亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Semi-quantum private comparison protocol of size relation with d-dimensional GHZ states

        2022-01-23 06:34:16BingWang王冰SanQiuLiu劉三秋andLiHuaGong龔黎華
        Chinese Physics B 2022年1期
        關鍵詞:王冰

        Bing Wang(王冰) San-Qiu Liu(劉三秋) and Li-Hua Gong(龔黎華)

        1Jiangxi Province Key Laboratory of Fusion and Information Control,Department of Physics,Nanchang University,Nanchang 330031,China

        2School of Materials Science and Engineering,Nanchang University,Nanchang 330031,China

        3NCU-ASIPP Magnetic Confinement Fusion Joint Lab,Institute of Fusion Energy and Plasma Application,Nanchang University,Nanchang 330031,China

        4Department of Electronic Information Engineering,Nanchang University,Nanchang 330031,China

        Keywords: semi-quantum private comparison,size relation,dimensional GHZ state,qubit efficiency

        1. Introduction

        To date, quantum cryptography has been gained considerable attention worldwide. Many secure quantum cryptographic protocols have been designed, such as quantum key distribution (QKD),[1-5]quantum secret sharing (QSS),[6-8]quantum secure direct communication(QSDC),[2,9-11]and so on. Recently,some new research fields of quantum cryptography have emerged including quantum homomorphic encryption (QHE),[12]quantum information splitting,[13]quantum private comparison (QPC). Since the first QPC protocol was proposed by Yang and Wen in 2009, QPC has become a hot topic.[14]By utilizing Bell state,hash function and decoy photons, their protocol can compare the equality of two parties’secrets. In 2010, Chenet al.devised a new QPC protocols which can also compare the equality of privacies.[15]Later, a new type of QPC protocol allowing clients to execute quantum processing on a remote server was presented,[16]with the duality quantum formalism.[17]Although many QPC protocols were proposed,all participants need to be equipped with advanced quantum devices, such as quantum measurement,quantum state generator, or quantum unitary operation.[18-22]To reduce the consumption of quantum devices,an innovative concept of semi-quantum theory has been put forward.[23,24]In the semi-quantum mode,quantum party owns the powerful quantum capability and can prepare quantum state, perform quantum measurement and store qubits in quantum memory,while classical parties only have limited quantum capability and can perform the following classical operations:

        (1)Let particle go back without disturbance.

        (2)Measure the particle withZbasis,prepare a new state inZbasis and distribute it back.

        (3)Reorder particles with different delay lines.

        Not all participants could afford the expensive quantum equipment, semi-quantum theory is very practical and convenient in the near future application, therefore semiquantum key distribution (SQKD),[25-29]semi-quantum secret sharing (SQSS),[30,31]semi-quantum private comparison(SQPC)[32-35]were investigated widely. Chouet al.proposed the first SQPC protocol, allowing two classical participants to compare the equality of their secrets with the help of an almost-dishonest third party.[32]In 2020,Jiang devised two semi-quantum private comparison protocols based on Bell states to compare the equality of two classical participants’ secrets.[36]Most previous private comparison protocols based on semi-quantum theory can only compare the equality of privacies between two classical participants. Fortunately, in 2021, Zhouet al.presented a semi-quantum private comparison protocol to compare the size relationship of two-participant’s secrets under the assistance of a semi-honest third party,and the qubit efficiency is raised to be comparable with the existing semi-quantum private comparison protocols at the cost of preparation of the classical authenticated channel in advance by classical participants.[37]

        It is generally known that a quantum two-party secure computation is impossible.[38]However, this goal may be achieved if additional assumptions were made,such as adding a third party. A semi-honest third party (STP) should follow the procedure of the protocol,take a record of all intermediate computation and prevent the results from being corrupted by an outside eavesdropper. However, STP may attempt to steal the information from the record.

