Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party

Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third... Recently, a quantum private comparison (QPC) protocol with a dishonest third party (TP) (Yang et al. in Quantum Inf Process, 2012. doi: 10.1007/s11128-012-0433-4 ) was proposed, which pointed out that the assumption of semi-honest third party (TP) is unreasonable. Here we find this protocol is not so secure as it was expected, and then we give some improvement strategies, which ensure that both players’ secrets will not be leaked to anyone. We also discuss the assumption for TP in QPC protocls, which gives a constructive suggestions for the design of a new QPC protocol. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Quantum Information Processing Springer Journals

Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party

Quantum Information Processing , Volume 12 (5) – Nov 11, 2012

Loading next page...
 
/lp/springer-journals/cryptanalysis-and-improvement-of-the-quantum-private-comparison-0DquWxwor7

References (47)

Publisher
Springer Journals
Copyright
Copyright © 2012 by Springer Science+Business Media New York
Subject
Physics; Quantum Information Technology, Spintronics; Quantum Computing; Data Structures, Cryptology and Information Theory; Quantum Physics; Mathematical Physics
ISSN
1570-0755
eISSN
1573-1332
DOI
10.1007/s11128-012-0507-3
Publisher site
See Article on Publisher Site

Abstract

Recently, a quantum private comparison (QPC) protocol with a dishonest third party (TP) (Yang et al. in Quantum Inf Process, 2012. doi: 10.1007/s11128-012-0433-4 ) was proposed, which pointed out that the assumption of semi-honest third party (TP) is unreasonable. Here we find this protocol is not so secure as it was expected, and then we give some improvement strategies, which ensure that both players’ secrets will not be leaked to anyone. We also discuss the assumption for TP in QPC protocls, which gives a constructive suggestions for the design of a new QPC protocol.

Journal

Quantum Information ProcessingSpringer Journals

Published: Nov 11, 2012

There are no references for this article.