Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (2)

Search Parameters:
Keywords = multi-party quantum private comparison (MQPC)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
14 pages, 254 KB  
Article
Multiparty Quantum Private Comparison Using Rotation Operations
by Min Hou and Yue Wu
Axioms 2025, 14(4), 274; https://doi.org/10.3390/axioms14040274 - 3 Apr 2025
Cited by 1 | Viewed by 446
Abstract
This paper presents a multiparty quantum private comparison (MQPC) protocol that facilitates multiple users to compare the equality of their private inputs while preserving the confidentiality of each input through the principles of quantum mechanics. In our approach, users initially convert their secret [...] Read more.
This paper presents a multiparty quantum private comparison (MQPC) protocol that facilitates multiple users to compare the equality of their private inputs while preserving the confidentiality of each input through the principles of quantum mechanics. In our approach, users initially convert their secret integers into binary representations, which are then encoded into single photons that act as carriers of the information. These encoded single-photon states undergo encryption via rotational operations, effectively obscuring the original inputs before transmission to a semi-honest third party (TP). The TP decrypts the quantum states and conducts Z-basis measurements to derive the comparison results. To enhance security, the protocol incorporates decoy photons, enabling participants to detect potential eavesdropping on the quantum channel. Importantly, even if the TP or other participants attempt to glean insights into each other’s inputs, the encryption via rotational operations ensures that private information remains inaccessible. This protocol demonstrates significant advancements in practicality compared to existing MQPC frameworks that rely on complex quantum technologies, such as entanglement swapping and multi-particle entanglement. By leveraging the simplicity of single photons, rotation operations, and Z-basis measurements, our protocol is more accessible for implementation. Full article
(This article belongs to the Section Mathematical Physics)
12 pages, 539 KB  
Article
Multi-Party Quantum Private Comparison Based on Bell States
by Wanqing Wu, Jiahui Wu and Lingna Guo
Entropy 2023, 25(8), 1156; https://doi.org/10.3390/e25081156 - 2 Aug 2023
Cited by 5 | Viewed by 1679
Abstract
Multi-party quantum private comparison (MQPC) assumes responsibility for overseeing the flow of data and communication among diverse entities, wherein it boasts powerful security capabilities that have garnered substantial attention. Most current MQPC protocols rely on difficult-to-prepare quantum states and are inefficient in their [...] Read more.
Multi-party quantum private comparison (MQPC) assumes responsibility for overseeing the flow of data and communication among diverse entities, wherein it boasts powerful security capabilities that have garnered substantial attention. Most current MQPC protocols rely on difficult-to-prepare quantum states and are inefficient in their use of resources. In this paper, we propose a novel MQPC protocol without entanglement swapping, thereby building upon the assumption of an ideal channel. This protocol is based on Bell states, which simplifies implementation and addresses the challenges associated with using complex quantum states; it also enables the comparison of secret information by having a trusted party prepare and transmit encoded quantum sequences to participants, thereby facilitating efficient equality comparison among all parties. Our MQPC protocol showcased remarkable efficiency in comparison to existing protocols for quantum private comparison. Furthermore, the incorporation of decoy photon and shared key technologies made external and internal attacks ineffective, thereby ensuring the utmost security and integrity of the protocol. Full article
(This article belongs to the Section Quantum Information)
Show Figures

Figure 1

Back to TopTop