Next Article in Journal
Reliability Analysis and Numerical Simulation of Industrial Robot Drive System with Vacation
Previous Article in Journal
Detecting Benford’s Law Effectiveness Threshold Differences According to Affecting Operation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multiparty Quantum Private Comparison Using Rotation Operations

1
School of Computer Science, Sichuan University Jinjiang College, Meishan 620860, China
2
Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu 610054, China
3
State Key Laboratory of Cognitive Intelligence, Hefei 230088, China
*
Author to whom correspondence should be addressed.
Axioms 2025, 14(4), 274; https://doi.org/10.3390/axioms14040274
Submission received: 6 March 2025 / Revised: 31 March 2025 / Accepted: 2 April 2025 / Published: 3 April 2025
(This article belongs to the Section Mathematical Physics)

Abstract

:
This paper presents a multiparty quantum private comparison (MQPC) protocol that facilitates multiple users to compare the equality of their private inputs while preserving the confidentiality of each input through the principles of quantum mechanics. In our approach, users initially convert their secret integers into binary representations, which are then encoded into single photons that act as carriers of the information. These encoded single-photon states undergo encryption via rotational operations, effectively obscuring the original inputs before transmission to a semi-honest third party (TP). The TP decrypts the quantum states and conducts Z-basis measurements to derive the comparison results. To enhance security, the protocol incorporates decoy photons, enabling participants to detect potential eavesdropping on the quantum channel. Importantly, even if the TP or other participants attempt to glean insights into each other’s inputs, the encryption via rotational operations ensures that private information remains inaccessible. This protocol demonstrates significant advancements in practicality compared to existing MQPC frameworks that rely on complex quantum technologies, such as entanglement swapping and multi-particle entanglement. By leveraging the simplicity of single photons, rotation operations, and Z-basis measurements, our protocol is more accessible for implementation.

1. Introduction

The BB84 protocol [1], introduced by Bennett and Brassard in 1984, represents a pivotal advancement in quantum cryptography, showcasing the feasibility of unconditional security through the principles of quantum mechanics, notably the behavior of quantum states and the no-cloning theorem. Building on the success of BB84, a diverse array of quantum cryptographic protocols have emerged, including quantum key distribution (QKD) [2,3,4,5,6], quantum key agreement (QKA) [7,8], quantum secure direct communication (QSDC) [9,10,11], and quantum private set intersection [12,13,14]. These protocols are designed to fulfill traditional cryptographic objectives while ensuring resilience against quantum attacks.
Private comparison plays a crucial role in secure multiparty computation and was originally motivated by the millionaires’ problem [15], where two millionaires aim to ascertain who possesses greater wealth without disclosing their actual financial amounts. A notable variation proposed by Boudot et al. [16] centers on determining whether two millionaires possess identical wealth. In two-party computation scenarios, Lo [17] emphasized the challenges of constructing a secure equality function independently. To navigate these challenges, a semi-honest third party (TP) is employed to assist in the private comparison while preserving the privacy of the participants.
Historically, the security of private comparison protocols has relied on the computational complexity of specific mathematical problems, such as factoring large integers or solving discrete logarithms. These protocols utilize traditional cryptographic principles to ensure confidentiality and integrity. However, the rise in quantum computing presents significant threats to classical cryptographic systems. Quantum algorithms, notably the Shor algorithm [18], can efficiently solve problems previously deemed intractable, thereby undermining the security foundations of many classical protocols. In response to these vulnerabilities, researchers have begun developing innovative private comparison protocols that leverage quantum principles. These protocols aim to enhance security by utilizing the unique properties of quantum mechanics, such as superposition and entanglement, providing stronger guarantees against potential quantum attacks.
The primary goal of quantum private comparison (QPC) is to enable two parties to compare their confidential secrets while preserving the privacy of each participant. This is achieved by combining classical private comparison techniques with the unique properties of quantum mechanics. By leveraging quantum principles, QPC protocols enhance security and facilitate new methods for secure communication and data comparison. The foundational QPC protocol, developed by Yang and Wen in 2009 [19], employs Bell states to encode the confidential secrets of the participants. Additionally, the use of decoy states allows for the detection of any eavesdropping attempts, thereby maintaining the confidentiality of the participants’ secrets. Following this pioneering work, a variety of quantum states have been explored for use in designing QPC protocols, including single-particle states [20,21,22,23,24,25], Bell states [26,27,28,29,30,31,32,33], multi-qubit entangled states [34,35,36,37,38,39,40,41,42,43], multi-qubit cluster states [44,45,46,47,48,49,50], and d-level quantum states [51,52,53,54]. Despite these advancements, most of the existing QPC protocols are primarily designed for comparing the private data of just two participants. This limitation poses challenges when scaling the protocol to multiple participants. When n participants wish to engage in a private comparison, the two-party QPC protocol needs to be executed multiple times, specifically running the protocol n 1   to n n 1 2 times in a repeated manner. This repeated execution can lead to significant inefficiencies and increased communication overhead. Therefore, there is a pressing need for the development of more efficient multiparty QPC protocols that can handle comparisons among n participants simultaneously, without the exponential increase in protocol executions.
A new branch multiparty quantum private comparison (MQPC) has emerged, aiming at reducing the number of required executions and improving efficiency. Chang et al. [55] introduced a pioneering MQPC protocol that utilizes n-particle Greenberger–Horne–Zeilinger class states, which allows for the comparison of arbitrary pairs of participants within a single execution. The participants utilize bitwise exclusive-OR (XOR) operations to encrypt their inputs, ensuring that their data remain confidential throughout the comparison process. Building on the pioneering MQPC protocol, Liu et al. [56] introduced a novel approach to multiparty quantum private comparison by performing local unitary operations on d-dimensional basis states, which enables n parties to compare their private inputs without encrypting them into ciphertext. Wang et al. [57] proposed two distinct MQPC protocols that utilize d-level entangled states to facilitate secure comparisons among multiple participants. These protocols are designed to operate in different modes: distributed mode and traveling mode. The first protocol employs d-level n-particle entangled states and quantum Fourier transform (QFT), which allows for comparisons involving multiple participants simultaneously. The second protocol uses d-level two-particle entangled states and quantum phase shifting operation, focusing on pairwise comparisons while leveraging the entanglement properties of the states. In 2017, Ji and Ye [58] introduced a novel MQPC protocol that utilized entanglement swapping of d-level cat states and d-level Bell states. This protocol encodes participant inputs through unitary operations, allowing for secure comparisons among multiple parties. Despite this innovative approach, the realization of d-level cat states and d-level Bell states presents significant experimental challenges. These challenges can hinder the practical implementation of the protocol in real-world scenarios. Considering the difficulties associated with implementing the Ji and Ye protocol, Ye and Hu [59] proposed an alternative MQPC protocol that simplifies the process. Their protocol is based on d-level two-particle Bell entangled states, which are generally easier to realize experimentally compared to d-level cat states. While the existing MQPC protocols [55,56,57,58,59] are theoretically sound, they often rely on advanced technologies that are not yet fully realized in practice. Developing a practical MQPC protocol is critical for advancing the field of quantum cryptography. A protocol that can be reliably implemented using existing technologies would greatly enhance the applicability of quantum private comparison in real-world scenarios.
To address this challenge, we propose a multiparty quantum private comparison (MQPC) that employs rotation operations to protect the privacy of the inputs. Users begin by converting their secret integers into binary representations that are encoded into single photons. These single photons serve as carriers of the information, leveraging their quantum properties for secure communication. Once encoded, the single-photon states undergo encryption through rotation operations. This process effectively obscures the original inputs, ensuring that the information remains private during transmission to a semi-honest third party (TP). The TP, while semi-honest, is responsible for decrypting the quantum states received from the users and conducts Z-basis measurements on the quantum states. These measurements allow the TP to derive the comparison results between the users’ secret integers without revealing the actual values of the inputs. The use of rotation operations and decoy photons provides a robust mechanism for protecting the privacy of participants’ inputs, making the protocol resistant against the outsider eavesdropping and participant attacks. By using single photons and straightforward rotation operations, the protocol is designed to be easily implementable with current quantum technologies. Compared to existing MQPC frameworks that rely on complex quantum technologies, such as entanglement swapping and multi-particle entanglement, our protocol demonstrates advancements in practicality due to the simplicity of single photons, rotation operations, and Z-basis measurements.
The remainder of this paper is organized as follows. Section 2 provides an introduction of rotation operations used for encrypting the quantum states. The detailed steps of the proposed MQPC protocol and its analyses, including correctness, security, and fairness, are presented in Section 3 and Section 4, respectively. Section 5 hosts a discussion. Finally, we summarize our work in Section 6.

