Affiliation:
1. School of Computer Science, Sichuan University Jinjiang College, Meishan 620860, China
2. Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu 610054, China
Abstract
Quantum private comparison (QPC) represents a cryptographic approach that enables two parties to determine whether their confidential data are equivalent, without disclosing the actual values. Most existing QPC protocols utilizing single photons or Bell states are considered highly feasible, but they suffer from inefficiency. To address this issue, we present a novel QPC protocol that capitalizes on the entanglement property of Bell states and local operations to meet the requirements of efficiency. In the proposed protocol, two participants with private inputs perform local operations on shared Bell states received from a semi-honest third party (STP). Afterward, the modified qubits are returned to the STP, who can then determine the equality of the private inputs and relay the results to the participants. A simulation on the IBM Quantum Cloud Platform confirmed the feasibility of our protocol, and a security analysis further demonstrated that the STP and both participants were unable to learn anything about the individual private inputs. In comparison to other QPC protocols, our proposed solution offers superior performance in terms of efficiency.
Funder
Open Fund of Network and Data Security Key Laboratory of Sichuan Province
Gongga Plan for the “Double World-Class Project”
Reference42 articles.
1. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer;Shor;SIAM Rev.,1999
2. Bennett, C.H., and Brassard, G. (1984, January 10–12). Quantum cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India.
3. Experimental quantum key distribution certified by Bell’s theorem;Nadlinger;Nature,2022
4. Implementation of quantum key distribution surpassing the linear rate-transmittance bound;Fang;Nat. Photonics,2020
5. Secure quantum key distribution with realistic devices;Xu;Rev. Mod. Phys.,2020