Next Article in Journal
A Fitting Method of Inverting Ozone Concentration Profile Using Ultraviolet Differential Charge-Coupled Device Imaging Lidar
Previous Article in Journal
Research on the Multi-Point Gravity Balance Method for the Large-Aperture Space Camera in the Imaging Quality Test
Previous Article in Special Issue
Quantum Secure Multi-Party Summation with Identity Authentication Based on Commutative Encryption
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Quantum Sealed-Bid Auction Protocol with a Set of Local Indistinguishable Orthogonal Product States

1
School of Mathematical Science, Heilongjiang University, Harbin 150080, China
2
Institute of Applied Artificial Intelligence of the Guangdong-Hong Kong-Macao Greater Bay Area, Shenzhen Polytechnic, Shenzhen 518055, China
3
School of Artificial Intelligence, Shenzhen Polytechnic, Shenzhen 518055, China
4
Aisino Corporation, Beijing 100195, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Photonics 2023, 10(7), 807; https://doi.org/10.3390/photonics10070807
Submission received: 5 June 2023 / Revised: 1 July 2023 / Accepted: 5 July 2023 / Published: 12 July 2023
(This article belongs to the Special Issue Quantum Communications: Technologies and Applications)

Abstract

:
Quantum sealed-bid auction (QSA) is a special form of transaction with significant applications in the economic and financial fields. Using a unique set of locally indistinguishable orthogonal product (LIOP) states, we propose a new QSA protocol in this paper. In the protocol, the bid message is encoded as a quantum sequence of LIOP states, and the different particles of LIOP states are transmitted separately. Even though an attacker obtains a portion of the particles, they cannot recover the entire bid message because of the local indistinguishability of LIOP states. Once the auctioneer announces the winner’s bid, all bidders are able to confirm the authenticity of their bid. With the help of a semi-honest third party, collusion between the auctioneer and a malicious bidder can be discovered. Finally, our protocol is capable of meeting all requirements for secure sealed-bid auctions through security and completeness analysis. Additionally, the proposed protocol does not require any entangled resources and complicated operations, so it can be easily implemented in practice.