2. Rotation Operation

The Ry rotation operator is defined as follows:
R y θ = e i θ 2 Y = cos θ 2 I i sin θ 2 Y = cos θ 2 sin θ 2 sin θ 2 cos θ 2
where I and Y represent the identity matrix and Pauli Y matrix, respectively. θ is the rotation angle around the y-axis on the Bloch sphere [60]. The Ry operator can be utilized as an encryption mechanism in quantum communication. By applying Ry(θ) to a quantum state, we convert it into an unknown state, effectively obscuring the original information. The parameter θ serves as the encryption key, allowing for the transformation of the quantum state into a form that is not immediately recognizable.
Let E k ψ denote the encryption of quantum state ψ = 0 with the key k. When encrypting ψ with a key k = θ∈[0, 2π), this can be mathematically represented as follows:
ψ = E θ 0 = R y θ 0 = cos θ 2 sin θ 2 sin θ 2 cos θ 2 1 0 = cos θ 2 sin θ 2 = cos θ 2 0 + sin θ 2 1
The decryption process is denoted by D k ψ . To decrypt the state, the same rotation angle k = θ is applied in the opposite direction:
ψ = D θ ψ = R y θ ψ = cos θ 2 sin θ 2 sin θ 2 cos θ 2 cos θ 2 sin θ 2 = cos θ 2 cos θ 2 + sin θ 2 sin θ 2 sin θ 2 cos θ 2 + cos θ 2 sin θ 2 = 1 0 = ψ
By applying Ry(−θ) to the encrypted state, we can retrieve the original quantum state.
The Ry rotation operator is utilized as an encryption tool in quantum communication, transforming quantum states into unknown forms using the angle θ as the encryption key. Recovery of the original state is achieved through the application of the inverse operator Ry(−θ), ensuring that the quantum information remains confidential. Without knowledge of the key θ, an eavesdropper cannot easily deduce the original quantum state.

