Journals
Advanced Photonics
Photonics Insights
Advanced Photonics Nexus
Photonics Research
Advanced Imaging
View All Journals
Chinese Optics Letters
High Power Laser Science and Engineering
Articles
Optics
Physics
Geography
View All Subjects
Conferences
CIOP
HPLSE
AP
View All Events
News
About CLP
Search by keywords or author
Login
Registration
Login in
Registration
Search
Search
Articles
Journals
News
Advanced Search
Top Searches
laser
the
2D Materials
Transformation optics
Quantum Photonics
Home
All Issues
Journals >
>
Topics >
Quantum Physics and Quantum Information
Contents
Quantum Physics and Quantum Information
|
1 Article(s)
Cryptanalysis and improvement of several quantum private comparison protocols
Zhao-Xu Ji, Pei-Ru Fan, Huan-Guo Zhang, and Hou-Zhen Wang
AbstractRecently, Wu et al (2019 Int. J. Theor. Phys.58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol (2017 Int. J. Theor. Phys.56 1517), that is, a malicious participant can steal another’s secret data without being detected through an active attack means. In this paper, we show that Wu et al’s active attack is also effective for several other existing protocols, including the ones proposed by Ji et al and Zha et al (2016 Commun. Theor. Phys.65 711; 2018 Int. J. Theor. Phys.57 3874). In addition, we propose what a passive attack means, which is different from Wu et al’s active attack in that the malicious participant can easily steal another’s secret data only by using his own secret data after finishing the protocol, instead of stealing the data by forging identities when executing the protocol. Furthermore, we find that several other existing quantum private comparison protocols also have such an information leakage problem. In response to the problem, we propose a simple solution, which is more efficient than the ones proposed by Wu et al, because it does not consume additional classical and quantum resources.
AbstractRecently, Wu et al (2019 Int. J. Theor. Phys.58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol (2017 Int. J. Theor. Phys.56 1517), that is, a malicious participant can steal another’s secret data without being detected through an active attack means. In this paper, we show that Wu et al’s active attack is also effective for several other existing protocols, including the ones proposed by Ji et al and Zha et al (2016 Commun. Theor. Phys.65 711; 2018 Int. J. Theor. Phys.57 3874). In addition, we propose what a passive attack means, which is different from Wu et al’s active attack in that the malicious participant can easily steal another’s secret data only by using his own secret data after finishing the protocol, instead of stealing the data by forging identities when executing the protocol. Furthermore, we find that several other existing quantum private comparison protocols also have such an information leakage problem. In response to the problem, we propose a simple solution, which is more efficient than the ones proposed by Wu et al, because it does not consume additional classical and quantum resources.
showLess
Communications in Theoretical Physics
Publication Date: Jan. 01, 2020
Vol. 72, Issue 8, (2020)
Get PDF
View fulltext
Topics
Quantum Physics and Quantum Information