Next Article in Journal
Spheres of Strings Under the Levenshtein Distance
Previous Article in Journal
On Ricci Solitons and Curvature Properties of Doubly Warped Products with QSMC
Previous Article in Special Issue
Theoretical Proof of and Proposed Experimental Search for the Ground Triplet State of a Wigner-Regime Two-Electron ‘Artificial Atom’ in a Magnetic Field
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Two-Party Quantum Private Comparison with Pauli Operators

1
School of Computer Science, Sichuan University Jinjiang College, Meishan 620860, China
2
Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu 610054, China
3
State Key Laboratory of Cognitive Intelligence, Hefei 230088, China
4
College of Artificial Intelligence (CUIT Shuangliu Industrial College), Chengdu University of Information Technology, Chengdu 610225, China
5
Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu 610225, China
*
Author to whom correspondence should be addressed.
Axioms 2025, 14(8), 549; https://doi.org/10.3390/axioms14080549
Submission received: 10 June 2025 / Revised: 8 July 2025 / Accepted: 18 July 2025 / Published: 22 July 2025
(This article belongs to the Special Issue Recent Advances in Quantum Mechanics and Mathematical Physics)

Abstract

Quantum private comparison (QPC) is a quantum cryptographic protocol designed to enable two mutually distrustful parties to securely compare sensitive data without disclosing their private information to each other or any external entities. This study proposes a novel QPC protocol that leverages Bell states to ensure data privacy, utilizing the fundamental principles of quantum mechanics. Within this framework, two participants, each possessing a secret integer, encode the binary representation of their values using Pauli-X and Pauli-Z operators applied to quantum states transmitted from a semi-honest third party (TP). The TP, which is bound to protocol compliance and prohibited from colluding with either participant, measures the received sequences to determine the comparison result without accessing the participants’ original inputs. Theoretical analyses and simulations validate the protocol’s strong security, high efficiency, and practical feasibility in quantum computing environments. An advantage of the proposed protocol lies in its optimized utilization of Bell states, which enhances qubit efficiency and experimental practicality. Moreover, the proposed protocol outperforms several existing Bell-state-based QPC schemes in terms of efficiency.

1. Introduction

Secure multiparty computation (MPC) is a cryptographic technique, enabling multiple mutually distrustful parties to collaboratively compute a function over their private inputs while ensuring that no party accesses the confidential data of others [1]. Private comparison, an important branch of MPC, originated from Yao’s millionaire problem [2], in which two millionaires meeting on the street desire to ascertain who has greater wealth without revealing their actual financial status to one another. Inspired by the millionaire problem, Boudot et al. [3] introduced a variation called the socialist millionaire problem, where two millionaires determine whether their wealth is equal without disclosing the exact amounts. Thus, solving the millionaire problem (designing privacy comparison protocols) has become a focal point in both classical and quantum cryptography fields.
Lo [4] pointed out that the inherent impossibility of securely evaluating a two-party function without compromising privacy in a purely bilateral framework is a critical challenge when designing privacy comparison protocols. To address this challenge, researchers have proposed incorporating a semi-honest third party (TP). Acting as a semi-trusted intermediary, the TP facilitates the secure comparison of private inputs but cannot collude with any participating parties.
The security of classical cryptographic protocols, regardless of those for privacy comparison and others, primarily rely on computationally hard mathematical problems such as integer factorization and discrete logarithms, which cannot be efficiently solved using classical computational resources under current conditions. Unfortunately, the emergence of quantum algorithms implemented on quantum computing platforms presents a substantial challenge to the security of classical cryptographic protocols. For example, Shor algorithm [5] leverages the parallelism of quantum computing and the superposition property of quantum states to reduce the complexity of solving these hard mathematical problems from exponential scale in classical computers to polynomial time. Consequently, once quantum computing matures sufficiently, existing cryptographic systems may become vulnerable. It is imperative to develop quantum-resistance protocols that are resilient to threats posed by quantum algorithms.
In response, researchers have investigated quantum-resistance protocols that integrate classical and quantum mechanics. These include quantum secret sharing [6,7,8], quantum key agreement [9,10,11], quantum secure direct communication [12,13,14,15], quantum private set intersection [16,17] and quantum secure multiparty computation (QMPC) [18]. The security of these quantum-resistance protocols is based on the principles of quantum mechanics, thereby resisting threats from quantum algorithms.
Quantum private comparison (QPC), a crucial branch of QMPC, enables parties to compare their confidential inputs without revealing each other’s confidential data. In 2009, Yang and Wen [19] proposed the first QPC protocol, which utilized decoy photons and a one-way hash function to ensure security and confidentiality during the comparison process. Subsequent advancements by Tseng et al. [20] introduced a Bell-state-based QPC protocol that achieves a qubit efficiency of 50% by utilizing the two-particle entanglement correlation of Bell states. However, this protocol is vulnerable to attacks from the TP attempting to steal participants’ private inputs by exploiting fake Bell states. To enhance its security, two feasible solutions are proposed in Ref. [21]. Lang [22] designed the QPC protocol that utilizes the quantum CNOT gate instead of classical exclusive-OR operations to facilitate comparison, but it cannot prevent the disturbance attack implemented by an outsider eavesdropper and the TP’s measuring attack [23]. Huang et al. [24] designed the protocol by utilizing the entanglement swapping among three Bell states. Although it can compare three bits in each round, it is difficult to implement with the current technologies due to the effects of decoherence and environmental noise. Lang et al. [25] developed the protocol using a single Bell state, reducing the states generation switching costs but lowering qubit efficiency to 16.67%. Hou et al. [26] developed a protocol that encodes private inputs into Bell states using rotation operations, achieving a qubit efficiency of 25%. Similarly, Hou and Wu [27] employed a comparable method to encode private inputs into Bell states using unitary operations.
Additionally, various quantum states have been explored as carriers of quantum information for transmitting private data. These states include single photons [28,29,30,31,32,33], multi-qubit entangled states [34,35,36,37,38,39], cluster states [40,41], and d-level quantum states [42,43,44,45]. Among these, protocols that utilize simplified quantum resources (e.g., single photons and Bell states) are more feasible and practical than those relying on multi-qubit and d-level quantum states, due to the ease of operation and manipulation of single photons and Bell states. Despite the advantages of Bell states, many existing Bell-state-based QPC protocols face challenges in achieving high qubit efficiency, with many achieving less than 50%.
Inspired by the aforementioned Bell-state-based QPC protocols and with the aim of enhancing their efficiency, we propose a novel approach that utilizes Bell states and Pauli operators to design a QPC protocol. The primary contributions of this work are as follows.
(1)
By transmitting private information as Pauli operators applied to Bell states, the proposed protocol is more practical and efficient than those that rely on multi-qubit and d-level quantum states.
(2)
The protocol achieves a qubit efficiency of 50%, requiring one Bell state and a bit of pre-shared key for each bit compared. This efficiency surpasses that of many existing Bell-state-based QPC protocols.
(3)
By simulating a concrete example using IBM Quantum Qiskit simulator with a designed quantum circuit, the feasibility of the protocol has been validated.
(4)
Security analyses confirm the protocol’s resilience against both external attacks and insider threats.
The remainder of this paper is organized as follows: Section 2 introduces the Pauli operators and Bell states used in the protocol. Section 3 and Section 4 detail the implementation steps of the proposed protocol and the simulations conducted via IBM Quantum Qiskit simulator, respectively. Section 5 presents a security analysis of the protocol. Section 6 discusses the findings, and Section 7 concludes the paper by summarizing the contributions and exploring potential future directions.