3. The Proposed MQPC Protocol

3.1. The Protocol Description

Suppose that n participants P i   i = 1,2 , , n desire to determine whether their private inputs M i are equal or not with the semi-honest third party (e.g., a quantum server with quantum abilities) while ensuring the privacy of their inputs. The semi-honest third party (TP) is one that follows protocol rules honestly while attempting to extract information from other parties’ private data. While it cannot collude with dishonest parties [57,58], its behavior necessitates careful protocol design to ensure that the privacy of all participants is maintained. The binary representations M i in F 2 L are written as M i = m i , L 1 , m i , L 2 , , m i , 0 . If the length of M i is less than L, pad with zeros in the higher-order bits. We assume that the following protocol operates under noise-free and lossless conditions and that the classical channel used for communication between the parties is authenticated.
Our protocol will satisfy the following requirements:
(1)
Correctness. If each participant provides their respective inputs and performs the protocol faithfully, the comparison results announced by the third party are correct.
(2)
Privacy. The participant’s inputs remain confidential as long as the TP cannot collude with any participant, even in the presence of outsider eavesdropping or attacks from other participants aiming to learn about their inputs.
(3)
Fairness. All the parties are perfect peer entities, and they can receive the comparison result simultaneously, ensuring that no participant has an advantage over the other.
The proposed protocol is as follows:
Step 1. The n participants run a multiparty quantum key agreement (MQKA) protocol [61] to share a secret non-zero binary key K = k L 1 , k L 2 , , k 0 , where k j 0,1 for j = 0,1 , , L 1 .
Step 2. P i performs the XOR operation with their binary inputs M i and the secret non-zero binary key K, represented as m i , j k j . Based on the result of the XOR operation, P i prepares their respective single-photon sequence. If m i , j k j = 0 ,   P i prepares the single-photon state 0 ; otherwise, state 1 is prepared. The collection of all single-photon states prepared by   P i is denoted as S i .
Step 3. P i prepares the secret key Θ i = θ i , L 1 , θ i , L 2 , , θ i , 0 , where θ i , j [ 0,2 π for j = 0,1 , , L 1 , and encrypts each state in S i by applying the Ry rotation operator using the key Θ i . The resulting encrypted sequence is denoted as E i .
Step 4. To detect potential eavesdropping, P i performs the following operations:
(1)
P i   prepares δ decoy photons randomly selected from the set of four nonorthogonal states 0 , 1 , + , , aiming at detecting potential eavesdropping.
(2)
P i inserts the prepared decoy photons into their encrypted quantum sequence E i at random positions. This results in a new sequence denoted as E i .
(3)
P i   keeps a record of the states and the exact positions of the decoy photons within the sequence E i .
(4)
P i sends E i   to the TP via a quantum channel.
Step 5. After P i   confirms that the TP has received the sequence E i , they proceed to the next steps.
(1)
P i   discloses the positions of the δ decoy photons in the sequence E i via the authenticated classical channel.
(2)
P i   publishes the measurement basis used for each decoy photon. Z-basis is used for measuring states 0 or 1 and X-basis is used for measuring states + or .
(3)
The TP performs Z-basis or X-basis measurements on these decoy photons in sequence E i according to the published bases.
(4)
The TP collects the measurement results and sends this information back to P i via the authenticated classical channel.
(5)
P i   calculates the error rate based on the measurement results received from the TP. The error rate is calculated as the ratio of the number of incorrect measurements to the total number of measurements.
(6)
If the calculated error rate exceeds a pre-agreed threshold, the protocol is restarted from Step 5. Otherwise, P i   announces her/his secret key Θ i to the TP via authenticated classical channel.
Step 6. TP recovers the sequence E i by discarding all decoy photons from the sequence E i and decrypts E i using the secret key Θ i . The TP recovers the original quantum sequence S i by applying the inverse operation. This involves performing the Ry (− Θ i ) operator on the encrypted quantum sequence E i . The TP measures all states in S i using the Z-basis and checks if all the measurement results from E i are identical. If all the measurement results of S i are identical, then X = Y ; otherwise, X Y . Finally, the TP announces the comparison results to the n participants.

3.2. A Toy Example

Let P 1 , P 2 , and P 3 be three participants with private inputs M 1 = 9 , M 2 = 10 , and M 3 = 11 . The binary representations M i ( i = 1 , 2 , 3 ) in F 2 L are as follows:
  • M 1 = 1001 ;
  • M 2 = 1010 ;
  • M 3 = 1011 .
Step 1: The three participants share a non-zero binary key K = ( 0101 ) via an MQKA protocol.
Step 2: The sequences S i ( i = 1 , 2 , 3 ) are prepared based on the XOR operation of M i and K:
  • S 1 = 1 , 1 , 0 , 0 ;
  • S 2 = 1 , 1 , 1 , 1 ;
  • S 3 = 1 , 1 , 1 , 0 .
Step 3: Each participant P i   i = 1 , 2 , 3   prepares a secret key:
  • Θ 1 = π 3 , 5 π 6 , 9 π 7 , 5 π 8 ;
  • Θ 2 = π 7 , 3 π 26 , 9 π 5 , 3 π 4 ;
  • Θ 3 = π 4 , 3 π 2 , 7 π 11 , 4 π 5 .
By applying the Ry ( Θ i ) on each state in S i , the encrypted sequences E i are as follows:
  • E 1 = R y π 3 1 , R y 5 π 6 1 , R y 9 π 7 0 , R y 5 π 8 0 ;
  • E 2 = R y π 7 1 , R y 3 π 26 1 , R y 9 π 5 1 , R y 3 π 4 1 ;
  • E 3 = R y π 4 1 , R y 3 π 2 1 , R y 7 π 11 1 , R y 4 π 5 1 .
Step 4: Each P i   i = 1 , 2 , 3 prepares δ decoy photons and inserts them into E i   at random positions:
  • For E 1 : 4th and 5th positions;
  • For E 2 : 1st and 3rd positions;
  • For E 3 : 2nd and 4th positions.
The new generated sequence E i are as follows:
  • E 1 = R y π 3 1 , R y 5 π 6 1 , R y 9 π 7 0 , + ,   0 ,   R y 5 π 8 0 ;
  • E 2 = 1 ,   R y π 7 1 , ,   R y 3 π 26 1 , R y 9 π 5 1 , R y 3 π 4 1 ;
  • E 3 = R y π 4 1 , 1 ,   R y 3 π 2 1 , + ,   R y 7 π 11 1 , R y 4 π 5 1 .
Finally, P i   i = 1 , 2 , 3 sends E i   to the TP via a quantum channel.
Step 5: Each P i   discloses the positions and measurement bases of the decoy photons in the sequence E i via the authenticated classical channel, and the measurement bases for the decoy photons in E i are as follows:
  • For E 1 : {X, Z};
  • For E 2 : {Z, X};
  • For E 12 : {Z, X}.
The TP performs the corresponding measurements on these decoy photons and returns the results to P i . Each P i   calculates the error rate. If the error rate does not exceed a pre-agreed threshold, they announce their secret key Θ i to the TP via the authenticated classical channel.
Step 6: The TP recovers the sequence E i by discarding all the decoy photons from E i . By performing the Ry (− Θ i ) operator on the encrypted quantum sequence E i , the TP can recover the original quantum sequence:
  • S 1 = 1 , 1 , 0 , 0 ;
  • S 2 = 1 , 1 , 1 , 1 ;
  • S 3 = 1 , 1 , 1 , 0 .
The TP measures all states in S i using the Z-basis and determines that not all of the measurement results of S i are identical. Finally, the TP announces the comparison results to the three participants.

4. Analyses

4.1. Correctness

In step 2, the sequence S i prepared by P i   can be written as
S i = m i , L 1 k L 1 m i , L 2 k L 2 m i , 0 k 0 = j = 0 L 1 m i , j k j
In step 3, when P i encrypts each single-photon state in S i by applying the Ry rotation operator using the key Θ i , the resulting encrypted quantum sequence E i can be given by
E i = R Θ i S j = R Θ i j = 0 L 1 m i , j k j = R θ i , L 1 m i , L 1 k L 1 R θ i , L 2 m i , L 2 k L 2 R θ i , 0 m i , 0 k 0 = j = 0 L 1 R θ i , j m i , j k j
Step 4 and step 5 are used for detecting eavesdropping.
In step 6, when P i   performs the Ry (− Θ i ) operator on the encrypted quantum sequence E i to decrypt the sequence E i using the secret key Θ i , this process for recovering the original quantum sequence S i can be given by
R Θ i E i = R Θ i j = 0 L 1 R θ i , j m i , j k j = R θ i , L 1 R θ i , L 1 m i , L 1 k L 1 R θ i , L 2 R θ i , L 2 m i , L 2 k L 2 R θ i , 0 R θ i , 0 m i , 0 k 0 = j = 0 L 1 m i , j k j = S i
When measuring S i using the Z-basis, we can know if all of the measurement results of S i are identical, then X = Y ; otherwise, X Y .

4.2. Security

The proposed MQPC protocol should satisfy the following security requirements:
(1)
Security against outsider eavesdropping: Any attempt at eavesdropping on the private information of the participants would be detectable, even if the outsider eavesdropper performs quantum-based attacks.
(2)
Security against attacks from the semi-honest trusted party (TP): The private information of the participants will not be leaked, even if the semi-honest TP utilizes the received information to deduce private information.
(3)
Security against attacks from participants: The participants’ inputs remain confidential, even if some participants collude to attempt to steal another participant’s inputs.

4.2.1. Outsider Eavesdropping

In quantum communication, the existence of an external eavesdropper, commonly known as Eve, presents a considerable threat. Eve may utilize a range of quantum-based attacks, such as intercept–resend [62], entangle–measure [63], and Trojan horse attacks [64], in an attempt to access private information. To mitigate these eavesdropping tactics, participants implement the decoy state strategy. This approach involves transmitting additional decoy states alongside the actual quantum states. Thanks to the decoy state technique, Eve’s various quantum attack methods become ineffective. Alice and Bob can accurately identify any eavesdropping efforts through inconsistencies in the statistical characteristics of the decoy states, thereby securing their communication.
Case I: Intercept–resend attack
In this scenario, an external assailant, Eve, attempts an intercept–resend attack on the quantum communication occurring between the transmission of quantum states. Eve intercepts the quantum states during their transmission, storing these intercepted particles for future exploitation. After securing the quantum states, Eve generates her own single particles, which she sends to the receiver instead of the originals. Once the receiver processes the particles sent by Eve, she captures the quantum sequences returned to the sender and measures them to extract confidential information while returning her previously stored particles back to the sender.
Upon receiving the particle sequences, both sides initiate an eavesdropping detection process. The sender reveals the locations and measurement bases of the decoy particles utilized during the process of communication. Since Eve lacks knowledge of the specific states of these particles, there exists a 50% chance that the receiver will obtain an erroneous outcome when measuring the particles sent by Eve. For instance, if the original decoy photon is in state 1 , but Eve prepares a particle in states + or , the measurement conducted by the receiver on Eve’s particle has a 50% likelihood of resulting in an incorrect measurement. Therefore, the likelihood of Eve successfully evading detection is represented by
P s u c c e s s f u l l y   e v a d i n g   d e t e c t i o n = 1 2 δ
As the parameter δ increases significantly, this probability approaches zero. Consequently, the intercept–resend attack becomes ineffective within this communication framework, thereby safeguarding the participants’ private inputs M i .
Case II: The entangle–measure attack
Eve might also execute an entangle–measure attack by entangling her auxiliary quantum particle e with the intercepted particles. This technique enables her to glean information by measuring her auxiliary particles. When Eve employs a unitary operation U to entangle her particle e with the four potential states { 0 , 1 , + , } , the resultant states are as follows:
U 0 e = u 00 0 e 00 + u 01 1 e 01
U 1 e = u 10 0 e 10 + u 11 1 e 11
U + e = 1 2 + u 00 e 00 + u 01 e 01 + u 10 e 10 + u 11 e 11   + 1 2 u 00 e 00 u 01 e 01 + u 10 e 10 u 11 e 11
U e = 1 2 + u 00 e 00 + u 01 e 01 u 10 e 10 u 11 e 11   + 1 2 u 00 e 00 u 01 e 01 u 10 e 10 + u 11 e 11
The coefficients must adhere to normalization conditions: u 00 2 + u 01 2 = 1 and u 10 2 + u 11 2 = 1 . For Eve’s attack to remain undetected, the following conditions need to be met.
u 01 = u 10 = 0 , u 00 e 00 = u 11 e 11
By substituting the results from Equation (12) into Equations (8)–(11), we obtain the following equation:
U 0 e = u 00 0 e 00
U 1 e = u 11 1 e 11 = u 00 1 e 00
U + e = 1 2 + u 00 e 00 + u 11 e 11 = u 00 + e 00 = u 11 + e 11
U e = 1 2 u 00 e 00 + u 11 e 11 = u 00 e 00 = u 11 e 11
Based on Equations (13)–(16), Eve’s auxiliary particles remain independent of the target particles to prevent introducing errors during eavesdropping detection. By measuring the auxiliary particles, Eve cannot obtain any information about the decoy photons.
We assume that Eve employs a unitary operation U to entangle her particle e with the j-th encrypted quantum state in E i ( R θ i , j 0   o r   R θ i , j 1 ), so we can derive the following relationship:
U R θ i , j 0 e i = U cos θ i , j 2 0 + sin θ i , j 2 1 e = 0 u 00 cos θ i , j 2 e 00 + u 01 sin θ i , j 2 e 10 + 1 u 10 cos θ i , j 2 e 01 + u 11 sin θ i , j 2 e 11 o r   U R θ i , j 1 e i = U sin θ i , j 2 0 + cos θ i , j 2 1 e = 0 u 00 sin θ i , j 2 e 00 + u 01 cos θ i , j 2 e 10 + 1 u 10 sin θ i , j 2 e 01 + u 11 cos θ i , j 2 e 11
By substituting the results from Equation (12) into Equation (17), we deduce that
U R θ i , j 0 e i = U * cos θ i , j 2 0 + sin θ i , j 2 1 e = u 00 cos θ i , j 2 0 e 00 + u 11 sin θ i , j 2 1 e 11 o r   U R θ i , j 1 e i = U * sin θ i , j 2 0 + cos θ i , j 2 1 e = u 00 sin θ i , j 2 0 e 00 + u 11 cos θ i , j 2 1 e 11
The measurement results of Equation (17) are related with the secret key Θ i that is disclosed to Eve, resulting in the fact that Eve cannot obtain the private inputs M i .
Case III: The man-in-the-middle attack
Eve might also execute a man-in-the-middle attack by intercepting the sequence E i transmitted from P i to the TP and preparing a fake sequence S E i instead of E i . S E i is sent to the TP. To evade the eavesdropping detection, Eve can prepare guessed decoy photons in specific states. Let D i represent the i-th decoy photon in E i , which may correspond to the j-th qubit in E i . Let D i denote the j-th qubit of S E i . The decoy photons D i and D i   are prepared in B = 0 , 1 and B = + , , respectively. When P i publishes the measurement basis of D i , Eve measures D i using basis B and obtains the results D i . The probability that D i = D i is as follows.
(1)
If B = B and D i = D i , then the probability that D i = D i is 1.
(2)
If B = B and D i D i , then the probability that D i = D i is 0.
(3)
If B B and D i = D i , then the probability that D i = D i is 1/2.
The probability of detecting the man-in-the-middle attack for a decoy photon is
P D i = D i = P D i = D i | B = B P B = B + P D i = D i | B B P B B   = 1 2 P D i = D i | B = B + P D i = D i | B B   = 1 2 P D i = D i | B = B , D i = D i P D i = D i + P D i = D i | B = B , D i D i P D i D i + 1 2   = 1 2 1 × 1 2 + 0 × 1 2 + 1 2 = 1 2
Since the δ decoy photons are included in E i , the man-in-the-middle attack will be detected with a probability of 1 1 2 δ . When δ is sufficiently large, this probability approached 1, making it impossible for the man-in-the-middle attack to succeed.
Case IV The Trojan horse attacks
Trojan horse attacks [64] are primarily categorized into two types: the invisible photon eavesdropping attack, where an eavesdropper uses undetectable photons to gather information about the transmitted quantum states, and the delay photon attack, in which an eavesdropper delays photons to manipulate communication between the parties. These attacks pose significant threats in quantum communication, particularly in bidirectional channels. However, the proposed protocol functions as a unidirectional cryptographic protocol, which inherently resists both types of Trojan horse attacks.
To conclude, any attempt at eavesdropping on the private information of the participants would be detectable, even if the outsider eavesdropper performs quantum-based attacks.

4.2.2. Participant Attacks

In this section, we will demonstrate that the proposed MQPC protocol is secure against attacks from the TP or the participants.
Case I: Security against attacks from the semi-honest party (TP)
In our protocol, the semi-honest third party (TP) adheres to the protocol rules while attempting to extract information from the private data of other parties. Although it cannot collude with dishonest parties, its actions require careful protocol design to ensure that the privacy of all participants is maintained. While the TP can apply the Ry (− Θ i ) operator on the encrypted quantum sequence E i to decrypt it using the secret key Θ i , aiming to recover the original quantum sequence S i related to the binary inputs M i and the secret non-zero binary key K, it cannot access the binary inputs M i without knowing the shared key K between the participants. The secret non-zero binary key K, shared among n participants through a multiparty quantum key agreement (MQKA) protocol, remains undisclosed to the TP.
To conclude, the private information of the participants will not be leaked, even if the semi-honest TP utilizes the received information to deduce private information.
Case II: Security against attacks from participants
In our protocol, each participant sends E i , which contains the encrypted quantum states and decoy photons, to the semi-honest third party (TP) via a quantum channel. If the quantum channel is secure, participant P i   announces their secret key Θ i to the TP. Each participant can act as Eve to eavesdrop on the private information of others using quantum-based attacks. However, eavesdropping detection calculated by the ratio of incorrect measurements to the total number of measurements prevents participants from stealing the private inputs M i . Additionally, the secret key Θ i   will only be announced if the eavesdropping detection is successful.
Even if the participants know the secret non-zero binary key K and attempt to intercept E i sent to the TP, they cannot pass the eavesdropping detection; the protocol will restart if any eavesdropping is detected. Furthermore, even if some participants collude, they cannot access another participant’s inputs because they do not know the position and measurement bases of the decoy photons or the secret key Θ i .
In conclusion, the participants’ inputs remain confidential, even if some participants collude to attempt to steal another participant’s inputs.

4.3. Fairness

Fairness is a fundamental aspect of secure computation protocols, ensuring that all participants have equal access to the results of the comparison process. In the proposed QPC protocol, the role of the third party (TP) is crucial in maintaining this fairness. By publishing the comparison results simultaneously, the TP prevents any participant from gaining an undue advantage over others. This simultaneous access eliminates the opportunity for one participant to act on the results before the others, thereby fostering an equitable environment. Consequently, the proposed protocol effectively addresses the critical issue of fairness through the strategic role of the trusted party, ensuring that all participants are treated equally throughout the comparison process.

5. Discussion

The calculation of qubit efficiency [58] in the proposed QPC protocol focuses solely on the resources directly utilized for the comparison of private data, which can be defined as follows:
η e = η c η t
where η c denotes the length of binary representations M i , and η t denotes the qubits consumed during the comparison process, excluding those allocated for eavesdropping detection and quantum key distribution. In this protocol, comparing an L-bit classical binary message requires preparing nL qubits as quantum resources; thus, we can obtain η c = L and η t = n L . Consequently, the qubit efficiency of the proposed protocol is η e = η c η t = L n L .
A comparative analysis of the proposed MQPC protocol against previous protocols is summarized in Table 1. The protocol demonstrates improvements in the following areas.
Firstly, unlike the protocols proposed in Refs. [55,56,57,58,59], which require the preparation of intricate high-dimensional quantum states, including n-particle GHZ class states or d-dimensional quantum states, posing significant challenges in implementation, our protocol simplifies these requirements. It does not necessitate the preparation of complex quantum states and instead utilizes single photons as quantum resources. This design makes it easily implementable with current quantum technologies due to the straightforward preparation of single photons.
Secondly, some existing MQPC protocols necessitate complex quantum technologies, such as the entanglement correlation of n-particles [55], the quantum entanglement swapping of d-level quantum states [58,59], and unitary operations for d-level quantum states [56], which are difficult to implement with current technologies. In contrast, our protocol employs rotation operations performed on single photons, which are readily implementable with existing quantum technologies.
Thirdly, our protocol utilizes single-particle measurements instead of d-level quantum state measurements, aligning it with current technical feasibility.
Although the qubit efficiency of our protocol is identical to that of Refs. [55,56] and requires the sharing of a secret key, it demonstrates superior performance due to the easier-to-implement quantum technologies used, particularly in terms of quantum resources, unitary operations, and quantum measurements.

6. Conclusions

In this paper, we propose a multiparty quantum private comparison (MQPC) protocol based on rotation operations to facilitate the comparison of equality relationships among n participants while preserving the confidentiality of their inputs. In this protocol, each participant’s inputs are encoded into single photons, which serve as easier-to-implement quantum resources. Rotation operations are employed for the encryption and decryption of these single photons, while Z-basis measurements are used to obtain comparison results. This design aligns the proposed protocol with current technical feasibility while providing a robust mechanism for protecting the privacy of participants’ inputs. Compared to existing MQPC frameworks that rely on complex quantum technologies, such as the entanglement correlation of n-particles, quantum entanglement swapping of d-level quantum states, and unitary operations for d-level quantum states, our protocol demonstrates significant advancements in practicality due to the simplicity of single photons, rotation operations, and Z-basis measurements. An illustrative example demonstrates the readability of the proposed protocol. The security analysis shows that the use of rotation operations and decoy photons provides a robust mechanism for protecting the privacy of the participants’ inputs, making the protocol resistant to outsider eavesdropping and participant attacks. Additionally, the protocol meets the requirement of fairness, as all participants access the comparison results simultaneously. However, since all participants in our protocol must possess full quantum capabilities to perform the equality comparison, there is an increased demand for quantum resources. Under current quantum technology conditions, not all users can afford the high cost associated with complete quantum equipment. In the future, we will focus on developing the MQPC protocol to compare size relations among n participants and designing semi-quantum privacy comparison protocols [39].

Author Contributions

Conceptualization, M.H.; methodology, M.H.; writing—original draft, M.H.; writing—review and editing, Y.W.; supervision, M.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Open Fund of Network and Data Security Key Laboratory of Sichuan Province (Grant No. NDS2024-1) and Gongga Plan for the “Double World-class Project”.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, 10–12 December 1984; pp. 175–179. [Google Scholar]
  2. Zhang, W.; van Leent, T.; Redeker, K.; Garthoff, R.; Schwonnek, R.; Fertig, F.; Eppelt, S.; Rosenfeld, W.; Scarani, V.; Lim, C.C.-W.; et al. A device-independent quantum key distribution system for distant users. Nature 2022, 607, 687–691. [Google Scholar] [CrossRef] [PubMed]
  3. Nadlinger, D.P.; Drmota, P.; Nichol, B.C.; Araneda, G.; Main, D.; Srinivas, R.; Lucas, D.M.; Ballance, C.J.; Ivanov, K.; Tan, E.Y.-Z.; et al. Experimental quantum key distribution certified by Bell’s theorem. Nature 2022, 607, 682–686. [Google Scholar] [CrossRef] [PubMed]
  4. Li, W.; Zhang, L.; Tan, H.; Lu, Y.; Liao, S.-K.; Huang, J.; Li, H.; Wang, Z.; Mao, H.-K.; Yan, B.; et al. High-rate quantum key distribution exceeding 110 Mb s−1. Nat. Photon. 2023, 17, 416–421. [Google Scholar] [CrossRef]
  5. Basset, F.B.; Valeri, M.; Roccia, E.; Muredda, V.; Poderini, D.; Neuwirth, J.; Spagnolo, N.; Rota, M.B.; Carvacho, G.; Sciarrino, F.; et al. Quantum key distribution with entangled photons generated on demand by a quantum dot. Sci. Adv. 2021, 7, eabe6379. [Google Scholar] [CrossRef]
  6. Zahidy, M.; Ribezzo, D.; De Lazzari, C.; Vagniluca, I.; Biagi, N.; Müller, R.; Occhipinti, T.; Oxenløwe, L.K.; Galili, M.; Hayashi, T.; et al. Practical high-dimensional quantum key distribution protocol over deployed multicore fiber. Nat. Commun. 2024, 15, 1651. [Google Scholar] [CrossRef]
  7. Huang, X.; Zhang, S.-B.; Chang, Y.; Qiu, C.; Liu, D.-M.; Hou, M. Quantum Key Agreement Protocol Based on Quantum Search Algorithm. Int. J. Theor. Phys. 2021, 60, 838–847. [Google Scholar] [CrossRef]
  8. Lin, S.; Zhang, X.; Guo, G.-D.; Wang, L.-L.; Liu, X.-F. Multiparty quantum key agreement. Phys. Rev. A 2021, 104, 042421. [Google Scholar] [CrossRef]
  9. Huang, X.; Zhang, S.; Chang, Y.; Yang, F.; Hou, M.; Cheng, W. Quantum secure direct communication based on quantum homomorphic encryption. Mod. Phys. Lett. A 2021, 36, 21502631. [Google Scholar] [CrossRef]
  10. Sheng, Y.B.; Zhou, L.; Long, G.L. One-step quantum secure direct communication. Sci. Bull. 2022, 67, 367–374. [Google Scholar]
  11. Ying, J.W.; Wang, J.Y.; Xiao, Y.X.; Gu, S.P.; Wang, X.F.; Zhong, W.; Du, M.M.; Li, X.Y.; Shen, S.T.; Zhang, A.L.; et al. Passive-state preparation for quantum secure direct communication. Sci. China Phys. Mech. Astron. 2025, 68, 240312. [Google Scholar]
  12. Chen, Y.; Situ, H.; Huang, Q.; Zhang, C. A novel quantum private set intersection scheme with a semi-honest third party. Quantum Inf. Process. 2023, 22, 429. [Google Scholar] [CrossRef]
  13. Huang, X.; Zhang, W.; Zhang, S. Quantum multi-party private set intersection using single photons. Phys. A Stat. Mech. Its Appl. 2024, 649, 129974. [Google Scholar] [CrossRef]
  14. Hou, M.; Wu, Y.; Zhang, S. Quantum Private Set Intersection Scheme Based on Bell States. Axioms 2025, 14, 120. [Google Scholar] [CrossRef]
  15. Yao, A.C. Protocols for secure computations. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science (FOCS’ 82), Washington, DC, USA, 3–5 November 1982; p. 160. [Google Scholar]
  16. Boudot, F.; Schoenmakers, B.; Traoré, J. A fair and efficient solution to the socialist millionaires’ problem. Discret. Appl. Math. 2001, 111, 23–36. [Google Scholar] [CrossRef]
  17. Lo, H.-K. Insecurity of quantum secure computations. Phys. Rev. A 1997, 56, 1154–1162. [Google Scholar] [CrossRef]
  18. Shor, P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Rev. 1999, 41, 303–332. [Google Scholar] [CrossRef]
  19. Yang, Y.-G.; Wen, Q.-Y. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 2009, 42, 055305. [Google Scholar] [CrossRef]
  20. Huang, X.; Chang, Y.; Cheng, W.; Hou, M.; Zhang, S.-B. Quantum private comparison of arbitrary single qubit states based on swap test. Chin. Phys. B 2022, 31, 040303. [Google Scholar] [CrossRef]
  21. Hou, M.; Wu, Y. Single-photon-based quantum secure protocol for the socialist millionaires’ problem. Front. Phys. 2024, 12, 1364140. [Google Scholar] [CrossRef]
  22. Liu, B.; Gao, F.; Jia, H.-Y.; Huang, W.; Zhang, W.-W.; Wen, Q.-Y. Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 2012, 12, 887–897. [Google Scholar] [CrossRef]
  23. Hou, M.; Wu, Y. Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption. Appl. Sci. 2025, 15, 722. [Google Scholar] [CrossRef]
  24. Liu, B.; Xiao, D.; Huang, W.; Jia, H.-Y.; Song, T.-T. Quantum private comparison employing single-photon interference. Quantum Inf. Process. 2017, 16, 180. [Google Scholar] [CrossRef]
  25. Kou, T.Y.; Che, B.C.; Dou, Z.; Chen, X.B.; Lai, Y.P.; Li, J. Efficient quantum private comparison protocol utilizing single photons and rotational encryption. Chin. Phys. B 2022, 31, 060307. [Google Scholar]
  26. Pan, H.M. Two-party quantum private comparison using single photons. Int. J. Theor. Phys. 2018, 57, 3389–3395. [Google Scholar]
  27. Wen, L.; Wang, Y.B.; Wei, C. Quantum private comparison protocol based on Bell entangled states. Commun. Theor. Phys. 2012, 57, 583. [Google Scholar]
  28. Tseng, H.-Y.; Lin, J.; Hwang, T. New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 2012, 11, 373–384. [Google Scholar] [CrossRef]
  29. Hou, M.; Wu, Y. New Quantum Private Comparison Using Bell States. Entropy 2024, 26, 682. [Google Scholar] [CrossRef]
  30. Huang, X.; Zhang, S.-B.; Chang, Y.; Hou, M.; Cheng, W. Efficient Quantum Private Comparison Based on Entanglement Swapping of Bell States. Int. J. Theor. Phys. 2021, 60, 3783–3796. [Google Scholar] [CrossRef]
  31. Lang, Y.F. Quantum private comparison using single bell state. Int. J. Theor. Phys. 2021, 60, 4030–4036. [Google Scholar]
  32. Lang, Y.F. Quantum gate-based quantum private comparison. Int. J. Theor. Phys. 2020, 59, 833–840. [Google Scholar]
  33. Hou, M.; Wu, Y. Efficient Quantum Private Comparison with Unitary Operations. Mathematics 2024, 12, 3541. [Google Scholar] [CrossRef]
  34. Hou, M.; Wu, Y.; Zhang, S. Efficient Quantum Private Comparison Based on GHZ States. Entropy 2024, 26, 413. [Google Scholar] [CrossRef] [PubMed]
  35. Huang, X.; Zhang, S.B.; Cheng, W. Quantum Private Comparison Based on GHZ-type States. In Proceedings of the 2021 IEEE AFRICON, Arusha, Tanzania, 13–15 September 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–4. [Google Scholar]
  36. Ye, T.Y.; Ji, Z.X. Two-party quantum private comparison with five-qubit entangled states. Int. J. Theor. Phys. 2017, 56, 1517–1529. [Google Scholar]
  37. Sun, Q. Quantum private comparison with six-particle maximally entangled states. Mod. Phys. Lett. A 2022, 37, 22501498. [Google Scholar] [CrossRef]
  38. Ji, Z.X.; Zhang, H.G.; Fan, P.R. Two-party quantum private comparison protocol with maximally entangled seven-qubit state. Mod. Phys. Lett. A 2019, 34, 1950229. [Google Scholar]
  39. Fan, P.; Rahman, A.U.; Ji, Z.; Ji, X.; Hao, Z.; Zhang, H. Two-party quantum private comparison based on eight-qubit entangled state. Mod. Phys. Lett. A 2022, 37, 22500262. [Google Scholar] [CrossRef]
  40. Ji, Z.; Zhang, H.; Wang, H. Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States. IEEE Access 2019, 7, 44613–44621. [Google Scholar] [CrossRef]
  41. Jia, H.Y.; Wen, Q.Y.; Li, Y.B.; Gao, F. Quantum private comparison using genuine four-particle entangled states. Int. J. Theor. Phys. 2012, 51, 1187–1194. [Google Scholar]
  42. Pan, H.M. Quantum Private Comparison Based on χ-Type Entangled States. Int. J. Theor. Phys. 2017, 56, 3340–3347. [Google Scholar] [CrossRef]
  43. Ji, Z.X.; Ye, T.Y. Quantum private comparison of equal information based on highly entangled six-qubit genuine state. Commun. Theor. Phys. 2016, 65, 711. [Google Scholar]
  44. Sun, Z.; Long, D. Quantum Private Comparison Protocol Based on Cluster States. Int. J. Theor. Phys. 2012, 52, 212–218. [Google Scholar] [CrossRef]
  45. Li, C.; Chen, X.; Li, H.; Yang, Y.; Li, J. Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state. Quantum Inf. Process. 2019, 18, 158. [Google Scholar] [CrossRef]
  46. Chang, Y.; Zhang, W.-B.; Zhang, S.-B.; Wang, H.-C.; Yan, L.-L.; Han, G.-H.; Sheng, Z.-W.; Huang, Y.-Y.; Suo, W.; Xiong, J.-X. Quantum Private Comparison of Equality Based on Five-Particle Cluster State. Commun. Theor. Phys. 2016, 66, 621–628. [Google Scholar] [CrossRef]
  47. Zha, X.W.; Yu, X.Y.; Cao, Y.; Wang, S.K. Quantum private comparison protocol with five-particle cluster states. Int. J. Theor. Phys. 2018, 57, 3874–3881. [Google Scholar]
  48. Zhou, M.K. Improvements of quantum private comparison protocol based on cluster states. Int. J. Theor. Phys. 2018, 57, 42–47. [Google Scholar] [CrossRef]
  49. Xu, G.A.; Chen, X.B.; Wei, Z.H.; Li, M.J.; Yang, Y.X. An efficient protocol for the quantum private comparison of equality with a four-qubit cluster state. Int. J. Quantum Inf. 2012, 10, 1250045. [Google Scholar]
  50. Hou, M.; Wu, Y. Quantum Private Comparison Protocol with Cluster States. Axioms 2025, 14, 70. [Google Scholar] [CrossRef]
  51. Lin, S.; Sun, Y.; Liu, X.-F.; Yao, Z.-Q. Quantum private comparison protocol with d-dimensional Bell states. Quantum Inf. Process. 2012, 12, 559–568. [Google Scholar] [CrossRef]
  52. Guo, F.Z.; Gao, F.; Qin, S.J.; Zhang, J.; Wen, Q.Y. Quantum private comparison protocol based on entanglement swapping of d-level Bell states. Quantum Inf. Process. 2013, 12, 2793–2802. [Google Scholar] [CrossRef]
  53. Yu, C.H.; Guo, G.D.; Lin, S. Quantum private comparison with d-level single-particle states. Phys. Scr. 2013, 88, 065013. [Google Scholar] [CrossRef]
  54. Wu, W.Q.; Zhao, Y.X. Quantum private comparison of size using d-level Bell states with a semi-honest third party. Quantum Inf. Process. 2021, 20, 155. [Google Scholar] [CrossRef]
  55. Chang, Y.-J.; Tsai, C.-W.; Hwang, T. Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 2013, 12, 1077–1088. [Google Scholar] [CrossRef]
  56. Liu, W.; Wang, Y.B.; Wang, X.M. Multi-party quantum private comparison protocol using d-dimensional basis states without entanglement swapping. Int. J. Theor. Phys. 2014, 53, 1085–1091. [Google Scholar]
  57. Wang, Q.L.; Sun, H.X.; Huang, W. Multi-party quantum private comparison protocol with n-level entangled states. Quantum Inf. Process. 2014, 13, 2375–2389. [Google Scholar] [CrossRef]
  58. Ji, Z.X.; Yu, Y.T. Multi-party quantum private comparison based on the entanglement swapping of d-level cat states and d-level Bell states. Quantum Inf. Process. 2017, 16, 177. [Google Scholar] [CrossRef]
  59. Ye, T.Y.; Hu, J.L. Multi-party quantum private comparison based on entanglement swapping of Bell entangled states within d-level quantum system. Int. J. Theor. Phys. 2021, 60, 1471–1480. [Google Scholar] [CrossRef]
  60. Huang, X.; Zhang, W.; Zhang, S. Practical quantum protocols for blind millionaires’ problem based on rotation encryption and swap test. Phys. A Stat. Mech. Its Appl. 2024, 637, 129614. [Google Scholar] [CrossRef]
  61. Cao, H.; Ma, W. Multiparty Quantum Key Agreement Based on Quantum Search Algorithm. Sci. Rep. 2017, 7, srep45046. [Google Scholar] [CrossRef]
  62. Lin, J.; Tseng, H.-Y.; Hwang, T. Intercept–resend attacks on Chen et al.’s quantum private comparison protocol and the improvements. Opt. Commun. 2011, 284, 2412–2414. [Google Scholar] [CrossRef]
  63. Huang, X.; Zhang, S.; Xia, J. Efficient Quantum Private Comparison Using Locally Indistinguishable Orthogonal Product States. In International Conference on Artificial Intelligence and Security, Proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, 15–20 July 2022; Springer International Publishing: Cham, Switzerland, 2022; pp. 260–273. [Google Scholar]
  64. Yang, X.; Wei, K.; Ma, H.; Sun, S.; Du, Y.; Wu, L. Trojan horse attacks on counterfactual quantum key distribution. Phys. Lett. A 2016, 380, 1589–1592. [Google Scholar] [CrossRef]
Table 1. A comparison between the proposed MQPC protocol and previous protocols.
Table 1. A comparison between the proposed MQPC protocol and previous protocols.
Protocol Quantum
Resource Used
Unitary
Operation
for Users
Quantum
Technology Used
Key Sharing Quantum
Measurement
for Users
Quantum
Measurement
for TP
Qubit
Efficiency
Ref. [55]n-particle GHZ class
states
NoThe entanglement
correlation
NoSingle particle No L n L
Ref. [56]d-dimensional basis stateYesQuantum Fourier
transform and unitary
operation
NoNod-level single particle L n L
Ref. [57]d-level n-particle
entangled state and
d-level two-particle
entangled state
NoQuantum Fourier
transform
Nod-level single particle d-level single particle L 3 n L
Ref. [58]d-level n + 1-particle cat
state and
d-level
two-particle Bell state
YesQuantum entanglement
swapping
Nod-level two-particle Bell
state
d-level n + 1-particle cat
state
L 3 n L + L
Ref. [59]d-level two-particle Bell
entangled state
YesQuantum entanglement
swapping and unitary
operation
Nod-level two-particle Bell
entangled state
d-level two-particle Bell
entangled state
L 2 n L + 2 L
OursSingle photonsYesRotation operationYesNoZ-basis L n L
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hou, M.; Wu, Y. Multiparty Quantum Private Comparison Using Rotation Operations. Axioms 2025, 14, 274. https://doi.org/10.3390/axioms14040274

AMA Style

Hou M, Wu Y. Multiparty Quantum Private Comparison Using Rotation Operations. Axioms. 2025; 14(4):274. https://doi.org/10.3390/axioms14040274

Chicago/Turabian Style

Hou, Min, and Yue Wu. 2025. "Multiparty Quantum Private Comparison Using Rotation Operations" Axioms 14, no. 4: 274. https://doi.org/10.3390/axioms14040274

APA Style

Hou, M., & Wu, Y. (2025). Multiparty Quantum Private Comparison Using Rotation Operations. Axioms, 14(4), 274. https://doi.org/10.3390/axioms14040274

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop