to extract secure key.
We propose a heralded DIQKD scheme based on entangled coherent states to improve entangling rates.
arXiv Detail & Related papers (2021-03-31T14:58:46Z) - A novel three party Quantum secret sharing scheme based on Bell state
sequential measurements with application in quantum image sharing [4.378411442784295]
We present a quantum secret sharing scheme based on Bell state entanglement and sequential projection measurements.
The protocol verifies the $n$ out of $n$ scheme and supports the aborting of the protocol in case all the parties do not divulge in their valid measurement outcomes.
arXiv Detail & Related papers (2020-08-14T07:50:35Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.