2015
DOI: 10.1007/s11128-015-0956-6
|View full text |Cite
|
Sign up to set email alerts
|

Quantum private comparison with a malicious third party

Abstract: In this paper, we will show that quantum private comparison protocol is secure when a malicious third party is presented. The security of the protocol is considered in a cheat-sensitive model, in which the TP is kept honest by the possibility of being caught cheating. Besides, we enhance the privacy of the quantum private comparison protocol, where the participants' inputs and the comparison result can be preserved. Furthermore, in contrast to pervious protocols requiring a large amount of quantum resources, s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
10

Relationship

2
8

Authors

Journals

citations
Cited by 47 publications
(22 citation statements)
references
References 35 publications
0
22
0
Order By: Relevance
“…To clarify, assume we have a secret a and an encryption key b and c = a ⊕ b . The probability of an attacker to know a is , where n is the length of the secret a 53 . In the proposed protocol, from TP 2 ’s point of view, as shown in Table 4, X 12 = X 1 ⊕ X 2 .…”
Section: Correctnessmentioning
confidence: 99%
“…To clarify, assume we have a secret a and an encryption key b and c = a ⊕ b . The probability of an attacker to know a is , where n is the length of the secret a 53 . In the proposed protocol, from TP 2 ’s point of view, as shown in Table 4, X 12 = X 1 ⊕ X 2 .…”
Section: Correctnessmentioning
confidence: 99%
“…Without difficulty, the semi-honest TP is the most reasonable model. Furthermore, Sun et al [57] proposed a secured QPC protocol with another adversary model where the TP is malicious, in which the TP may execute the protocol at his/her wishes for learning further information. Recently, Hung et al [58] proposed a QPC protocol with two TPs, the first TP is malicious and his role is to announce the final comparison result, while the second TP monitors the first one and detect whether the first TP announces a correct comparison result or not.…”
Section: Introductionmentioning
confidence: 99%
“…A quantum cryptographic protocol is secure if no information about the secret key is leaked; otherwise, it will be aborted. So far various subfields of quantum cryptography have emerged to offer different functions, such as quantum secure direct communication 19 , quantum private comparison 1014 , quantum signature 15,16 , and quantum oblivious transfer 17 .…”
Section: Introductionmentioning
confidence: 99%