2. Pauli Operators and Bell States

The Pauli-X and Pauli-Z operators [46] are single-qubit gates that are mathematically defined as
X = 0 1 1 0 , Z = 1 0 0 1
Four Bell states are given by
φ + = 1 2 0 0 + 1 1
φ = 1 2 0 0 1 1
ψ + = 1 2 0 1 + 1 0
ψ = 1 2 0 1 1 0
When applying the operations X a 1 Z a 2 and X b 1 Z b 2 (where a 1 , a 2 , b 1 , b 2 0,1 ) to four Bell states, the resulting states are shown in Table 1.
According to Table 1, we find that the Bell states remain unchanged if and only if the same operations are performed on both the first and second particles of the Bell states. This property is crucial for the design of the proposed protocol that follows.

3. The Implementation Steps of the Proposed Protocol

The primary objective of the quantum private comparison (QPC) protocol is to determine whether the confidential inputs X and Y, held by Alice and Bob respectively, are equivalent. This comparison is facilitated by a semi-honest third party (TP), which complies with the protocol but is restricted from colluding with either participant. Crucially, the protocol ensures that neither Alice nor Bob leaks any information about their private inputs to each other or external adversaries.
The protocol assumes a noiseless and lossless quantum channel to guarantee the integrity of quantum state transmissions. Prior to execution, Alice and Bob convert their secrets into n-bit binary strings, denoted as X = x n 1 ,   x n 2 , , x 0 and Y = y n 1 ,   y n 2 , , y 0 , where x i , y i 0,1   for   i = 0,1 , , n 1 . If the length of X or Y is shorter than n, zeros are appended to the higher-order bits. The parameter n, determined by security requirements, is publicly disclosed to the TP. Subsequently, Alice and Bob employ a quantum key distribution (QKD) protocol (e.g., BB84 [47]) to establish a shared secret key K A B = k n k n 1 k 0 , restructured as K A B = k n / 2 1 , k n / 2 2 , , k 0 , where k j = k 2 j + 1 k 2 j for j = 0,1 , , n / 2 2 , n / 2 1 .
Protocol Execution:
Step 1. Alice and Bob partition X and Y into n / 2 groups, where ⌈·⌉ is the ceiling function. If n is odd, a padding bit (0) is added to the final group to ensure uniform group sizes of two bits.
Step 2. The TP prepares n / 2 Bell states, randomly selected from the set defined in Equations (2)–(5). These states are divided into two sequences: S A (first particles) and S B (second particles). For security validation, the TP generates decoy-photon sequences D A and D B , composed of randomly chosen states from 0 , 1 , + , . All decoy photons in D A and D B are inserted into S A and S B , forming modified sequences S A and S B , which are transmitted to Alice and Bob, respectively.
Step 3. Upon receiving S A ( S B ), Alice (Bob) acknowledges receipt. The TP then discloses the positions and measurement bases (Z-basis for 0   o r   1 ; X-basis for +   o r   ) of the decoy photons. Alice (Bob) measures the decoy photons in D A ( D B ) , obtaining results R A ( R B ) , which are returned to the TP for error rate calculation. If the error rate exceeds a predefined threshold τ = 2 8.9 %   depending on the channel situation (e.g., the distance, etc.) [48,49], the protocol is terminated and restarted; otherwise, it proceeds to the next step.
Step 4. After removing decoy photons D A ( D B ) from S A ( S B ), Alice (Bob) applies operations X a 2 j + 1 Z a 2 j ( X b 2 j + 1 Z b 2 j ) to S A ( S B ), where a 2 j + 1 = x 2 j + 1 k 2 j + 1 and a 2 j = x 2 j k 2 j (similar for b 2 j + 1 ,   b 2 j ). The resulting sequences U A ( U B ) are embedded with new decoy-photon sequence D A D B , forming G A G B , which are sent to the TP.
Step 5. The TP verifies eavesdropping using the aforementioned decoy-photon method in Step 2. If secure, the TP removes D A D B from G A G B and performs Bell-state measurements on U A and U B . A match between the measurement results R T and the initially prepared Bell states confirms X = Y ; otherwise, X Y .

4. Simulations for Two Concrete Examples

Example 1.
Comparison of the equality of the secret integers  X 0 = 54  and  Y 0 = 22 .
The binary representations of X 0 and Y 0   are X 0 = ( 1,1 , 0,1 , 1,0 ) and Y 0 = ( 1,0 , 1,1 , 0 ) , respectively. The length of the strings is set to 6. Since the length of Y 0 is shorter than 6, zeros are appended to the higher-order bits, resulting in the restructured binary representation of Y 0   as Y 0 = ( 0 ,   1,0 , 1,1 , 0 ) . Alice and Bob partition them into three 2-bit groups: X 0 = ( 11,01,10 ) and Y 0 = ( 01,01,10 ) . Let the shared secret key K A B = 1,1 , 0,0 , 0,1 = ( 11,00,01 ) . The initial preparation includes three Bell states: ψ , ψ + , φ .
The quantum circuit implementation of these three Bell states   ψ , ψ + , φ is composed of Hadamard and CNOT gates, as shown in Figure 1. The left half of Figure 1 separated by barrier lines is for preparing Bell states, while the right half is for measuring Bell states using Z basis. The measurement results of the three Bell states, obtained using the IBM Quantum Qiskit simulator (Qiskit: 0.44.1; Python: 3.11.4; OS: Windows) with 1024 shots, are displayed in Figure 2.
Based on X 0 , Y 0 and K A B , the corresponding operations on the three Bell states ψ , ψ + , φ are { I I X I , I Z I Z, XZ XZ}. The quantum circuit implementation for comparing the equality of the secret integers X 0 = 54 and Y 0 = 22 is shown in Figure 3, and the results of its probability measurements are presented in Figure 4.
According to the bar chart in Figure 4, the measurement results of the computational basis states do not match those in Figure 2. This indicates that the measurement outcomes do not align with the initially prepared Bell states. Consequently, we can conclude that X 0 Y 0 .
Example 2.
Comparison of the equality of the secret integers  X 1 = 63  and  Y 1 = 63 .
The binary representations of X 1 and Y 1   are X 1 = ( 1,1 , 1,1 , 1,1 ) and Y 1 = ( 1,1 , 1,1 , 1,1 ) , respectively. Alice and Bob partition them into three 2-bit groups: X 1 = ( 11,11,11 ) and Y 1 = ( 11,11,11 ) . Let the shared secret key   K A B = 1,1 , 0,0 , 0,1 = 11,00,01 . The initial preparation includes three Bell states: ψ , ψ + , φ .
Based on X 1 , Y 1 and K A B , the corresponding operations on three Bell states ψ , ψ + , φ are { I I I I, XZ XZ, X I X I }. The quantum circuit implementation for comparing the equality of the secret integers X 1 = 63 and Y 1 = 63 is shown in Figure 5, and the results of its probability measurements are presented in Figure 6.
According to the bar chart in Figure 6, the measurement results of the computational basis states are identical to those in Figure 2, although the counts of each computational basis state may differ due to the influence of noise and decoherence. This result indicates that the measurement results align with the initially prepared Bell states. Consequently, we can conclude that X 1 = Y 1 .
Although we utilize two example simulation experiments to demonstrate the feasibility of the proposed protocol, its scalability when comparing multiple bits remains unaffected. It has been reported that Zuchongzhi 3.0 [50], a superconducting quantum computer prototype comprising 105 qubits and achieving high operational fidelities, was constructed in 2025. As the number of available qubits increases, our protocol can further demonstrate its scalability on actual quantum hardware.

5. Security Analysis

In the execution of the protocol, the entanglement correlation between particles in Bell states is utilized to ensure the security of the particle distribution phase. The insertion of decoy photons into the particles, along with the implementation of quantum key distribution for sharing a pre-shared key, enhances security during the information transfer phase. In this section, we demonstrate that the proposed protocol is resilient against both external and participant attacks.

5.1. External Attacks

When quantum sequences are transmitted through a quantum channel, an external eavesdropper, often referred to as Eve, may employ quantum-attack strategies to compromise the private inputs. The primary quantum attack strategies include intercept-measure-resend [51], entangle-measure [52], man-in-the-middle [53], and quantum Trojan-Horse attacks [54]. We will analyze whether the proposed protocol is secure against these quantum attack strategies as follows.

5.1.1. Intercept-Measure-Resend Attack

In the proposed QPC protocol, the intercept-measure-resend attack refers to Eve intercepting the quantum sequences G A   and G B , measuring them with Z-basis or X-basis, and resending the modified sequences to the TP. Unfortunately, this attack faces significant challenges due to the lack of information regarding the inserted positions and measurement bases of the decoy photons. These specific details will be disclosed when the TP receives the sequences.
As an example, consider a decoy photon prepared in the state 1 . When Eve measures this decoy photon using the Z basis ( 0 , 1 ), she successfully passes the eavesdropping detection. Conversely, when she measures the decoy photon using the X basis ( + , ), she passes the eavesdropping detection with a probability of 50%, since 0 and 1 are equal superpositions of + and . The choice between the Z basis and the X basis occurs with equal probability, each having a 50% chance. Thus, the probability of choosing the X basis and passing the eavesdropping detection is 1 2 × 1 + 1 2 × 1 2 = 3 4 . Consequently, for each decoy photon, Eve has a 3/4 probability of successfully performing the intercept-measure-resend attack. However, for d decoy photons, the detection probability becomes 1 3 4 d . The relationship between the number of decoy photons and the detection probability is illustrated in Figure 7.
According to the results presented in Figure 7, when d = 20, the detection probability reaches 0.9968. However, as the number of decoy photons increases, the detection probability approaches 1. Consequently, Eve will not succeed in executing the intercept-measure-resend attack.

5.1.2. Entangle-Measure Attack

This attack involves Eve intercepting the quantum sequences S A and S B , and entangling them with the prepared auxiliary state u 1 through a specific unitary operation U 1   during the first quantum sequence transmission. During the second quantum sequence transmission, Eve intercepts the quantum sequences G A and G B , and performs the specific unitary operation U 2 to entangle them with the prepared auxiliary state u 2 . Eve can then measure the prepared auxiliary states e 1 and e 2 to extract private information about the confidential inputs.
During the first quantum sequence transmission, performing U 1 on e 1 and states 0 and 1 proceeds as follows:
U 1 0 u 1 = 0 u 00 + 1 u 01 = A 0 u ^ 00 + B 1 u ^ 01
U 1 1 u 1 = 0 u 10 + 1 u 11 = B 0 u ^ 10 + A 1 u ^ 11
U 1 + u 1 = 1 2 0 u 00 + 1 u 01 + 0 u 10 + 1 u 11 = 1 2 + u 00 + u 01 + u 10 + u 11 + 1 2 u 00 u 01 + u 10 u 11 = + u + + + u +
U 1 u 1 = 1 2 0 u 00 + 1 u 01 + 0 u 10 1 u 11 = 1 2 + u 00 + u 01 u 10 u 11 + 1 2 u 00 u 01 u 10 + u 11 = + u + + u
The states u 00 , u 01 , u 10 , u 11 are four pure states determined by unitary operation U 1 and satisfy the following conditions.
u 00 | u 00 = u 01 | u 01 = A + B = 1
u 10 | u 10 = u 11 | u 11 = B + A = 1
u 00 | u 10 = u 01 | u 11 = 0
Without loss of generality, we can set
u 00 | u 01 = u 10 | u 11 = u 00 | u 10 = u 01 | u 11 = 0
We specify the angles between nonorthogonal vectors as
u ^ 00 | u ^ 11 = cos x , u ^ 01 | u ^ 10 = cos y , 0 x , y π 2
Furthermore, the probability of Eve not being detected is given as
P 0 = u 00 | u 00 = P 1 = u 11 | u 11 = A
P + = P = 1 2 1 + A cos x + B cos y
Therefore, the average detection probability during the first quantum sequence transmission is given by
P d 1 = A 2 + 1 A cos x B cos y 4
When A = 0 , B = 1 , P d 1 comes to the minimum.
d 1 = min P d 1 = 1 4 cos x 4 , 0 d 1 1 4
During the second quantum sequence transmission, performing U 2 on e 2 and states 0 and 1 proceeds as follows:
U 2 0 u 2 = 0 u 00 + 1 u 01 = A 0 u ^ 00 + B 1 u ^ 01
U 2 1 u 2 = 0 u 10 + 1 u 11 = B 0 u ^ 10 + A 1 u ^ 11
U 2 + u 2 = 1 2 0 u 00 + 1 u 01 + 0 u 10 + 1 u 11 = 1 2 + u 00 + u 01 + u 10 + u 11 + 1 2 u 00 u 01 + u 10 u 11 = + u + + + u +
U 2 u 2 = 1 2 0 u 00 + 1 u 01 + 0 u 10 1 u 11 = 1 2 + u 00 + u 01 u 10 u 11 + 1 2 u 00 u 01 u 10 + u 11 = + u + + u
The states u 00 , u 01 , u 10 , u 11 are four pure states determined by unitary operation U 2 and satisfy the following conditions.
u 00 | u 00 = u 01 | u 01 = A + B = 1
u 10 | u 10 = u 11 | u 11 = B + A = 1
u 00 | u 10 = u 01 | u 11 = 0
Without loss of generality, we can set
u 00 | u 01 = u 10 | u 11 = u 00 | u 10 = u 01 | u 11 = 0
We specify the angles between nonorthogonal vectors as
u ^ 00 | u ^ 11 = cos x , u ^ 01 | u ^ 10 = cos y , 0 x , y π 2
In the same way, the average detection probability during the second quantum sequence transmission is given by
d 2 = 1 4 cos x 4 , 0 d 2 1 4
Reference [55] pointed out that the optimal incoherent attack by Eve consists of a balanced strategy, where x = x . Therefore, we have
d = d 1 = d 2 = 1 4 cos x 4 , 0 d 1 4
The mutual information between the participants and Eve is written as
I A : E = 1 h 1 + sin 2 x 2 = 1 h 1 1 4 d 2 2
where h denotes the Shannon binary entropy. From Equation (30), we can infer that I A : E is a monotonic increasing function. The more information Eve seeks to obtain, the greater the detection probability she will induce. Therefore, Eve will not succeed in executing the entangle-measure attack.

5.1.3. Man-in-the-Middle Attack

This attack involves Eve intercepting the sequences containing the encoded private inputs and preparing fake sequences in place of the intercepted sequence. We take intercepting the sequence G A   and preparing G A   as an example. The same method can be applied to analyze the interception of sequence G B . For security validation, Eve prepares guessed states as decoy photons, denoting the i-th decoy photon as D i , which corresponds to the j-th qubit in G A . The j-th qubit of G A is denoted as D i . Both D i and D i are prepared using basis B = 0 , 1 and B = + , . When Alice discloses the measurement basis of D i , Eve measures D i using the basis B′ and obtains the results D i . The probability that D i = D i is as follows.
(1)
If B = B and D i = D i , the probability that D i = D i is 1.
(2)
If B = B and D i D i , the probability that D i = D i is 0.
(3)
If B B and D i = D i , the probability that D i = D i is 1/2.
The detection probability for a decoy photon is
P D i = D i = P D i = D i | B = B P B = B + P D i = D i | B B P B B = 1 2 P D i = D i | B = B + P D i = D i | B B = 1 2 P D i = D i | B = B , D i = D i P D i = D i + P D i = D i | B = B ,   D i D i P D i D i + 1 2 = 1 2 1 × 1 2 + 0 × 1 2 + 1 2 = 1 2
For d decoy photons, the detection probability becomes 1 1 2 d . When d = 10 , the detection probability reaches 0.999. However, as the number of decoy photons increases, the detection probability approaches 1. Consequently, Eve will not succeed in executing the man-in-the-middle attack.

5.1.4. Quantum Trojan-Horse Attacks

Quantum Trojan horse attacks are broadly classified into two categories: (1) invisible photon attacks [36], where an eavesdropper injects undetectable photons into the quantum channel to probe transmitted states, and (2) delayed photon attacks [38], where photons are strategically delayed to intercept or alter communication. These attacks represent critical vulnerabilities in bidirectional quantum communication systems. The round-trip transmission mechanism inherent to the proposed protocol is particularly susceptible to such threats. To counter these risks, the protocol integrates wavelength filters to eliminate extraneous photon wavelengths and photon-number splitters to detect anomalous photon counts, thereby neutralizing covert eavesdropping attempts.

5.2. Participant Attacks

Participants may maliciously attempt to deduce or alter each other’s private inputs, thereby compromising data confidentiality. A detailed security analysis of insider threats is provided below.

5.2.1. Security Against Attacks from Alice or Bob

In this protocol, Alice and Bob assume symmetrical roles. For generality, we analyze the scenario where Bob acts maliciously to deduce Alice’s secret. Alice encodes her secrets through quantum operations (Pauli-X and Pauli-Z gates) on sequence SA. To reconstruct Alice’s secrets, Bob would require both SA and the transformed sequence UA. However, since no direct quantum channel exists between Alice and Bob, Bob’s only opportunity to obtain SA and UA lies in intercepting transmissions between the TP and Alice. Such interception falls under external eavesdropping, which the protocol neutralizes via the decoy-state method described in Steps 3 and 5. An analogous analysis applies if Alice attempts to compromise Bob’s secrets. Therefore, the protocol’s design inherently safeguards both parties’ secrets against collusion and insider attacks.

5.2.2. Security Against Attacks from TP

While the semi-honest TP might attempt to extract additional information by analyzing intermediate results or deviating from the protocol, its capabilities are limited by the protocol’s architectural constraints. The TP is solely responsible for the initial preparation and distribution of Bell states and subsequent Bell-basis measurements. Although the TP possesses knowledge of the initially prepared and post-transformation Bell states, it cannot reverse-engineer the participants’ secrets (X or Y) from these correlations. Even if the TP hypothetically substitutes Bell states with single photons and measures the returned particles, it lacks knowledge of the shared secret key KAB, which is exclusively held by Alice and Bob. Without KAB, the TP cannot resolve the encoded values X and Y. As a result, the protocol ensures that the TP gains no information about the participants’ secrets beyond the final comparison outcome.

6. Discussion

Qubit efficiency [29], a critical metric for evaluating quantum resource utilization, quantifies the ratio of classical bits securely compared to the total quantum resources consumed excluding those used for eavesdropping detection. Given that η c denotes the number of classical bits compared, η t denotes the qubits used for encoding private inputs, and η k denotes the bits allocated for pre-shared key, the qubit efficiency is defined as:
η e = η c η t + η k
In our protocol, ⌈n/2⌉ Bell states (two-qubit systems) and an n-bit pre-shared key enable the comparison of n classical bits, yielding η c = n , η t = n , and η k = n . This results in a qubit efficiency of 50%. A comparative analysis with existing protocols is detailed in Table 2.
Ref. [20] utilizes Bell states and XOR operations with single-particle measurements, achieving 50% efficiency. However, it is vulnerable to semi-honest TP attacks via fake Bell states. Ref. [22] employs Bell states and CNOT gates with Z-basis measurements, attaining 50% efficiency but is susceptible to outsider disturbance attacks and TP measuring attacks. Ref. [24] relies on entanglement swapping and GHZ-basis measurements, requiring three Bell states and nine pre-shared key bits to compare three classical bits, yielding 20% efficiency. Ref. [25] uses single Bell states φ + and XOR operations, achieving only 16.67% efficiency (three Bell states per compared bit). Refs. [26,27] incorporate rotation/unitary operations and Bell measurements, achieving 25% efficiency (one Bell state and one pre-shared key bit per compared bit).
Compared with existing Bell-state-based QPC protocols, our protocol offers the following improvements.
(1)
Our protocol employs Bell states, Pauli-X and Pauli-Z encoding, and Bell measurements without entanglement swapping [24], further enhancing its feasible implementation.
(2)
By leveraging a single Bell state and two pre-shared key bits to compare two classical bits, it achieves 50% qubit efficiency—double that of Refs. [26,27] and higher than Refs. [24,25].
(3)
Although the proposed protocol has equal qubit efficiency with Refs. [20,22], it provides security against the TP’s attack and external eavesdropping through decoy-state validation and the QKD-secured key, while the schemes in Refs. [20,22] are not secure and may result in privacy disclosure.

7. Conclusions

In this study, we propose an efficient quantum private comparison (QPC) protocol that harnesses the entanglement properties of Bell states to enable secure and privacy-preserving comparisons of confidential data. Participants encode their private inputs using Pauli-X and Pauli-Z operators on quantum sequences distributed by a semi-honest third party (TP). This design achieves 50% qubit efficiency—a significant improvement over existing Bell-state-based protocols—by utilizing a single Bell state and two pre-shared key bits to compare two classical bits. The protocol’s practicality is validated through experimental simulations on the IBM Quantum Qiskit simulator, confirming its operational feasibility in real-world quantum environments. A comprehensive security analysis demonstrates the protocol’s robustness against both external attacks and insider threats. By integrating Bell-state encoding, QKD-secured keys, and decoy-state validation, our protocol addresses vulnerabilities in prior works, such as susceptibility to fake Bell states and disturbance attacks. Compared to existing QPC schemes, our protocol offers superior efficiency and experimental viability, achieved through minimal quantum resource requirements and simplified operations (no entanglement swapping or GHZ-basis measurements). Future work will extend this framework to noisy intermediate-scale quantum (NISQ) environments, incorporating error mitigation techniques for real-world deployment. Additionally, we aim to design semi-quantum private comparison protocols to reduce reliance on quantum devices, further alleviating resource constraints in practical applications.

Author Contributions

Conceptualization, M.H. and S.Z.; methodology, M.H.; software, M.H.; validation, M.H. and S.Z.; formal analysis, M.H.; investigation, M.H.; resources, M.H.; data curation, M.H.; writing—original draft preparation, M.H.; writing—review and editing, Y.W. and S.Z.; visualization, S.Z.; supervision, S.Z.; project administration, S.Z.; funding acquisition, S.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Research Project of Key R&D Programs in Tibet Autonomous Region (No. XZ202501ZY0094), the National Natural Science Foundation of China (No. 62076042), the National Key Research and Development Plan of China, Key Project of Cyberspace Security Governance (No. 2022YFB3103103), the Key Research and Development Project of Chengdu (No. 2023-XT00-00002-GX), the Key Research and Development Support Program Project of Chengdu (No. 2024-YF05-01227-SN), and the Open Fund of Network and Data Security Key Laboratory of Sichuan Province (Grant No. NDS2024-1).

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Lindell, Y. Secure multiparty computation. Commun. ACM 2020, 64, 86–96. [Google Scholar] [CrossRef]
  2. Yao, A.C. Protocols for secure computations. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science (FOCS’ 82), Washington, DC, USA, 3–5 November 1982; p. 160. [Google Scholar]
  3. Boudot, F.; Schoenmakers, B.; Traore, J. A fair and efficient solution to the socialist millionaires’ problem. Discret. Appl. Math. 2001, 111, 23–36. [Google Scholar] [CrossRef]
  4. Lo, H.K. Insecurity of quantum secure computations. Phys. Rev. A 1997, 56, 1154–1162. [Google Scholar] [CrossRef]
  5. Shor, P.W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 1999, 41, 303–332. [Google Scholar] [CrossRef]
  6. Qin, Y.; Cheng, J.; Ma, J.; Zhao, D.; Yan, Z.; Jia, X.; Xie, C.; Peng, K. Efficient and secure quantum secret sharing for eight users. Phys. Rev. Res. 2024, 6, 033036. [Google Scholar] [CrossRef]
  7. Shen, A.; Cao, X.Y.; Wang, Y.; Fu, Y.; Gu, J.; Liu, W.-B.; Weng, C.-X.; Yin, H.-L.; Chen, Z.-B. Experimental quantum secret sharing based on phase encoding of coherent states. Sci. China Phys. Mech. Astron. 2023, 66, 260311. [Google Scholar] [CrossRef]
  8. Senthoor, K.; Sarvepalli, P.K. Theory of communication efficient quantum secret sharing. IEEE Trans. Inf. Theory 2022, 68, 3164–3186. [Google Scholar] [CrossRef]
  9. Huang, X.; Zhang, S.B.; Chang, Y.; Chi, Q.; Dong-Mei, L.; Min, H. Quantum key agreement protocol based on quantum search algorithm. Int. J. Theor. Phys. 2021, 60, 838–847. [Google Scholar] [CrossRef]
  10. Karim, F.; Abulkasim, H.; Alabdulkreem, E.; Ahmed, N.; Jamjoom, M.; Abbas, S. Improvements on new quantum key agreement protocol with five-qubit Brown states. Mod. Phys. Lett. A 2022, 37, 2250128. [Google Scholar] [CrossRef]
  11. Wang, C.; Zhang, Q.; Liang, S.; Zhu, H. Secure mutual authentication quantum key agreement scheme for two-party setting with key recycling. Quantum Inf. Process. 2024, 23, 139. [Google Scholar] [CrossRef]
  12. Pan, D.; Long, G.L.; Yin, L.; Sheng, Y.-B.; Ruan, D.; Ng, S.X.; Lu, J.; Hanzo, L. The evolution of quantum secure direct communication: On the road to the qinternet. IEEE Commun. Surv. Tutor. 2024, 23, 1898–1949. [Google Scholar] [CrossRef]
  13. Pan, D.; Song, X.T.; Long, G.L. Free-space quantum secure direct communication: Basics, progress, and outlook. Adv. Devices Instrum. 2023, 4, 0004. [Google Scholar] [CrossRef]
  14. Huang, X.; Zhang, S.; Chang, Y.; Yang, F.; Hou, M.; Cheng, W. Quantum secure direct communication based on quantum homomorphic encryption. Mod. Phys. Lett. A 2021, 36, 2150263. [Google Scholar] [CrossRef]
  15. Zhang, H.; Sun, Z.; Qi, R.; Yin, L.; Long, G.-L.; Lu, J. Realization of quantum secure direct communication over 100 km fiber with time-bin and phase quantum states. Light Sci. Appl. 2022, 11, 83. [Google Scholar] [CrossRef] [PubMed]
  16. Chen, Y.; Situ, H.; Huang, Q.; Zhang, C. A novel quantum private set intersection scheme with a semi-honest third party. Quantum Inf. Process. 2023, 22, 429. [Google Scholar] [CrossRef]
  17. Huang, X.; Zhang, W.; Zhang, S. Quantum multi-party private set intersection using single photons. Phys. A Stat. Mech. Its Appl. 2024, 649, 129974. [Google Scholar] [CrossRef]
  18. Sutradhar, K.; Om, H. An efficient simulation for quantum secure multiparty computation. Sci. Rep. 2021, 11, 2206. [Google Scholar] [CrossRef] [PubMed]
  19. Yang, Y.G.; Wen, Q.Y. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 2009, 42, 055305. [Google Scholar] [CrossRef]
  20. Tseng, H.Y.; Lin, J.; Hwang, T. New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 2012, 11, 373–384. [Google Scholar] [CrossRef]
  21. Wang, C.; Xu, G.; Yang, Y.X. Cryptanalysis and improvements for the quantum private comparison protocol using EPR pairs. Int. J. Quantum Inf. 2013, 11, 1350039. [Google Scholar] [CrossRef]
  22. Lang, Y.F. Quantum gate-based quantum private comparison. Int. J. Theor. Phys. 2020, 59, 833–840. [Google Scholar] [CrossRef]
  23. Ming-Yi, D. Cryptanalysis and improvement of quantum gate-based quantum private comparison. Int. J. Theor. Phys. 2021, 60, 195–199. [Google Scholar] [CrossRef]
  24. Huang, X.; Zhang, S.B.; Chang, Y.; Hou, M.; Cheng, W. Efficient quantum private comparison based on entanglement swapping of bell states. Int. J. Theor. Phys. 2021, 60, 3783–3796. [Google Scholar] [CrossRef]
  25. Lang, Y.F. Quantum private comparison using single bell state. Int. J. Theor. Phys. 2021, 60, 4030–4036. [Google Scholar] [CrossRef]
  26. Hou, M.; Sun, S.Y.; Zhang, W. Quantum private comparison for the socialist millionaire problem. Front. Phys. 2024, 12, 1408446. [Google Scholar] [CrossRef]
  27. Hou, M.; Wu, Y. New Quantum Private Comparison Using Bell States. Entropy 2024, 26, 682. [Google Scholar] [CrossRef] [PubMed]
  28. Huang, X.; Zhang, W.F.; Zhang, S.B. Efficient multiparty quantum private comparison protocol based on single photons and rotation encryption. Quantum Inf. Process. 2023, 22, 272. [Google Scholar] [CrossRef]
  29. Kou, T.Y.; Che, B.C.; Dou, Z.; Chen, X.-B.; Lai, Y.-P.; Li, J. Efficient quantum private comparison protocol utilizing single photons and rotational encryption. Chin. Phys. B 2022, 31, 060307. [Google Scholar] [CrossRef]
  30. Liu, B.; Xiao, D.; Huang, W.; Jia, H.-Y.; Song, T.-T. Quantum private comparison employing single-photon interference. Quantum Inf. Process. 2017, 16, 180. [Google Scholar] [CrossRef]
  31. Pan, H.M. Two-party quantum private comparison using single photons. Int. J. Theor. Phys. 2018, 57, 3389–3395. [Google Scholar] [CrossRef]
  32. Hou, M.; Wu, Y. Single-photon-based quantum secure protocol for the socialist millionaires’ problem. Front. Phys. 2024, 12, 1364140. [Google Scholar] [CrossRef]
  33. Liu, B.; Gao, F.; Jia, H.; Huang, W.; Zhang, W.-W.; Wen, Q.-Y. Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 2013, 12, 887–897. [Google Scholar] [CrossRef]
  34. Ji, Z.; Zhang, H.; Wang, H. Quantum private comparison protocols with a number of multi-particle entangled states. IEEE Access 2019, 7, 44613–44621. [Google Scholar] [CrossRef]
  35. Ye, T.Y.; Ji, Z.X. Two-party quantum private comparison with five-qubit entangled states. Int. J. Theor. Phys. 2017, 56, 1517–1529. [Google Scholar] [CrossRef]
  36. Fan, P.; Rahman, A.U.; Ji, Z.; Ji, X.; Hao, Z.; Zhang, H. Two-party quantum private comparison based on eight-qubit entangled state. Mod. Phys. Lett. A 2022, 37, 2250026. [Google Scholar] [CrossRef]
  37. Ji, Z.X.; Ye, T.Y. Quantum private comparison of equal information based on highly entangled six-qubit genuine state. Commun. Theor. Phys. 2016, 65, 711. [Google Scholar] [CrossRef]
  38. Ji, Z.X.; Zhang, H.G.; Fan, P.R. Two-party quantum private comparison protocol with maximally entangled seven-qubit state. Mod. Phys. Lett. A 2019, 34, 1950229. [Google Scholar] [CrossRef]
  39. Hou, M.; Wu, Y.; Zhang, S. Efficient Quantum Private Comparison Based on GHZ States. Entropy 2024, 26, 413. [Google Scholar] [CrossRef] [PubMed]
  40. Zha, X.W.; Yu, X.Y.; Cao, Y.; Wang, S.-K. Quantum private comparison protocol with five-particle cluster states. Int. J. Theor. Phys. 2018, 57, 3874–3881. [Google Scholar] [CrossRef]
  41. Li, C.; Chen, X.; Li, H.; Yang, Y.; Li, J. Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state. Quantum Inf. Process. 2019, 18, 158. [Google Scholar] [CrossRef]
  42. Wang, B.; Liu, S.Q.; Gong, L.H. Semi-quantum private comparison protocol of size relation with d-dimensional GHZ states. Chin. Phys. B 2022, 31, 010302. [Google Scholar] [CrossRef]
  43. Zhou, N.R.; Xu, Q.D.; Du, N.S.; Gong, L.-H. Semi-quantum private comparison protocol of size relation with d-dimensional Bell states. Quantum Inf. Process. 2021, 20, 124. [Google Scholar] [CrossRef]
  44. Wang, B.; Gong, L.H.; Liu, S.Q. Multi-party semi-quantum private comparison protocol of size relation based on two-dimensional Bell states. Chin. Phys. B 2024, 33, 110303. [Google Scholar] [CrossRef]
  45. Zhou, N.R.; Chen, Z.Y.; Liu, Y.Y.; Gong, L.-H. Multi-Party Semi-Quantum Private Comparison Protocol of Size Relation with d-Level GHZ States. Adv. Quantum Technol. 2024, 8, 2400530. [Google Scholar] [CrossRef]
  46. Nielsen, M.A.; Chuang, I.L. Quantum Computation and Quantum Information; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
  47. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, 12 December 1984; pp. 175–179. [Google Scholar]
  48. Jennewein, T.; Simon, C.; Weihs, G.; Weinfurter, H.; Zeilinger, A. Quantum cryptography with entangled photons. Phys. Rev. Lett. 2000, 84, 4729. [Google Scholar] [CrossRef] [PubMed]
  49. Hughes, R.J.; Nordholt, J.E.; Derkacs, D.; Peterson, C.G. Practical free-space quantum key distribution over 10 km in daylight and at night. New J. Phys. 2002, 4, 43. [Google Scholar] [CrossRef]
  50. Gao, D.; Fan, D.; Zha, C.; Bei, J.; Cai, G.; Cai, J.; Cao, S.; Chen, F.; Chen, J.; Chen, K.; et al. Establishing a new benchmark in quantum computational advantage with 105-qubit zuchongzhi 3.0 processor. Phys. Rev. Lett. 2025, 134, 090601. [Google Scholar] [CrossRef] [PubMed]
  51. Liu, X.F.; Li, D.F.; Zheng, Y.D.; Yang, X.-L.; Zhou, J.; Tan, Y.-Q.; Liu, M.-Z. Experimental realization of quantum controlled teleportation of arbitrary two-qubit state via a five-qubit entangled state. Chin. Phys. B 2022, 31, 050301. [Google Scholar] [CrossRef]
  52. Ye, T.Y.; Ye, C.Q. Measure-resend semi-quantum private comparison without entanglement. Int. J. Theor. Phys. 2018, 57, 3819–3834. [Google Scholar] [CrossRef]
  53. Huang, X.; Zhang, W.; Zhang, S. Practical quantum protocols for blind millionaires’ problem based on rotation encryption and swap test. Phys. A Stat. Mech. Its Appl. 2024, 637, 129614. [Google Scholar] [CrossRef]
  54. Jain, N.; Anisimova, E.; Khan, I.; Makarov, V.; Marquardt, C.; Leuchs, G. Trojan-horse attacks threaten the security of practical quantum cryptography. New J. Phys. 2014, 16, 123030. [Google Scholar] [CrossRef]
  55. Lucamarini, M.; Mancini, S. Secure deterministic communication without entanglement. Phys. Rev. Lett. 2005, 94, 140501. [Google Scholar] [CrossRef] [PubMed]
Figure 1. The circuit implementation of the three Bell states ψ , ψ + , φ .
Figure 1. The circuit implementation of the three Bell states ψ , ψ + , φ .
Axioms 14 00549 g001
Figure 2. The measurement results of three Bell states with 1024 shots.
Figure 2. The measurement results of three Bell states with 1024 shots.
Axioms 14 00549 g002
Figure 3. The quantum circuit implementation for comparing the equality of the secret integers X 0 = 54 and Y 0 = 22 .
Figure 3. The quantum circuit implementation for comparing the equality of the secret integers X 0 = 54 and Y 0 = 22 .
Axioms 14 00549 g003
Figure 4. The results of the probability measurements with 1024 shots for Figure 3.
Figure 4. The results of the probability measurements with 1024 shots for Figure 3.
Axioms 14 00549 g004
Figure 5. The quantum circuit implementation for comparing the equality of the secret integers X 1 = 63 and Y 1 = 63 .
Figure 5. The quantum circuit implementation for comparing the equality of the secret integers X 1 = 63 and Y 1 = 63 .
Axioms 14 00549 g005
Figure 6. The results of the probability measurements with 1024 shots for Figure 5.
Figure 6. The results of the probability measurements with 1024 shots for Figure 5.
Axioms 14 00549 g006
Figure 7. The relationship between the number of decoy photons (d, ranging from 1 to 20) and the detection probability.
Figure 7. The relationship between the number of decoy photons (d, ranging from 1 to 20) and the detection probability.
Axioms 14 00549 g007
Table 1. The resulting states.
Table 1. The resulting states.
Operations φ + φ ψ + ψ
X 0 Z 0 X 0 Z 0 φ + φ ψ + ψ
X 0 Z 0 X 0 Z 1 φ φ + ψ ψ +
X 0 Z 0 X 1 Z 0 ψ + ψ φ + φ
X 0 Z 0 X 1 Z 1 ψ ψ + φ φ +
X 0 Z 1 X 0 Z 0 φ φ + ψ ψ +
X 0 Z 1 X 0 Z 1 φ + φ ψ + ψ
X 0 Z 1 X 1 Z 0 ψ ψ + φ φ +
X 0 Z 1 X 1 Z 1 ψ + ψ φ + φ
X 1 Z 0 X 0 Z 0 ψ + ψ φ + φ
X 1 Z 0 X 0 Z 1 ψ ψ + φ φ +
X 1 Z 0 X 1 Z 0 φ + φ ψ + ψ
X 1 Z 0 X 1 Z 1 φ φ + ψ ψ +
X 1 Z 1 X 0 Z 0 ψ ψ + φ φ +
X 1 Z 1 X 0 Z 1 ψ + φ + φ + ψ
X 1 Z 1 X 1 Z 0 φ φ + ψ ψ +
X 1 Z 1 X 1 Z 1 φ + φ ψ + ψ
Table 2. A comparison with other Bell-state-based QPC protocols.
Table 2. A comparison with other Bell-state-based QPC protocols.
ProtocolQuantum ResourceUsage of Unitary OperationUsage of Quantum Entanglement SwappingUsage of Pre-Shared KeyQuantum MeasurementPrivacy Disclosure Bit Number Compared Each RoundCompare RoundsQubit Efficiency
Ref. [20]Bell statesNoNoNoSingle particleYes1n50%
Ref. [22]Bell statesYesNoNo 0 , 1 basisYes1n50%
Ref. [24]Bell statesNoYesYesGHZ-basisNo3 n / 3 20%
Ref. [25]Bell statesNoNoNo 0 , 1 basisNo1n16.67%
Ref. [26]Bell statesYesNoYesBell-basisNo1n25%
Ref. [27]Bell statesYesNoYesBell-basisNo1n25%
OursBell statesYesNoYesBell-basisNo2 n / 2 50%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hou, M.; Wu, Y.; Zhang, S. Two-Party Quantum Private Comparison with Pauli Operators. Axioms 2025, 14, 549. https://doi.org/10.3390/axioms14080549

AMA Style

Hou M, Wu Y, Zhang S. Two-Party Quantum Private Comparison with Pauli Operators. Axioms. 2025; 14(8):549. https://doi.org/10.3390/axioms14080549

Chicago/Turabian Style

Hou, Min, Yue Wu, and Shibin Zhang. 2025. "Two-Party Quantum Private Comparison with Pauli Operators" Axioms 14, no. 8: 549. https://doi.org/10.3390/axioms14080549

APA Style

Hou, M., Wu, Y., & Zhang, S. (2025). Two-Party Quantum Private Comparison with Pauli Operators. Axioms, 14(8), 549. https://doi.org/10.3390/axioms14080549

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop