Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution

The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution In the literature He et al. (Quantum Inf Process, 2011) performed the cryptanalysis about the protocol of secure quantum auction with post-confirmation, and proposed the melioration algorithm in order to defeat the collusion among some malicious bidders in Zhao et al.’s protocol (Zhao et al. in Opt Commun 283:3194, 2010). But unfortunately, this protocol can’t defeat the collusion among some malicious bidders either. In this paper, we will analyze the security of He et al.’s protocol and point out the potential loophole. Furthermore, we propose an improved protocol which can defeat the collusion among malicious bidders effectively. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Quantum Information Processing Springer Journals

The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution

Loading next page...
 
/lp/springer-journals/the-loophole-of-the-improved-secure-quantum-sealed-bid-auction-with-ht2ijG7iHt

References (18)

Publisher
Springer Journals
Copyright
Copyright © 2012 by Springer Science+Business Media, LLC
Subject
Physics; Quantum Information Technology, Spintronics; Quantum Computing; Data Structures, Cryptology and Information Theory; Quantum Physics; Mathematical Physics
ISSN
1570-0755
eISSN
1573-1332
DOI
10.1007/s11128-012-0372-0
Publisher site
See Article on Publisher Site

Abstract

In the literature He et al. (Quantum Inf Process, 2011) performed the cryptanalysis about the protocol of secure quantum auction with post-confirmation, and proposed the melioration algorithm in order to defeat the collusion among some malicious bidders in Zhao et al.’s protocol (Zhao et al. in Opt Commun 283:3194, 2010). But unfortunately, this protocol can’t defeat the collusion among some malicious bidders either. In this paper, we will analyze the security of He et al.’s protocol and point out the potential loophole. Furthermore, we propose an improved protocol which can defeat the collusion among malicious bidders effectively.

Journal

Quantum Information ProcessingSpringer Journals

Published: Feb 28, 2012

There are no references for this article.