        Motivated by Refs. [36,37,39], we propose a novel efficient private comparison protocol based on thed-dimensional GHZ states. Under the assistance of a semi-honest third party,our protocol can judge the size relationship of the privacies between Alice and Bob. The rest of this paper is organized as follows: In Section 2,we give a detailed description of the proposed protocol. In Section 3, the correctness of the output result is analyzed and some examples are listed for better understanding. In Section 4, the security of the proposed protocol is analyzed. The attacks from external and internal are invalid to our protocol. In Section 5,the comparisons between our SQPC and those previous typical SQPC protocols are given. Finally,a short conclusion is provided in Section 6.

        2. Semi-quantum private comparison protocol of size relation

        2.1. Preparation for the protocol

        The quantum resource used in our SQCP isd-dimensional GHZ state. In ad-dimensional Hilbert space, according to three variablesu1,u2,u3∈{0,1,...,d-1}, ad-dimensional GHZ state can be expressed as[39,40]

        Step 3 STP informs Alice and Bob of his receipts and stores sequencesSA′ andSB′ in quantum memory. After that,Alice and Bob announce the operations performed on particles to STP. Based on the announced information, STP selects to execute the corresponding operations demonstrated in Table 2 on these received particles.

        Case 1 If both Alice and Bob choose to execute operation(1)on the received particles at the same location(K′iABis 00),then STP will performd-dimensional Bell state measurement on the received particles A and B (action 1). It is well known that three-particle GHZ state can be expressed as

        From Eq.(4),STP could know whether there is an eavesdropper or not by comparing the measurement outcomes with the initial states. If the Bell measurement is|φ+〉AB,then there is no eavesdropping,this protocol will proceed to the next case.Otherwise,they will abort the protocol.

        Case 2 If Alice chooses to apply operation (1) and Bob executes operation(2)on the received particles at the same location (K′iABis 01), then STP will implement action 2 (STP executesd-dimensional Bell state measurement on particles A and T). From Eq. (4), STP could know whether there is an eavesdropper or not by comparing the measurement outcomes with the initial states. If the Bell measurement is|φ+〉AT,then there is no eavesdropping, this protocol will proceed to the next case. Otherwise,they will abort the protocol.

        Case 3 If Alice chooses to apply operation(2)and Bob executes operation (1) (K′iABis 10) on the received particles at the same location, then STP will implement action 3(STP performsd-dimensional Bell state measurement on particles B and T).From Eq.(4)STP could know whether there exists an eavesdropper or not by comparing the measurement outcomes with the initial states. If the Bell measurement is|φ+〉BT,then there is no eavesdropping, this protocol will proceed to the next case. Otherwise,they will abort the protocol.

        Case 4 If both Alice and Bob choose to apply operation(2) on the received particles at the same location, then STP will implement action 4 (STP calculatesTi=SiA′?SiB′⊕u2,where?represents the moduledsubtraction). STP can obtain the calculated results sign[Ti],

        Table 2. Actions of STP.

        3. Correctness analyses

        3.1. Output correctness

        From Eqs. (5) and (6), one can see that if the value ofTiis greater than 0 and less thanh, then STP could obtain sign[Ti]=1,soxi>yi,otherwisexi ≤yi.

        3.2. Examples

        From the examples listed in Table 3,one can see that two participants can achieve a private comparison by the proposed protocol. Meanwhile,it is evident that the correctness and the effectiveness are satisfied.

        Table 3. Relation of essential indexes for some examples.

        4. Security analysis

        4.1. External attack

        Eve, an external attack, wants to steal the information from the participants including STP,Alice and Bob. It is well known that as long as there are particles transmitting in the channel, Eve may use many common attacks to obtain some useful information, such as the intercept-measure-resend attack, the entanglement attack and the Trojan horse attack.Next,the security of the proposed protocol will be analyzed.

        4.1.1. Intercept-measure-resend attack

        In step 1, there are transmissions of particles. Suppose that Eve implements the intercept-measure-resend attack,she would intercept the particles transmitted from STP to Alice(Bob) and measure them with single measurement. Subsequently, she produces new particles whose states are same as the measurement results and sends them to Alice (Bob). Although Eve could not be perceived in cases 4 and 3 (2), her measurement will destroy the correlation of states in cases 1 and 2 (3). From Eq. (4) and Table 2, one can obtain the following details:

        In case 1,Eves’measurement will destroy the correlation ofd-dimensional Bell state on particles A and B.

        In case 2 (3), Eves’ measurement on particle A (B) will destroy the correlation ofd-dimensional Bell state on particles A(B)and T.

        If Eve implements the intercept-measure-resend attack to each particle from sequenceSA(SB), the probability that she was not found is 1/2. Thus, the total probabilitypthat he would not be detected is 1/24N, where 4Nis the total number of GHZ states prepared by STP. Via preparing plenty ofd-dimensional GHZ states, the probability that STP detects Eve’s operation is approximately 1. It can be concluded that Eve cannot obtain any information about the secretsXandYfrom Alice and Bob by launching the intercept-measureresend attack without being discovered in step 1.

        In step 2, Alice (Bob) sends sequenceSA′(SB′) to STP.Although there are transmissions of particles, Eve does not know the choice of Alice(Bob)in advance and cannot do exactly as what Alice (Bob) does. Provided that Eve conducts measurement on these particles in cases 1,2 and 3,it will cause errors and destroy the correlation of these Bell states. In case 4,though Eve may get the values ofSiA′andSiB′,she does not knowmiaandmib. Therefore,it can be concluded that Eve cannot obtain any information about secretsXandYfrom Alice and Bob by launching the intercept-measure-resend attack in step 2.

        In step 3, because there is no particle transmission, the secrets ofXandYwill not leak.

        4.1.2. Entangle attack

        When the particles were transmitted in the quantum channel,Eve may use entanglement attack to obtain more information. First,Eve will apply unitary operationUE,and then she will attach an auxiliary entanglement state|E〉to these particles as follows:[39]

        Equation(13)tells us that Eve does not discriminate|ε00|from others. That is to say,Eve cannot obtain any information from the particles transmitted in quantum channel by launching entanglement attack on our protocol.

        4.1.3. Trojan horse attack

        Since the particles prepared by STP in the beginning are transmitted in a round trip in our protocol, Trojan horse attack should be considered as an outside eavesdropper, which generally includes invisible photon eavesdropping attack and delay-photon attack.[42,43]To resist these kinds of attacks,every participant should be equipped with photon filter and photon number splitter. For example,the particle receiver inserts a photon filter in the front of her(his)devices to filter out the photon signal with an illegitimate wavelength,which can withstand the invisible photon eavesdropping and the Trojan horse attack.

        4.2. Internal attack

        Participant attack,an attack from dishonest participant,is more powerful.[44]We will analyze the attacks from two types of participants,i.e.,dishonest Alice(Bob)and semi-dishonest TP.

        4.2.1. Attack from dishonest Alice (Bob)

        Without loss of generality, the role of Alice is similar to Bob’s. One only analyzes the chance of Alice stealing Bob’s key. Alice(Bob)attempts to obtain some informationSB(SA)from step 1 andSB′(SA′)from step 2.

        In steps 1 and 2,although Alice and Bob shared the same key, they do not know the corresponding rules between the keys and the specific operation of the other participant. Therefore, Alice’s (Bob’s) attack will be detected as an external attack as described in Section 4.11. Hence, one can draw a conclusion that Alice(Bob)could not have the knowledge of secretX(Y).

        4.2.2. Attack from semi-dishonest TP

        We know that STP can obtain the information fromSA(SB)andSA′(SB′)easily,which provides him more power to attack the protocol. However, sinceKABis distributed between Alice and Bob via a secure QKD protocol, STP is unable to learn the value ofKAB. That is,STP cannot learn any information from the secretsXandYby launching the internal attack.

        5. Discussion

        The comparisons among our protocol and those previous typical SQPC protocols in Refs. [35-37] are compiled in Table 4.

        Like the protocol in Ref. [37], our protocol could also compare the size relation of two classical participants’ input integers,while the SQPC protocol in Refs.[35,36]only could compare the equality of them.

        It is well known that the qubit efficiency is expressed ase=bc/bt, wherebcis the number of compared bits in each comparison andbtis the total number of generated particles in each comparison. Applying our protocol to compare twoparty secrets of 2 bits,TP should produce fourd-dimensional GHZ states, i.e., twelve particles. Alice (Bob) selects operation (1) or (2) with equal probability, twoZbasis particles are generated by her(him). Therefore,the qubit efficiency of our protocol is 12.5%. Although most of the protocols mentioned in Table 4 need to share the key in advance, the qubit efficiency of our protocol is the highest,while that in Ref.[35]is the lowest.

        Table 4. Comparisons between our SQPC and those previous SQPC protocols.

        The classical participants do not need to prepare classical authentication channel in our protocol in advance, which makes the private comparison easier to operate. In addition, the encrypted privaciesSiA′=xi ⊕mia⊕KiABandSiB′=yi ⊕mib⊕KiABare sent to STP via quantum channel, which reduces the probability of information leakage.

        In our protocol, all participants hardly disclose any information about particles including the position and values of some particles, which can also greatly reduce the possibility of information leakage.

        6. Conclusion

        Based on the entangledd-dimensional GHZ states,a new efficient semi-quantum private comparison protocol is presented with the help of a semi-honest TP. Our protocol can compare the size relation of private information between two classical participants. Compared to existing SQPC protocols,our protocol could achieve higher qubit efficiency.

        Acknowledgements

        Project supported by the National Natural Science Foundation of China (Grant Nos. 62161025 and 61871205), the Project of Scientific and Technological Innovation Base of Jiangxi Province, China (Grant No. 20203CCD46008), and the Jiangxi Provincial Key Laboratory of Fusion and Information Control,China(Grant No.20171BCD40005).

        猜你喜歡
        王冰
        Analyze the opportunities and challenges faced by financial accounting in the era of big data
        Erratum to: Seabed domes with circular depressions in the North Yellow Sea*
        Seabed domes with circular depressions in the North Yellow Sea*
        錯在哪 ?
        巧裝蛋糕
        爺爺?shù)目碱}
        名落孫山
        說話不要太嗆人
        會變的折扇
        財主的金元寶
        亚洲人成人网站在线观看| 色翁荡息又大又硬又粗视频| 免费国产自拍在线观看| 亚洲欧美v国产一区二区| 精品国产拍国产天天人| 色婷婷久久一区二区三区麻豆| 亚洲最新偷拍网站| 日本丰满熟妇hd| 人人妻人人澡人人爽人人精品电影| 亚洲VA中文字幕无码毛片春药 | 一本久道久久丁香狠狠躁| 成人国产一区二区三区| 亚洲sm另类一区二区三区| 久久和欧洲码一码二码三码| 欧美日韩亚洲精品瑜伽裤| 亚洲欧洲无码精品ⅤA| 国产成人精品一区二区日出白浆| 一区二区高清视频免费在线观看| 久久国产精品亚洲婷婷片 | 狠狠噜天天噜日日噜视频麻豆| 精品少妇大屁股白浆无码| 国产一级r片内射免费视频| 国产午夜三级精品久久久| 中国亚洲一区二区视频| 国产午夜福利久久精品| 国产久热精品无码激情| 亚洲国产一区在线二区三区| 激情人妻网址| 国产在线观看视频一区二区三区| 偷看农村妇女牲交| 黑人大荫道bbwbbb高潮潮喷| 亚洲三级黄色| 精品人妻一区二区三区蜜桃| 中文字幕第一页人妻丝袜| 国产精品久久久久久久妇| 99久热re在线精品99 6热视频| 亚洲欧美日韩精品久久亚洲区色播| 色av色婷婷18人妻久久久| 偷拍一区二区盗摄视频| 小辣椒福利视频导航| 国产精品天堂|