1. Introduction

With the rapid development of communications and Internet technologies, the public demand for information security is increasing. Compared with classical systems, quantum systems show more advantages. The security of information is guaranteed by the basic properties of quantum mechanics. In particular, after quantum electrodynamics was established, it was confirmed that photons are medium particles for the transmission of electromagnetic information. Photons are often used for quantum information transmission [1,2,3,4] because of their excellent properties of easy generation and manipulation and their ability to transmit over long distances through free-space or fiber channels [5]. Therefore, It is very important and meaningful to study various applications in electronic commerce based on quantum mechanics using photons as information carriers.
Auctions, as one of the most important businesses of electronic commerce transactions, are gaining increasing societal attention. Generally, public auctions and sealed-bid auctions are the two primary categories of auctions [6]. With the former, every step of the auction process is open to the participants, every legitimate bidder is able to see the bids of other bidders, and the highest bidder ultimately prevails. The primary distinction between public auctions and sealed-bid auctions is that sealed-bid auctions must guarantee the privacy of each bidder’s bid. A secret bid is submitted before the limit deadline to the auctioneer by a legitimate bidder. In other words, no bidder will be aware of other bidders’ bids except for their own, and no outside eavesdropper will be able to wiretap the bids. In addition, the auctioneer cannot legally help a malicious bidder win the auction. Consequently, sealed-bid auctions offer the highest level of bidder privacy protection. Moreover, there are some requirements for a safe sealed-bid auction, which are anonymity, public verifiability, fairness, and so on.
The advancement of quantum computing poses a significant threat to conventional auction security schemes. The quantum sealed-bid auction (QSA) is proposed to preserve auction security in the context of quantum computing. The first QSA protocol based on GHZ states was proposed by Naseri [7] in 2009, and used multiparty quantum secure direct communication. However, Qin et al. [8], and Yang et al. [9] pointed out separately that malicious bidders could obtain the secret bids of others in the same year. The problem of collusion between a dishonest auctioneer and malicious bidders was not resolved, despite the fact that they solved this problem by adding decoy photons. Furthermore, to address the problem of auctioneer and bidder collusion, Zhao et al. [10] first proposed a secure quantum QSA protocol with a post-confirmation mechanism. The most important feature of this protocol is that bidders prepare particles in a secret order to encode their bids in the post-confirmation phase, and in the public verification phase, other bidders can recover the winner’s bid to determine whether there is a collusive attack. Nevertheless, Xu et al. [11] and He et al. [12] found that the scheme cannot resist a collusive attack by a group of malicious bidders. Later, Wang et al. [13] proposed a QSA protocol based on a set of ordered EPR pairs. This protocol is only used for three parties, i.e., the participants consisting of only one auctioneer and two bidders. In this protocol, the two bidders perform unitary operations on one sequence of the EPR pairs to encrypt their secret bids and deduce the other party’s bid after the auctioneer has received all the particles and finished the measurement. However, Liu et al. [14] found a leak in Wang’s protocol, i.e., a dishonest auctioneer could collude with a bidder to help him win the auction by changing his bid. In Ref. [14], having each bidder send the hash of his bid price to the other bidders guarantees that the bid cannot be changed.
In 2016, Liu et al. [15] designed a multiparty QSA scheme using single photons as message carriers to reduce the complexity of quantum resources. The protocol introduces an improved post-confirmation mechanism using EPR pairs and permutation operators to guarantee the fairness of the auction. Subsequently, Zhang et al. [16] pointed out that Liu et al.’s QSA model cannot be prevented from collusion attacks either. There is no unconditionally safe post-confirmation mechanism in the current QSA model if a dishonest participant can control multi-particle entanglement. They proposed two potential approaches to design the post-confirmation mechanism when the bidders are semi-quantum. In 2020, Han et al. [17] proposed a new protocol based on GHZ states that involve a trusted third party and may thus ensure the bidder’s anonymity and the accuracy of the bidder’s message. With the help of the third party, using quantum sequences as the information carrier of bidding, the auction center and bidders can conduct quantum teleportation to obtain bids. In 2022, Gao et al. [18] proposed a protocol in which two auctioneers are employed to convey bids with EPR pairs from the bidder to the auctioneer. In addition, a hash function and a bulletin board are used to implement the post-confirmation mechanism. Until now, collusive attacks have continued to be a major consideration in the quantum sealed-bid auction process. Many experts and scholars have been devoted to studying post-confirmation mechanisms to resist collusion attacks. Even now, the post-confirmation mechanism has been researched and modified by several academics [19,20,21,22,23,24].
In summary, most QSA protocols are achieved by entangled states. It is essential to design a QSA protocol that does not utilize entangled states due to the difficulty of preparing entangled states practically. In 2015, Yu et al. [25] constructed a set of orthogonal product states that are not perfectly distinguishable by local operations and classical communication (LOCC). In fact, the local indistinguishable orthogonal product (LIOP) states are easier to prepare compared with the entangled states. Nowadays, LIOP states have been used in many applications. For example, in 2001, Guo et al. [26] proposed a quantum key distribution (QKD) protocol based on LIOP states. In 2019, Jiang et al. [27] proposed a quantum voting protocol based on LIOP states. In 2019, Jiang et al. [28] proposed a trusted third-party e-payment protocol with LIOP states. In 2022, Fu et al. [29] implemented a quantum secret sharing (QSS) protocol using LIOP states. In the proposed protocol, we solve the QSA problem based on the LIOP states. The bidder’s bidding message is encoded as a quantum sequence of LIOP states, and these quantum sequences are described in a unique method. Thereafter, the different particles of LIOP states are transmitted separately to prevent information leakage. Finally, by comparing the measurements, the auctioneer announces the highest bid. According to the property of LIOP states, even if an attacker obtains  n 1  particles of orthogonal product states, it is impossible to determine the secret message. The transmission of quantum states between participants uses photons as carriers in this scheme. Moreover, compared with previous protocols, our protocol does not require sharing keys in advance. Since the indistinguishability of the LIOP states ensures the security of the protocol.
The rest of the paper is arranged as follows. In Section 2, we present some necessary preliminary of the sealed-bid auction and LIOP states. In Section 3, a new QSA protocol is presented. In Section 4, the correctness, security, and completeness of this protocol are analyzed. Finally, the conclusions are summarized in Section 5.

2. Preliminary Information

In this section, some necessary preliminary about the sealed-bid auction and LIOP states required in the protocol is introduced.

2.1. Sealed-Bid Auction

The winner of a sealed-bid auction will be decided by the auctioneer after the bidders have submitted their bids anonymously and discreetly by a predetermined deadline. With this kind of auction, the time consideration is eliminated, allowing participants can make less impulsive, more deliberate decisions [30]. To be specific, there are some important requirements of a secure auction as follows [22]:
(1)
Anonymity: Each bidder who participates in an auction can keep anonymity. In a secure auction, no one can obtain any bidder’s identity information except the auctioneer.
(2)
Public verifiability: The winning bid can be validated by any bidder. Every bidder is able to confirm the winning bid, which is determined by the auctioneer during the verification step. This implies that the attack may be immediately detected if there is collusion between a malicious bidder and a dishonest auctioneer.
(3)
Accountability of bidder: Any malicious bidder with a fake bid cannot interrupt the auction without being detected.
(4)
Fairness: Each bidder performs the same operations in the auction. The auctioneer cannot help a dishonest bidder to win the auction illegally without being found by other bidders.
(5)
Traceability: The winning bidder and the highest bid can be verified even after the auction has finished.
(6)
Non-repudiation: The bidder cannot deny that he has cast his bid, and accordingly, the auctioneer cannot deny that he has received the bid from the bidder.
The first-price sealed-bid auction, in which the bidder who bids the highest price wins and is obligated to pay it, is the most popular kind of sealed-bid auction. The second-price sealed-bid auction means the bidder who offers the highest price wins but only needs to pay the second-highest amount. We will only focus on the first-price sealed-bid auction in this study because there are no notable distinctions between the two types of auctions.

