Background technology
Multi-party computations (the Secure Multi-party that Yao A C [1] introduces first in millionaires' problem
Computation, SMPC), it is a basic and important topic in classical cryptoraphy.Millionaires' problem at Yao A C
In, two millionaires wish to know that who is more rich on the premise of not being leaked to each other by the exact amount of property.Then,
Boudot F etc. [2] construct an equality comparative approach and judge that two millionaires are the most equal rich.SMPC can quilt
Be applied to many occasions, such as concealed bid and auction, elect by secret ballot, ecommerce, data mining etc..
As a kind of special SMPC, classical privacy compares the mesh of (Classical Private Comparison, CPC)
It is marked on the secret in the different both sides of judgement the most equal and do not reveal their actual value.Along with the development of quantum techniques, CPC is
Produce quantum privacy compare (Quantum Private Comparison, QPC) through being generalized to quantum regime, the latter's
Safety is based on principle of quantum mechanics rather than computational complexity.But, Lo H K [3] points out, under both sides' situation, and equality
Function cannot be weighed safely.This situation be accomplished by some extra it is assumed that such as one third party (Third Party,
TP)。
First QPC method by [4] such as Yang Y G by utilizing Einstein-Podolsky-Rosen (EPR) right
Help with a TP designs.The safety of this method is based on one-way Hash function.Specifically, two users
Secret encrypted by one-way Hash function after, they are coded into EPR pair by operation at local tenth of the twelve Earthly Branches.The same year, based on single photon
QPC method is designed by [5] such as Yang Y G.In this approach, the secret two users is added by one-way Hash function
After close, they are coded into single photon by operation at the tenth of the twelve Earthly Branches.In 2010, based on Greenberger-Horne-Zeilinger
(GHZ) the QPC method of state is designed by [6] such as Chen X B, and the secret of two of which user is by by original GHZ state
Particle carries out single-particle and measures the one time key encryption produced.In this approach, TP needs to perform operation at the tenth of the twelve Earthly Branches.2012
Year, a novel QPC method based on ERP pair is built by [7] such as Tseng H Y, wherein for two users of encryption
Secret one time key result from the particle to original EPR pair and carry out single-particle measurement.Fortunately, this method was both
Need not operation at the tenth of the twelve Earthly Branches and need not again one-way Hash function.In 2012, QPC method based on Bell state entanglement transfer was by Liu W
Proposing Deng [8], wherein the secret one time key for two users of encryption is by original Bell state entanglement transfer
The Bell state of rear generation carries out Bell base measurement and obtains.And, this method need not operation at the tenth of the twelve Earthly Branches.But, Liu W J etc. [9]
Pointing out in the method for document [8], TP can measure to attack extract the secret of two users and the most tested by initiating Bell base
Measure, and propose an improved method to make up this leak.So far, in addition to method mentioned above, many other
Both sides' QPC method [10-34] are the most by utilizing different quantum states and quantum techniques to be devised.
About the role of TP, Chen X B etc. [6] is firstly introduced into half loyal model.It is to say, TP loyally performs whole
Individual process, records all of intermediate calculation data but can attempt under the constraint that can not be included disloyal user's corrosion by opponent
The secret of users is obtained from record.But, Yang Y G etc. [12] points out that this half loyal TP model is irrational, and
Think that rational model should be as follows: TP can not be included disloyal user corrosion by opponent but be allowed to according to oneself
Idea makes improper activity.It is true that so far, this hypothesis of TP is the most rational.
Assuming to there is K side, everyone has a secret.They wonder their K secret the most equal and not by
Reveal.If two side's QPC methods are used for solving this equality comparison problem in many ways, two same side's QPC methods are had to
It is performed (n-1) n (n-1)/2 time so that efficiency is not high enough.In 2013, Chang Y J etc. [35] utilized n particle GHZ class
State proposition first quantum privacy in many ways compares (Multi-party Quantum Private Comparison, MQPC) side
Method, can be achieved with the equality that in K user, any two sides are secret compare as long as being executed once.Subsequently, based on d Wiki state
With the MQPC method [36] of Quantum fourier transform, MQPC method based on n level Entangled State and Quantum fourier transform [37] quilt
Design.But, up to now, the most little several MQPC methods exist.
Analyzing based on above, the present invention proposes a kind of quantum privacy comparative approach in many ways based on Bell state entanglement transfer,
The equality that the entanglement transfer utilizing Bell state realizes K different user secret compares.As long as the method is executed once with regard to energy
Realize the equality that in K user, any two sides are secret to compare.Third party can know that the secret comparative result of each two user but
Their actual value cannot be known.Each user cannot know the secret actual value of other K-1 user.
List of references
[1] Yao, A.C.:Protocols for secure computations.In:Proceedings of the
23rdAnnual IEEE Symposium on Foundations of Computer Science, p.160, IEEE
Computer Society, Washington, 1982
[2] Boudot, F., Schoenmakers, B., Traore, J.:A fair and efficient solution
To the socialist millionaires ' problem.Discret Appl.Math., 2001,111 (1-2): 23-36.
[3] Lo, H.K.:Insecurity of quantum secure computations.Phys.Rev.A, 1997,
56 (2): 1154-1162
[4] Yang, Y.G., Wen, Q.Y.:An efficient two-party quantum private
Comparison protocol with decoy photons and two-photon entanglement.J.Phys.A:
Math.Theor, 2009,42:055305;Yang, Y.G., Wen, Q.Y.:Corriigendum:An efficient two-
party quantum private comparison protocol with decoy photons and two-photon
Entanglement.J.Phys.A:Math.Theor, 2010,43:209801
[5] Yang, Y.G., Tian, J, W., Hong, Y., Zhang, H.:Secure quantum private
Comparison.Phys.Scr, 2009,80:065002;Yang, Y.G., Cao, W.F., Wen, Q.Y.:Corriigendum:
Secure quantum private comparison.Phys.Scr, 2009,80:065002
[6] Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.:An efficient protocol
for the private comparison of equal information based on the triplet
Entangled state and single-particle measurement.Opt.Commun, 2010,283:1561-1565
[7] Tseng, H.Y., Lin, J., Hwang, T.:New quantum private comparison protocol
Using EPR pairs.Quantum Inf.Process, 2012,11:373-384
[8] Liu, W., Wang, Y.B., Cui, W.:Quantum private comparison protocol based
On Bell entangled states.Commun.Theor.Phys, 2012,57:583-588
[9] Liu, W.J., Liu, C., Chen, H.W., Li, Z.Q., Liu, Z.H.:Cryptanalysis and
improvement of quantum private comparison protocol based on Bell entangled
States.Commun.Theor.Phys, 2014,62:210
[10] Lin, J., Tseng, H.Y., Hwang, T.:Intercept-resend attacks on Chen et
Al. ' s quantum private comparison protocol and the improvements.Opt.Commun,
2011,284:2412-2414
[11] Wang, C., Xu, G., Yang, Y.X.:Cryptanalysis and improvements for the
Quantum private comparison protocol using EPR pairs.Int.J.Quantum Inf, 2013,
11:1350039
[12] Yang, Y.G., Xia, J., Jia, X., Zhang, H.:Comment on quantum private
Comparison protocols with a semi-honest third party.Quantum Inf.Process, 2013,
12:877-885
[13] Zhang, W.W., Zhang, K.J.:Cryptanalysis and improvement of the
quantum private comparison protocol with semi-honest third party.Quantum
Inf.Process, 2013,12:1981-1990
[14] Liu, W., Wang, Y.B., Jiang, Z.T.:An efficient protocol for the quantum
Private comparison of equality with W state.Opt.Commun, 2011,284:3160
[15] Li, Y.B., Wen, Q.Y., Gao, F., Jia, H.Y., Sun, Y.:Information leak in Liu
Et al. ' s quantum private comparison and a new protocol.Eur.Phys.J.D, 2012,66:
110
[16] Liu, W., Wang, Y.B.:Quantum private comparison based on GHZ
Entangled states.Int.J.Theor.Phys, 2012,51:3596-3604
[17] Yang, Y.G., Xia, J., Jia, X., Shi, L., Zhang, H.:New Quantum private
Comparison protocol without entanglement.Int.J.Quantum Inf, 2012,10:1250065
[18] Liu, W., Wang, Y.B., Jiang, Z.T.:A protocol for the quantum private
Comparison of equality with χ-type state.Int.J.Theor.Phys, 2012,51:69-77
[19] Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z., Cui, W.:New quantum private
Comparison protocol using χ-type state.Int.J.Theor.Phys, 2012,51:1953-1960
[20] Jia, H.Y., Wen, Q.Y., Li, Y.B., Gao, F.:Quantum private comparison using
Genuine four-particle entangled states.Int.J.Theor.Phys, 2012,51:1187-1194
[21] Xu, G.A., Chen, X.B., Wei, Z.H., Li, M.J., Yang, Y.X.:An efficient
protocol for the quantum private comparison of equality with a four-qubit
Cluster state.Int.J.Quantum Inf, 2012,10:1250045
[22] Lin, S., Guo, G.D., Liu, X.F.:Quantum private comparison of equality
With χ-type entangled states.Int.J.Theor.Phys, 2013,52:4185-4194
[23] Sun, Z.W., Long, D.Y.:Quantum private comparison protocol based on
Cluster states.Int.J.Theor.Phys, 2013,52:212-218
[24] Zi, W., Guo, F.Z., Luo, Y., Cao, S.H., Wen, Q.Y.:Quantum private
Comparison protocol with the random rotation.Int.J.Theor.Phys, 2013,52:3212-
3219
[25] Liu, B., Gao, F., Jia, H.Y., Huang, W., Zhang, W.W., Wen, Q.Y.:Efficient
quantum private comparison employing single photons and collective
Detection.Quantum Inf.Process, 2013,12:887-897
[26] Lin, J., Yang, C.W., Hwang, T.:Quantum private comparison of equality
Protocol without a third party.Quantum Inf.Process, 2014,13:239-247
[27] Chen, Y.T., Hwang, T.:Comment on the " Quantum private comparison
Protocol based on Bell entangled states " .Int.J.Theor.Phys, 2014,53:837-840
[28] Li, J., Zhou, H.F., Jia, L., Zhang, T.T.:An efficient protocol for the
private comparison of equal information based on four-particle entangled W
State and Bell entangled states swapping.Int.J.Theor.Phys, 2014,53:2167-2176
[29] Li, Y., Ma, Y., Xu, S., Huang, W., Zhang, Y.:Quantum private comparison
Based on phase encoding of single photons.Int.J.Theor.Phys, 2014,53:3191-3200
[30] Liu, W.J., Liu, C., Chen, H.W., Liu, Z.H., Yuan, M.X., Lu, J.S.:Improvement
on“an efficient protocol for the quantum private comparison of equality with
W state " .Int.J.Quantum Inf, 2014,12:1450001
[31] Liu, W.J., Liu, C., Wang, H.B., Liu, J.F., Wang, F., Yuan, X.M.:Secure
quantum private comparison of equality based on asymmetric W
State.Int.J.Theor.Phys, 2014,53:1804-1813
[32] Zhang, W.W., Li, D., Li, Y.B.:Quantum private comparison protocol with
W states.Int.J.Theor.Phys, 2014,53:1723-1729
[33] Sun, Z.W., Yu, J.P., Wang, P., Xu, L.L., Wu, C.H.:Quantum private
Comparison with a malicious third party.Quantum Inf.Process, 2015,14:2125-2133
[34] He, G.P.:Comment on " Quantum private comparison of equality
Protocol without a third party " .Quantum Inf.Process, 2015,14:2301-2305
[35] Chang, Y.J., Tsai, C.W., Hwang, T.:Multi-user private comparison
Protocol using GHZ class states.Quantum Inf.Process, 2013,12:1077-1088
[36] Liu, W., Wang, Y.B., Wang, X.M.:Multi-party quantum private comparison
protocol using d-dimensional basis states without entanglement
Swapping.Int.J.Theor.Phys, 2014,53:1085-1091
[37] Wang, Q.L., Sun, H.X., Huang, W.:Multi-party quantum private
Comparison protocol with n-level entangled states.Quantum Inf.Process, 2014,
13:2375-2389
[38] Li, C.Y., Zhou, H.Y., Wang, Y., Deng, F.G.:Secure quantum key
distribution network with Bell states and local unitary
Operations.Chin.Phys.Lett., 2005,22 (5): 1049-1052
[39] Li, C.Y., Li, X.H., Deng, F.G., Zhou, P., Liang, Y.J., Zhou, H.Y.:Efficient
quantum cryptography network without entanglement and quantum
Memory.Chin.Phys.Lett., 2006,23 (11): 2896-2899
[40] Shi, G.F., Xi, X.Q., Tian, X.L., Yue, R.H.:Bidirectional quantum secure
Communication based on a shared private Bell state.Opt.Commun., 2009,282 (12):
2460-2463
[41] Shi, G.F.:Bidirectional quantum secure communication scheme based
On Bell states and auxiliary particles.Opt.Commun., 2010,283 (24): 5275-5278
[42] Gao, G.:Two quantum dialogue protocols without information
Leakage.Opt.Commun., 2010,283 (10): 2288-2293
[43] Ye, T.Y., Jiang, L.Z.:Improvement of controlled bidirectional
Quantum secure direct communication by using a GHZ state.Chin.Phys.Lett.,
2013,30 (4): 040305
[44] Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.:A simple participant attack on
The Bradler-Dusek protocol.Quantum Inf.Comput., 2007,7:329-334
Embodiment:
1, quantum privacy comparative approach applicating example
Here illustrate as a example by K=3.Alice, Bob and Charlie have three secret integer X, Y and Z respectively,
WhereinWithHere, xj, yj, zj∈ { 0,1}.One and half loyal TP's
Under help, they wonder that in X, Y and Z, each two is the most equal.Alice, Bob, Charlie and TP decide through consultation following rule: |
Φ+>、|Φ->、|Ψ+> and | Ψ-> represent two classical bits 00,01,10 and 11 respectively.They realize by performing following steps
The equality of each two secret integer compares.
S1) preparatory stage: (1) is similar with the QPC method of document [4-5], and Alice, Bob and Charlie share one in advance
One-way Hash function H of individual secret.The cryptographic Hash of X, Y and Z is respectively WithAlice/Bob/Charlie will
S/he/her X#/Y#/Z#Binary representation be divided intoGroup The most often group comprises two binary bits.If N is mod 2=1, one 0 should
When being added to by Alice/Bob/Charlie(2) prepared by Alice/Bob/Charlie/TPIndividual
Quantum state is in Then, Alice/Bob/Charlie/TP is from each amount
Sub-state is picked out first particle to form an ordered sequenceThe residue of each quantum state second
Particle automatically forms another ordered sequence(3) for safety detection, Alice/TP prepares one again
By all in | Φ+> the individual quantum state of L ' constitute sequence, be designated as DA′/DT′.Then Alice/TP is respectively by DA′/DT′In every
First of individual Bell state and second particle are inserted inWithSame position.Correspondingly, Alice/TP obtains
ArriveWithThen, Alice and TP exchanges between themWithIn order to ensure Alice-TP/TP-
The transmission security of Alice quantum channel, DA′/DT′In each Bell state interparticle dependency that tangles of two differences be used for
Detect whether to there is a listener-in.If there is no listener-in, Alice and TP abandons sample particles, and performs next step.
(4) forAlice pairIn the every pair of particle apply Bell base measurement and obtain accordingly
Measurement resultIfFor | Φ+>/|Φ->/|Ψ+>/|Ψ->, then So, TP hands
InThe particle of reply mutually to be caved in be one of four Bell state.In TP hands thisThe individual Bell state quilt caved in
It is designated as
S2) first round compares: (1) Bob/TP preparation is by all in | Φ+> the individual quantum state of L ' constitute sequence to guaranteeWithThe safety being exchanged.If there is no listener-in, Bob and TP abandons sample particles, and performs next step.(2)
ForBob pairIn the every pair of particle apply Bell base measurement and obtain corresponding measurement resultIfFor | Φ+>/|Φ->/|Ψ+>/|Ψ->, thenSo, in TP handsThe particle of reply mutually to be caved in be one of four Bell state.TP is the most rightIn the every pair of particle apply Bell
Base measurement obtains corresponding measurement resultIfFor | Φ+>/|Φ->/|Ψ+>/|Ψ->, thenThis in TP handsThe Bell state caved in is designated as(3) forCooperative computation together with Alice with Bob
And willIt is sent to TP.Alice willResult be sent to Bob with calculateThen, TP calculatesWithThen, TP is by RABIt is published to Alice and Bob.If RAB
=0, Alice and Bob draw X=Y;Otherwise, they know X ≠ Y.
S3) second take turns and compare: (1) Charlie/TP preparation is by all in | Φ+> the individual quantum state of L ' constitute sequence with
GuaranteeWithThe safety being exchanged.If there is no listener-in, Charlie and TP abandons under sample particles, and execution
One step.(2) forCharlie pairIn the every pair of particle apply Bell base measurement and obtain
Corresponding measurement resultIfFor | Φ+>/|Φ->/|Ψ+>/|Ψ->, thenSo,
In TP handsThe particle of reply mutually to be caved in be one of four Bell state.TP is the most rightIn every pair of grain
Son applies Bell base measurement and obtains corresponding measurement resultIfFor | Φ+>/|Φ->/|Ψ+>/|Ψ->, that
?(3) forAlice, Bob close together with Charlie
CalculateAnd willIt is sent to TP.Alice and Bob divides
Will notWithResult be sent to Charlie with calculateThen, TP calculatesWithMeanwhile, for
Alice, Bob be cooperative computation together with CharlieAnd willIt is sent to TP.Alice and Bob respectively willResult andIt is sent to Charlie to calculateThen,
TP calculatesWithFinally, TP is by RBCBe sent to Bob and
Charlie.If RBC=0, Bob and Charlie draw Y=Z;Otherwise, they know Y ≠ Z.On the other hand, TP is by RACSend
To Alice and Charlie.If RAC=0, Alice and Charlie draw X=Z;Otherwise, they know X ≠ Z.
For clarity, the Bell state entanglement transfer process between above-mentioned four participants of tripartite's QPC method is depicted in
In Fig. 1.
2, analyze and discuss
The most still discuss as a example by above-mentioned tripartite's QPC method.
1) correctness
For above-mentioned tripartite's QPC method, the correctness of a total of three kinds of situations needs to come into question.
(1) the secret equality of Alice and Bob compares
Equality about X and Y compares, Alice and Bob needs to calculate And, TP needs to calculateWithAccording to figure
1, can obtain following evolutionary process:
Therefore, in above-mentioned tripartite's QPC method, the equality comparative result of X and Y is correct.
(2) the secret equality of Bob and Charlie compares
Equality about Y and Z compares, and Alice, Bob and Charlie need to calculate And, TP needs to calculateWithAccording to Fig. 1, following evolutionary process can be obtained:
Therefore, in above-mentioned tripartite's QPC method, the equality comparative result of Y and Z is correct.
(3) the secret equality of Alice and Charlie compares
Equality about X and Z compares, and Alice, Bob and Charlie need to calculate And, TP needs to calculateWithAccording to Fig. 1, following evolutionary process can be obtained:
Therefore, in above-mentioned tripartite's QPC method, the equality comparative result of X and Z is correct.
3, sum up
The present invention proposes a kind of quantum privacy comparative approach in many ways based on Bell state entanglement transfer, utilizes entangling of Bell state
Twine exchange to realize the equality of K different user secret and compare.Can be achieved with K user appoints as long as the method is executed once
The equality of two sides' secrets of anticipating compares.Third party can know that the comparative result of each two user secret but cannot know the true of them
Real-valued.Each user cannot know the secret actual value of other K-1 user.