• Communications in Theoretical Physics
  • Vol. 72, Issue 8, (2020)
Zhao-Xu Ji, Pei-Ru Fan, Huan-Guo Zhang, and Hou-Zhen Wang
Author Affiliations
  • Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
  • show less
    DOI: 10.1088/1572-9494/ab8a0c Cite this Article
    Zhao-Xu Ji, Pei-Ru Fan, Huan-Guo Zhang, Hou-Zhen Wang. Cryptanalysis and improvement of several quantum private comparison protocols[J]. Communications in Theoretical Physics, 2020, 72(8): Copy Citation Text show less

    Abstract

    AbstractRecently, Wu et al (2019 Int. J. Theor. Phys.58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol (2017 Int. J. Theor. Phys.56 1517), that is, a malicious participant can steal another’s secret data without being detected through an active attack means. In this paper, we show that Wu et al’s active attack is also effective for several other existing protocols, including the ones proposed by Ji et al and Zha et al (2016 Commun. Theor. Phys.65 711; 2018 Int. J. Theor. Phys.57 3874). In addition, we propose what a passive attack means, which is different from Wu et al’s active attack in that the malicious participant can easily steal another’s secret data only by using his own secret data after finishing the protocol, instead of stealing the data by forging identities when executing the protocol. Furthermore, we find that several other existing quantum private comparison protocols also have such an information leakage problem. In response to the problem, we propose a simple solution, which is more efficient than the ones proposed by Wu et al, because it does not consume additional classical and quantum resources.
    Zhao-Xu Ji, Pei-Ru Fan, Huan-Guo Zhang, Hou-Zhen Wang. Cryptanalysis and improvement of several quantum private comparison protocols[J]. Communications in Theoretical Physics, 2020, 72(8):
    Download Citation