2.2. LIOP States

In 1999, Bennett et al. [31] proposed a unique set of LIOP states, and also demonstrated its local indistinguishability. In a  2 2 2  quantum system, the product basis that contains the 8 orthogonal product states are as follows:
| φ 1 = | 0 1 | 0 2 | 0 3 | φ 2 = | 1 1 | 1 2 | 1 3 | φ 3 = | + 1 | 0 2 | 1 3 | φ 4 = | 1 | 0 2 | 1 3 | φ 5 = | 1 1 | + 2 | 0 3 | φ 6 = | 1 1 | 2 | 0 3 | φ 7 = | 0 1 | 1 2 | + 3 | φ 8 = | 0 1 | 1 2 | 3
LIOP states cannot be perfectly distinguished by LOCC. In this case, an attacker cannot capture the entire state if he only obtains a few particles. By encoding secret messages in this format, we can protect the privacy of participants. As a result, it has a wide range of uses in cryptographic protocols. The non-locality of the LIOP states will not be explained in detail here. In our protocol, the sealed-bid auction protocol is designed using corresponding LIOP states.

3. The Proposed Protocol

In this section, the specific process of the protocol is described. There are several participants in this protocol: (1)  A l i c e  is the auctioneer who compares the bids of the bidders and announces the highest bid and the winner; (2)  B o b i  is one of the bidders, there are n bidders in our protocol; (3)  T r e n t  is a semi-honest auction center for checking the identity of bidders and verifying their honesty.

3.1. Stage of Preparation

Step 1:  A l i c e  announces the items in the auction.
Step 2: Bidders who want to participate in the auction require to register with  T r e n t T r e n t  checks their status to see if they are eligible to participate in the auction. There is a collection containing eligible bidders who have credit certificates, authorization letters, and assets, etc.  T r e n t  determines whether the bidder applying for registration belongs to the collection. If so, the bidder is qualified to participate in the auction.  T r e n t  will send him a unique pseudonym representing his identity. In addition, he will also record the relationship between the pseudonym and each bidder’s true identity. Otherwise,  T r e n t  will reject him.
Step 3: After all bidders have registered,  T r e n t  authorizes the auctioneer  A l i c e  to announce the information about the items to be auctioned. (The sketch is shown in Figure 1).

3.2. Stage of Auction

Step 1:  B o b i  converts the bid message  M i  into a  3 l -long binary classical sequence and divides  M i  into l groups.  M i = M i 1 M i 2 M i t M i l , M i t { 000 , 001 , 010 , 100 , 101 , 011 , 110 , 111 } , i = 1 , 2 , , n .
Step 2:  B o b i  encodes the secret bid message into a quantum sequence according to the Table 1.
Step 3:  B o b i  generates n identical sequences denoted as  S 1 , S 2 , , S k , S n . By picking out each particle in the sequences above, the corresponding quantum sequences represent as  S k = { | S k 1 , | S k 2 , | S k 3 } , where  k = 1 , 2 , , n .
To facilitate understanding of how the sequence is generated,  B o b i ’s bid message is encoded as  | φ 2 , | φ 3 , | φ 5 . Then, the unique forms of  | S k 1 , | S k 2 , and  | S k 3 ( k = 1 , 2 , , n )  are described as follows:
| S k 1 = { | 1 , | + , | 1 } , | S k 2 = { | 1 , | 0 , | + } , | S k 3 = { | 1 , | 1 , | 0 } .
And,
S k = { | 1 , | + , | 1 ; | 1 , | 0 , | + ; | 1 , | 1 , | 0 }
Step 4:  B o b i  inserts N decoy photons for eavesdropping detection into the quantum sequence  | S 1 1  to form  | S 1 1 , all decoy photons are selected randomly in one of the states  { | 0 , | 1 , | + , | } . At the same time, he records the original forms and positions of these decoy photons. Finally,  B o b i  sends  | S 1 1  to auctioneer  A l i c e .
Step 5: After confirming that  A l i c e  has received  | S 1 1 B o b i  announces the original forms and positions of the decoy photons.  A l i c e  measures each of the decoy photons with the corresponding bases. Then,  A l i c e  compares whether the measurement results and the original forms are the same to check for eavesdropping. If the error rate is below a certain threshold,  A l i c e  drops the decoy photons and recovers the sequence  | S 1 1 . The protocol continues to the next step. Otherwise, the protocol terminates.
Step 6: B o b i  sends the sequence  | S k 1  ( k = 2 , 3 , , n ) in  S k  to  T r e n t  perform the eavesdropping detection as Step 5. After successfully passing the security test,  T r e n t  gets the sequence  | S k 1 .
Step 7: Similarly,  B o b i  sends the sequence  | S k 2  to  B o b j ( j i )  randomly. In other words, he sends  n 1  sequences to  n 1  bidders in case these bidders conspire with the auctioneer to change the particles in their hands.
Step 8: Subsequently,  B o b i  sends the sequence  | S k 3  to  T r e n t . Finally,  B o b i  sends the sequence  | S 1 2 , | S 1 3  to  A l i c e . The transmission process uses decoy photons to ensure secure communication.
Step 9: After successfully passing the eavesdropping detection,  T r e n t  recovers the quantum sequence to obtain  | S k 3 A l i c e  gets  | S 1 2 , | S 1 3 . In Step 5,  B o b i  has sent  | S 1 1  to  A l i c e , at which point she gets  S 1 = { | S 1 1 , | S 1 2 , | S 1 3 } . According to Table 1 A l i c e  uses the corresponding bases to measure the sequence  S 1  and records the measurement results.
Step 10: By comparing the measurement results, the auctioneer announces the highest price and the pseudonym of the winner, who is recorded as  B o b i . (The sketch is shown in Figure 2).

3.3. Stage of Verification

Step 1: After  A l i c e  announces the highest price and the winner,  B o b j  sends  | S k 2  of  B o b i  to  T r e n t  in order to verify whether the bid has been changed.
Step 2:  T r e n t  receives these quantum sequences and measures them. If all of the measurement results are the same and equal to the open highest price, the auction is reasonable. Otherwise, the auction is invalid.
Step 3: After verifying that the auction is reasonable, all participants follow the above steps for the next item until all items are auctioned off.

4. Analysis of the Protocol

In this section, we first explain the correctness of the presented protocol. Furthermore, we analyze the security of this protocol against various quantum attacks. Finally, we demonstrate that our protocol satisfies all of the conditions for a secure auction and successfully completes the task of a secure auction.

4.1. Analysis of Correctness

In order to understand the correctness of the protocol more intuitively, we take an example (the eavesdropping detection is ignored). For two bidders,  B o b 1  and  B o b 2 B o b 1 ’s auction message is 001010011, encoded as  | φ 2 , | φ 3 , | φ 4 B o b 2 ’s auction message is 100110001, encoded as  | φ 5 , | φ 7 , | φ 2 .
For  B o b 1
S 1 = { | S 1 1 , | S 1 2 , | S 1 3 } = { | 1 , | + , | ; | 1 , | 0 , | 0 ; | 1 , | 1 , | 1 } = S 2 ;
For  B o b 2
S 1 = { | S 1 1 , | S 1 2 , | S 1 3 } = { | 1 , | 0 , | 1 ; | + , | 1 , | 1 ; | 0 , | + , | 1 } = S 2 .
After that,  B o b 1 ( B o b 2 )  sends  | 1 , | + , | ( | 1 , | 0 , | 1 ) of  S 1  to  A l i c e . Similarly, he sends  | 1 , | + , | ( | 1 , | 0 , | 1 ) of  S 2  to  T r e n t . Next,  B o b 1 ( B o b 2 )  sends  | 1 , | 0 , | 0 ( | + , | 1 , | 1 ) of  S 2  to  B o b 2 ( B o b 1 ) B o b 1 ( B o b 2 )  sends  | 1 , | 1 , | 1 ( | 0 , | + , | 1 ) of  S 2  to  T r e n t . Then,  B o b 1 ( B o b 2 )  sends  | 1 , | 0 , | 0 ; | 1 , | 1 , | 1 ( | + , | 1 , | 1 ; | 0 , | + , | 1 ) of  S 1  to  A l i c e . At this moment,  A l i c e  holds the sequences of all particles in  S 1 . After the measurement,  A l i c e  recovers the secret bid messages and announces  B o b 2  as the winner. Afterwards,  B o b 1  sends  B o b 2 ’s  | S 2 2 = | + , | 1 , | 1  to  T r e n t  so as to verify the authenticity of  B o b 2 ’s message. (The sketch is shown in Figure 3).

4.2. Analysis of Security

To protect the privacy of bidders and the fairness of the auction process, the issue of security in the QSA requires following the rules [32]: (1) The outer eavesdroppers cannot obtain any messages about bids; (2) Any bidder or a group of bidders cannot obtain the secret bid messages of other bidders; (3) A malicious bidder or a group of malicious bidders can collude with the dishonest auctioneer, but they cannot escape detection by the auction center during the verification stage.

4.2.1. Intercept-Resend Attack

E v e  is an eavesdropper who wishes to intercept the sequence during the quantum sequence transmission process and tries to recover the secret message. In comparison, it is optimal to intercept the sequence at Step 8 of the auction stage. During the transmission from  B o b i  to  A l i c e , E v e  intercepts  | S 1 2 , | S 1 3  and replaces them with  | S 1 2 , | S 1 3  at the same time. However, since  E v e  does not know the locations of all the decoy photons and the corresponding measurement bases,  A l i c e  will receive the wrong measurement results after performing eavesdropping detection. Of course,  B o b i  will find out that he is being eavesdropped on instantly, and then this transmission will be interrupted. Consequently, the malicious eavesdropper will not receive any secret messages.
Actually, the decoy photons can prevent the outer eavesdroppers from gaining the bids of bidders efficiently. Even if  E v e  is lucky enough not to be discovered, the probability of choosing the correct bases will be  1 2 N . She can only know at most two of the three quantum sequences. If he tries to guess  | S 1 1 , the probability of being correct is  1 4 l . Finally, the probability  P 1 = 1 2 N · 1 4 l  of  E v e ’s attack being found tends to be 0 in Figure 4. When  l , N  is sufficiently large, it is almost impossible for  E v e  to succeed in his guess.
In short,  E v e  does not have access to the secret messages of bidders in any way.

4.2.2. TP’s Attack

It is assumed that the third party  T r e n t  intentionally steals the bid message from the bidder  B o b i . In the proposed protocol,  T r e n t  has complete access to obtaining  | S k 1 , | S k 3  of  B o b i  after Step 6 and Step 8 in the auction stage. Then, since  T r e n t  is supposed to be semi-honest, he cannot collude with other participants. If  T r e n t  intercepts  | S k 2  sent by  B o b i  to  B o b j  in Step 7,  B o b i  will realize that he is being eavesdropped because of the presence of the decoy photons. The protocol will be terminated at once. In fact,  T r e n t  will not obtain  | S k 2 . Thus, if  T r e n t  wants to obtain complete the message about the bid, he must infer the true  | S k 2 . According to the special properties of LIOP states,  T r e n t  guesses that the probability of success is  P 2 = 1 4 l  in Figure 5. When l is large enough, the probability of being correct is negligible. Therefore, without colluding with any party,  T r e n t  cannot obtain the private bid messages of the participants.

4.2.3. Collusion Attack

There are two types of collusion attacks: (1) A group of bidders collude with each other to obtain the bid of the honest bidder; (2) A malicious bidder colludes with the dishonest auctioneer to win the auction illegally.
Case 1: Here, some bidders conspired as dishonest participants to steal  B o b i ’s secret message. No matter how many bidders collude, they can only obtain  | S k 2 . In fact, even  n 1  dishonest bidders cannot collusively obtain any secret messages about the bid  M i . Based on the previous analysis of the external interception of retransmission attack, obviously, it is not feasible for a group of malicious bidders to intercept messages from other steps due to the presence of decoy photons. Accordingly, their collusion is feasible only if they guess  | S k 1  and  | S k 3 , and the probability of guessing correctly is  P 3 = 1 4 2 l  in Figure 6.
Case 2: The issue of malicious bidders colluding with the auctioneer in a QSA protocol is very noteworthy. As an auctioneer, he will finally collect the secret messages of all the bidders and compare the highest price to come up with the winner. Accordingly, a malicious bidder who conspires with the auctioneer must know the bids of other bidders, and he wants to change his bid to win the auction at the most appropriate price.
In Step 9 of our protocol,  A l i c e  measures and gets the bids of all bidders, at which point he conspires with a malicious bidder to make him change his bid. Then,  A l i c e  will announce that the bidder with the changed price is the winner, and the auction center  T r e n t  will verify whether the winner’s bid has changed. In fact, all bidders have sent some of their messages to other bidders in Step 7. If the malicious bidder changes his particles, the final verification result will be different from the price announced by  A l i c e . Therefore, the presence of the auction center in our protocol is particularly important. With the verification of the auction center, he is able to quickly detect whether the winner’s bid message has been altered.

4.2.4. Entangle-Measure Attack

Next, we consider the entangle-measure attack. Supposing that an outsider  E v e  wants to obtain the bid of the bidder  B o b i  by performing an entangle-measure attack. We suppose  E v e  prepares an additional photon  | e  when the qubits are sent from  B o b i  to  A l i c e  and performs operation U on the system composed of decoy photons { | 0 , | 1 , | + , | } and the additional photon. We can obtain
U | 0 | e = α 0 | 0 | e 00 + β 0 | 1 | e 01 U | 1 | e = α 1 | 0 | e 10 + β 1 | 1 | e 11
U | + | e = 1 2 ( α 0 | 0 | e 00 + β 0 | 1 | e 01 ) + 1 2 ( α 1 | 0 | e 10 + β 1 | 1 | e 11 ) = 1 2 ( | + ( α 0 | e 00 + β 0 | e 01 ) ) + 1 2 ( | + ( α 1 | e 10 + β 1 | e 11 ) ) + 1 2 ( | ( α 0 | e 00 β 0 | e 01 ) ) + 1 2 ( | ( α 1 | e 10 β 1 | e 11 ) )
U | | e = 1 2 ( α 0 | 0 | e 00 + β 0 | 1 | e 01 ) 1 2 ( α 1 | 0 | e 10 + β 1 | 1 | e 11 ) = 1 2 ( | + ( α 0 | e 00 + β 0 | e 01 ) ) 1 2 ( | + ( α 1 | e 10 + β 1 | e 11 ) ) + 1 2 ( | ( α 0 | e 00 β 0 | e 01 ) ) 1 2 ( | ( α 1 | e 10 β 1 | e 11 ) )
In order not to change the state of the original particle, it is necessary to satisfy
β 0 | e 01 = 0 , α 1 | e 10 = 0 , α 0 | e 00 + β 0 | e 01 α 1 | e 10 β 1 | e 11 = 0
Obviously,  α 0 | e 00 = β 1 | e 11 . It means that  E v e  cannot distinguish between  α 0 | e 00  and  β 1 | e 11 . Consequently, the proposed protocol can resist the entangle-measure attack.

4.3. Analysis of Completeness

Next, we will continue to demonstrate that our proposed protocol meets the requirements for a secure auction, including Anonymity, Public verifiability, Accountability of bidder, Fairness, Traceability, and Non-repudiation.
(1)
Anonymity
In our protocol, the bidder applies and registers with the auction center before the auction starts, and bidders use pseudonyms to participate in the entire auction process. As a result, except for the auction center, no one can obtain any information about the bidder’s identity.
(2)
Public verifiability
Our proposed protocol incorporates a semi-honest auction center for verifying that a bidder has legitimately won the auction, and any bidder can participate in the verification process of the winner. In Step 7 of the auction stage, each bidder is required to send the same sequence to all other  n 1  bidders. Finally, they assist the auction center during the verification process, confirming that the winning bidder’s price has not changed in the verification stage. Thus, our protocol is able to satisfy public verifiability.
(3)
Accountability of bidder
By analyzing the security of the collusion attack, where the semi-honest third party and other bidders serve as monitors, it is clear that any malicious fake bidders cannot interrupt the auction without being detected. That is, it meets accountability of bidder.
(4)
Fairness
All bidders perform the same auction procedure before the bid opening, so there is no bias. In addition, under case 2 of the collusive attack analysis, the auctioneer cannot collude with any malicious bidders to help him win the auction legally.
(5)
Traceability
Since the auction center records the correspondence between the pseudonym and the real identity of the bidder,  T r e n t  can verify the identity of the winner during the verification phase.
(6)
Non-repudiation
In our protocol, the post-confirmation mechanism ensures that the bidder cannot deny having placed a bid on  A l i c e . Concurrently, auctioneer  A l i c e  cannot deny having received bids from bidders. Whether a group of bidders conspires or a dishonest bidder and a dishonest auctioneer conspire, the non-repudiation of the participants is satisfied.

5. Conclusions and Perspectives

In this paper, a new QSA protocol based on LIOP states is proposed. In this protocol, bid messages are encoded as a sequence of LIOP states, and different particles of LIOP states containing bid messages are transmitted separately. The indistinguishability of LIOP states guarantees the security of secret messages. The analysis of security shows that neither an external attacker nor a group of bidders colluding can obtain any secret messages. In addition, the auctioneer’s collusion with the bidders is immediately detected. Compared with previous protocols, our protocol is easier to implement because it does not introduce entanglement. Finally, due to the high privacy protection and availability, it is hoped that the proposed scheme has a wider application prospect. The properties of LIOP states provide new perspectives for the design of future quantum cryptography protocols.

Author Contributions

Conceptualization, S.W., L.Z. and Z.S.; methodology, S.W.; software, S.W.; validation, S.W., L.Z., Z.S., D.D. and K.H.; writing-original draft preparation, S.W.; writing-review and editing, S.W., L.Z. and Z.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (Grant no. 62271234), Heilongjiang Provincial Natural Science Foundation of China (Grant nos. YQ2020F013 and LH2019F031), Double First-Class Project for Collaborative Innovation Achievements in Disciplines Construction in Heilongjiang Province (Grant no. LJGXCG2022-054), Open Foundation of State Key Laboratory of Public Big Data (Guizhou University) (Grant no. PBD2022-16), Shenzhen Science and Technology Program (Grant no. JCYJ20210324100813034), Shenzhen Polytechnic Research Foundation (Grant no. 6022310031K).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
QSAQuantum Sealed-bid Auction
LIOPLocally Indistinguishable Orthogonal Product
LOCCLocal Operations and Classical Communication
TPThird Party

References

  1. Li, D.D.; Tang, Y.L.; Zhao, Y.K.; Zhou, L.; Zhao, Y.; Tang, S.-B. Security of optical beam splitter in quantum key distribution. Photonics 2022, 9, 527. [Google Scholar] [CrossRef]
  2. Mafu, M.; Sekga, C.; Senekane, M. Security of Bennett–Brassard 1984 quantum-key distribution under a collective-rotation noise channel. Photonics 2022, 9, 941. [Google Scholar] [CrossRef]
  3. Jiang, X.L.; Deng, X.Q.; Wang, Y.; Lu, Y.F.; Li, J.J.; Zhou, C.; Bao, W.S. Weak randomness analysis of measurement-device independent quantum key distribution with finite resources. Photonics 2022, 9, 356. [Google Scholar] [CrossRef]
  4. Wang, N.; Tian, X.; Zhang, X.; Lin, S. Quantum Secure Multi-Party Summation with Identity Authentication Based on Commutative Encryption. Photonics 2023, 10, 558. [Google Scholar] [CrossRef]
  5. Paraiso, T.K.; Woodward, R.I.; Marangon, D.G.; Lovic, V.; Yuan, Z.; Shields, A.J. Advanced laser technology for quantum communications (tutorial review). Adv. Quantum Technol. 2021, 4, 2100062. [Google Scholar] [CrossRef]
  6. Montenegro, J.; Fischer, M.; Lopez, J.; Peralta, R. Secure sealed-bid online auctions using discreet cryptographic proofs. Math. Comput. Mode 2013, 57, 2583–2595. [Google Scholar] [CrossRef]
  7. Naseri, M. Secure quantum sealed-bid auction. Opt. Commun. 2009, 282, 1939–1943. [Google Scholar] [CrossRef]
  8. Qin, S.J.; Gao, F.; Wen, Q.Y.; Meng, L.M.; Zhu, F.C. Cryptanalysis and improvement of a secure quantum sealed-bid auction. Opt. Commun. 2009, 282, 4014–4016. [Google Scholar] [CrossRef]
  9. Yang, Y.G.; Naseri, M.; Wen, Q.Y. Improved secure quantum sealed-bid auction. Opt. Commun. 2009, 282, 4167–4170. [Google Scholar] [CrossRef]
  10. Zhao, Z.W.; Naseri, M.; Zheng, Y.Q. Secure quantum sealed-bid auction with post confirmation. Opt. Commun. 2010, 283, 3194–3197. [Google Scholar] [CrossRef]
  11. Xu, G.A.; Zhao, Z.W.; Chen, X.B.; Yang, Y.X. Cryptanalysis and improvement of the secure quantum sealed-bid auction with postconfirmation. Int. J. Theor. Phys. 2011, 9, 1383–1392. [Google Scholar] [CrossRef]
  12. He, L.B.; Huang, L.S.; Yang, W.; Xu, R.; Han, D.Q. Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation. Quantum Inf. Process. 2012, 11, 1359–1369. [Google Scholar] [CrossRef]
  13. Wang, Z.Y. Quantum secure direct communication and quantum sealed bid auction with EPR pairs. Commun. Theor. Phys. 2010, 54, 997–1002. [Google Scholar] [CrossRef]
  14. Liu, W.J.; Wang, F.; Sai, J.; Qu, Z.G.; Wang, X.J. Attacks and improvement of quantum sealed-bid auction with EPR pairs. Commun. Theor.Phys. 2014, 61, 686–690. [Google Scholar] [CrossRef]
  15. Liu, W.J.; Wang, H.B.; Yuan, G.L.; Xu, Y.; Chen, Z.Y.; An, X.X.; Ji, F.G.; Gnitou, G.T. Multiparty quantum sealed-bid auction using single photons as message carrier. Quantum Inf. Process. 2015, 15, 869–879. [Google Scholar] [CrossRef] [Green Version]
  16. Zhang, K.J.; Kwek, L.C.; Ma, C.G.; Zhang, L.; Sun, H.W. Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons. Quantum Inf. Process. 2018, 17, 38. [Google Scholar] [CrossRef]
  17. Han, X.Q. Quantum Sealed-Bid Auction Protocol Based on Semi-honest Model. Int. J. Theor. Phys. 2020, 59, 3778–3788. [Google Scholar] [CrossRef]
  18. Gao, W.; Shi, R.H.; Wu, M. A privacy-preserving quantum sealed-bid auction protocol with EPR pairs. Quantum Inf. Process. 2022, 21, 1. [Google Scholar] [CrossRef]
  19. Luo, Y.; Zhao, Z.W.; Zhao, Z.J.; Long, H.M.; Su, W.; Yang, Y.X. The loophole of the improved secure quantum sealed-bid auction with post confirmation and solution. Quantum Inf. Process. 2013, 12, 295–302. [Google Scholar] [CrossRef]
  20. Wang, Q.L.; Zhang, W.W.; Su, Q. Revisiting “The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution”. Int. J. Theor. Phys. 2014, 53, 3147–3153. [Google Scholar] [CrossRef]
  21. Wang, J.T.; Chen, X.B.; Xu, G.; Meng, X.H.; Yang, Y.X. A new quantum sealed-bid auction protocol with secret order in post-confirmation. Quantum Inf. Process. 2015, 14, 3899–3911. [Google Scholar] [CrossRef]
  22. Zhang, R.; Shi, R.H.; Qin, J.Q. An economic and feasible Quantum Sealed-bid Auction protocol. Quantum Inf. Process. 2018, 17, 35. [Google Scholar] [CrossRef]
  23. Shi, R.H.; Li, Y.F. A Feasible Quantum Sealed-Bid Auction Scheme without an Auctioneer. IEEE Trans. Quantum Eng. 2022, 3, 2100212. [Google Scholar] [CrossRef]
  24. Wang, J.T.; Pan, Y.; Liu, W.; Li, Z.Z. Quantum sealed-bid auction protocol based on quantum secret sharing. Quantum Inf. Process. 2022, 21, 278. [Google Scholar] [CrossRef]
  25. Yu, S.; Oh, C.H. Detecting the local indistinguishability of maximally entangled states. arXiv 2015, arXiv:1502.01274. [Google Scholar]
  26. Guo, G.P.; Li, C.F.; Shi, B.S.; Li, J.; Guo, G.C. Quantum key distribution scheme with orthogonal product states. Phys. Rev. A 2001, 64, 042301. [Google Scholar] [CrossRef] [Green Version]
  27. Jiang, D.H.; Wang, J.; Liang, X.Q.; Xu, G.B.; Qi, H.F. Quantum voting scheme based on locally indistinguishable orthogonal product states. Int. J. Theor. Phys. 2020, 59, 436–444. [Google Scholar] [CrossRef]
  28. Jiang, D.H.; Hu, Q.Z.; Liang, X.Q.; Xu, G.B. A trusted third-party E-payment protocol based on locally indistinguishable orthogonal product states. Int. J. Theor. Phys. 2020, 59, 1442–1450. [Google Scholar] [CrossRef]
  29. Fu, S.J.; Zhang, K.J.; Zhang, L.; Hou, K.C. A new non-entangled quantum secret sharing protocol among different nodes in further quantum networks. Front. Phys. 2022, 10, 1021113. [Google Scholar] [CrossRef]
  30. Liu, G.; Zhang, J.Z.; Xie, S.C. Multiparty Sealed-Bid Auction Protocol Based on the Correlation of Four-Particle Entangled State. Int. J. Theor. Phys. 2018, 57, 3141–3148. [Google Scholar] [CrossRef]
  31. Bennett, C.H.; DiVincenzo, D.P.; Fuchs, C.A.; Mor, T.; Rains, E.; Shor, P.W.; Smolin, J.A.; Wootters, W.K. Quantum nonlocality without entanglement. Phys. Rev. A 1999, 59, 1070. [Google Scholar] [CrossRef] [Green Version]
  32. Hogg, T.; Harsha, P.; Chen, K.Y. Quantum auctions. Int. J. Theor. Phys. 2007, 5, 751–780. [Google Scholar] [CrossRef]
Figure 1. The process of preparation stage.
Figure 1. The process of preparation stage.
Photonics 10 00807 g001
Figure 2. The process of auction stage. Step 5 and Step 9 are measurement processes.  B o b i  and  B o b j  indicate different bidders. ( i , j = 1 , 2 , , n , i j ).
Figure 2. The process of auction stage. Step 5 and Step 9 are measurement processes.  B o b i  and  B o b j  indicate different bidders. ( i , j = 1 , 2 , , n , i j ).
Photonics 10 00807 g002
Figure 3. The process of a specific example.
Figure 3. The process of a specific example.
Photonics 10 00807 g003
Figure 4. The sketch of the probability of successful  E v e  attacks.
Figure 4. The sketch of the probability of successful  E v e  attacks.
Photonics 10 00807 g004
Figure 5. The sketch of the probability of successful  T P  attacks.
Figure 5. The sketch of the probability of successful  T P  attacks.
Photonics 10 00807 g005
Figure 6. The sketch of the probability of a group of bidders attacking successfully.
Figure 6. The sketch of the probability of a group of bidders attacking successfully.
Photonics 10 00807 g006
Table 1. Coding rule of bid message  M i .
Table 1. Coding rule of bid message  M i .
  M it The Quantum Sequence of Encoding
000   | φ 1 = | 0 1 | 0 2 | 0 3
001   | φ 2 = | 1 1 | 1 2 | 1 3
010   | φ 3 = | + 1 | 0 2 | 1 3
011   | φ 4 = | 1 | 0 2 | 1 3
100   | φ 5 = | 1 1 | + 2 | 0 3
101   | φ 6 = | 1 1 | 2 | 0 3
110   | φ 7 = | 0 1 | 1 2 | + 3
111   | φ 8 = | 0 1 | 1 2 | 3
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, S.; Zhang, L.; Sun, Z.; Dai, D.; Hou, K. A New Quantum Sealed-Bid Auction Protocol with a Set of Local Indistinguishable Orthogonal Product States. Photonics 2023, 10, 807. https://doi.org/10.3390/photonics10070807

AMA Style

Wang S, Zhang L, Sun Z, Dai D, Hou K. A New Quantum Sealed-Bid Auction Protocol with a Set of Local Indistinguishable Orthogonal Product States. Photonics. 2023; 10(7):807. https://doi.org/10.3390/photonics10070807

Chicago/Turabian Style

Wang, Sainan, Long Zhang, Zhiwei Sun, Daxin Dai, and Kunchi Hou. 2023. "A New Quantum Sealed-Bid Auction Protocol with a Set of Local Indistinguishable Orthogonal Product States" Photonics 10, no. 7: 807. https://doi.org/10.3390/photonics10070807

APA Style

Wang, S., Zhang, L., Sun, Z., Dai, D., & Hou, K. (2023). A New Quantum Sealed-Bid Auction Protocol with a Set of Local Indistinguishable Orthogonal Product States. Photonics, 10(7), 807. https://doi.org/10.3390/photonics10070807

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop