Quantum Private Comparison Protocol with Cluster States
Abstract
:1. Introduction
2. The QPC Protocol
2.1. Preparing Step
- (1)
- Alice and Bob split their binary representations of X and Y into groups, respectively, with each group containing two-bit classical information. If L is odd (i.e., ), Alice and Bob will add a zero to the last group to ensure it contains two bits. After grouping, X and Y can be rewritten as and , respectively. Where and for
- (2)
- Alice and Bob share a secret key sequence = via a QKD protocol, where each for
- (3)
- TP prepares an ordered sequence of four-qubit cluster states, which can be represented as follows:
- (4)
- TP picks up particles 2 and 3 from each cluster state to form two ordered photon sequences: and . The remaining particles from each cluster state form another ordered sequence .
- (5)
- To enhance the security of the protocol and prevent eavesdropping, TP prepares two sets of decoy-photon sequences and randomly chosen from four nonorthogonal states , and inserts into and into at random positions, After the insertion, the new sequences are denoted as and , respectively. Then, TP sends and to Alice and Bob, respectively.
2.2. Checking Step
- (1)
- The TP publicly announces the positions and the measuring bases (Z-basis and X-basis) of the decoy-photon sequences and .
- (2)
- Alice and Bob measure the states of the decoy-photon sequence and according to the bases published by the TP, and announce their measurement outcomes to the TP.
- (3)
- The TP calculates the error rate based on the announced outcomes. Specifically, it compares the results obtained by Bob and Charlie with the prepared decoy-photon sequence and . If the error rate exceeds a predetermined threshold, this indicates a potential eavesdropping attempt or other transmission issues. In such a case, the TP will abort the protocol and return to the preparation step. Otherwise, the protocol can proceed to the next steps.
2.3. Coding Step
- (1)
- Alice (Bob) discards all decoy photons ( from () to recover ().
- (2)
- Alice (Bob) performs () on () to generate a new sequence (), where ,, and for
- (3)
- Alice (Bob) prepares a decoy-photon sequence whose states are chosen from four nonorthogonal states and inserts into () to generate a new sequence denoted as .
- (4)
- Alice (Bob) sends to the TP.
2.4. Decoding Step
- (1)
- Upon receiving their sequences (from Alice) and (from Bob), the TP interacts with Alice and Bob to verify the presence of any eavesdroppers in the same manner as previously described. If the checks confirm that there is no eavesdropper (i.e., the error rates are acceptable), the TP discards all decoy photons from and from to recover and . Otherwise, they abort the protocol and return to the preparation step.
- (2)
- The TP performs Bell measurements on and to get a result sequence and performs Bell measurements on to get a result sequence .
- (3)
- The TP compares and to obtain the comparison result. If is completely consistent with , the TP can conclude that . Otherwise, .
- (4)
- The TP informs the comparison result to both Alice and Bob.
3. Analysis
3.1. Correctness
3.2. Privacy
3.3. Fairness
4. Comparison
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Yao, A.C. Protocols for secure computations. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science (FOCS’ 82), Washington, DC, USA, 3–5 November 1982; p. 160. [Google Scholar]
- Goldreich, O. Foundations of Cryptography, Volume 2; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
- Colbeck, R. Impossibility of secure two-party classical computation. Phys. Rev. A—At. Mol. Opt. Phys. 2007, 76, 062308. [Google Scholar] [CrossRef]
- Mehic, M.; Niemiec, M.; Rass, S.; Ma, J.; Peev, M.; Aguado, A.; Martin, V.; Schauer, S.; Poppe, A.; Pacher, C.; et al. Quantum key distribution: A networking perspective. ACM Comput. Surv. (CSUR) 2020, 53, 1–41. [Google Scholar] [CrossRef]
- Liao, S.K.; Cai, W.Q.; Liu, W.Y.; Zhang, L.; Li, Y.; Ren, J.G.; Yin, J.; Shen, Q.; Cao, Y.; Li, Z.P.; et al. Satellite-to-ground quantum key distribution. Nature 2017, 549, 43–47. [Google Scholar] [CrossRef] [PubMed]
- Xu, F.; Ma, X.; Zhang, Q.; Lo, H.-K.; Pan, J.-W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
- Lin, S.; Zhang, X.; Guo, G.D.; Wang, L.L.; Liu, X.F. Multiparty quantum key agreement. Phys. Rev. A 2021, 104, 042421. [Google Scholar] [CrossRef]
- Cao, H.; Ma, W. Multiparty quantum key agreement based on quantum search algorithm. Sci. Rep. 2017, 7, 45046. [Google Scholar] [CrossRef]
- Huang, X.; Zhang, S.B.; Chang, Y.; Qiu, C.; Liu, D.M.; Hou, M. Quantum key agreement protocol based on quantum search algorithm. Int. J. Theor. Phys. 2021, 60, 838–847. [Google Scholar] [CrossRef]
- Sheng, Y.B.; Zhou, L.; Long, G.L. One-step quantum secure direct communication. Sci. Bull. 2022, 67, 367–374. [Google Scholar] [CrossRef]
- Qi, R.; Sun, Z.; Lin, Z.; Niu, P.; Hao, W.; Song, L.; Huang, Q.; Gao, J.; Yin, L.; Long, G.L. Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl. 2019, 8, 22. [Google Scholar] [CrossRef]
- Zhu, F.; Zhang, W.; Sheng, Y.; Huang, Y. Experimental long-distance quantum secure direct communication. Sci. Bull. 2017, 62, 1519–1524. [Google Scholar] [CrossRef]
- Huang, X.; Zhang, S.; Chang, Y.; Yang, F.; Hou, M.; Cheng, W. Quantum secure direct communication based on quantum homomorphic encryption. Mod. Phys. Lett. A 2021, 36, 2150263. [Google Scholar] [CrossRef]
- Debnath, S.K.; Dey, K.; Kundu, N.; Choudhury, T. Feasible private set intersection in quantum domain. Quantum Inf. Process. 2021, 20, 41. [Google Scholar] [CrossRef]
- Huang, X.; Zhang, W.; Zhang, S. Quantum multi-party private set intersection using single photons. Phys. A Stat. Mech. Its Appl. 2024, 649, 129974. [Google Scholar] [CrossRef]
- Liu, W.; Yin, H.W. A novel quantum protocol for private set intersection. Int. J. Theor. Phys. 2021, 60, 2074–2083. [Google Scholar] [CrossRef]
- Lo, H.K. Insecurity of quantum secure computations. Phys. Rev. A 1997, 56, 1154–1162. [Google Scholar] [CrossRef]
- Yang, Y.G.; Wen, Q.Y. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 2009, 42, 055305. [Google Scholar] [CrossRef]
- Chen, X.B.; Xu, G.; Niu, X.X.; Wen, Q.Y.; Yang, Y.X. An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 2010, 283, 1561–1565. [Google Scholar] [CrossRef]
- Liu, B.; Gao, F.; Jia, H.; Huang, W.; Zhang, W.W.; Wen, Q.Y. Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 2013, 12, 887–897. [Google Scholar] [CrossRef]
- Liu, B.; Xiao, D.; Huang, W.; Jia, H.Y.; Song, T.T. Quantum private comparison employing single-photon interference. Quantum Inf. Process. 2017, 16, 1–13. [Google Scholar] [CrossRef]
- Huang, X.; Zhang, W.F.; Zhang, S.B. Efficient multiparty quantum private comparison protocol based on single photons and rotation encryption. Quantum Inf. Process. 2023, 22, 272. [Google Scholar] [CrossRef]
- Kou, T.Y.; Che, B.C.; Dou, Z.; Chen, X.B.; Lai, Y.P.; Li, J. Efficient quantum private comparison protocol utilizing single photons and rotational encryption. Chin. Phys. B 2022, 31, 060307. [Google Scholar] [CrossRef]
- Hou, M.; Wu, Y. Single-photon-based quantum secure protocol for the socialist millionaires’ problem. Front. Phys. 2024, 12, 1364140. [Google Scholar] [CrossRef]
- Pan, H.M. Two-party quantum private comparison using single photons. Int. J. Theor. Phys. 2018, 57, 3389–3395. [Google Scholar] [CrossRef]
- Tseng, H.Y.; Lin, J.; Hwang, T. New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 2012, 11, 373–384. [Google Scholar] [CrossRef]
- Lang, Y.F. Quantum gate-based quantum private comparison. Int. J. Theor. Phys. 2020, 59, 833–840. [Google Scholar] [CrossRef]
- Hou, M.; Sun, S.Y.; Zhang, W. Quantum private comparison for the socialist millionaire problem. Front. Phys. 2024, 12, 1408446. [Google Scholar] [CrossRef]
- Huang, X.; Zhang, S.B.; Chang, Y.; Hou, M.; Cheng, W. Efficient quantum private comparison based on entanglement swapping of bell states. Int. J. Theor. Phys. 2021, 60, 3783–3796. [Google Scholar] [CrossRef]
- Hou, M.; Wu, Y. New Quantum Private Comparison Using Bell States. Entropy 2024, 26, 682. [Google Scholar] [CrossRef]
- Ji, Z.; Zhang, H.; Wang, H. Quantum private comparison protocols with a number of multi-particle entangled states. IEEE Access 2019, 7, 44613–44621. [Google Scholar] [CrossRef]
- Hou, M.; Wu, Y.; Zhang, S. Efficient Quantum Private Comparison Based on GHZ States. Entropy 2024, 26, 413. [Google Scholar] [CrossRef]
- Wang, Q.L.; Sun, H.X.; Huang, W. Multi-party quantum private comparison protocol with n-level entangled states. Quantum Inf. Process. 2014, 13, 2375–2389. [Google Scholar] [CrossRef]
- Fan, P.; Rahman, A.U.; Ji, Z.; Ji, X.; Hao, Z.; Zhang, H. Two-party quantum private comparison based on eight-qubit entangled state. Mod. Phys. Lett. A 2022, 37, 2250026. [Google Scholar] [CrossRef]
- Ji, Z.X.; Zhang, H.G.; Fan, P.R. Two-party quantum private comparison protocol with maximally entangled seven-qubit state. Mod. Phys. Lett. A 2019, 34, 1950229. [Google Scholar] [CrossRef]
- Sun, Q. Quantum private comparison with six-particle maximally entangled states. Mod. Phys. Lett. A 2022, 37, 2250149. [Google Scholar] [CrossRef]
- Ji, Z.-X.; Ye, T.-Y. Multi-party quantum private comparison based on the entanglement swapping of d-level cat states and d-level Bell states. Quantum Inf. Process. 2017, 16, 177. [Google Scholar]
- Lin, S.; Sun, Y.; Liu, X.F.; Yao, Z.Q. Quantum private comparison protocol with d-dimensional Bell states. Quantum Inf. Process. 2013, 12, 559–568. [Google Scholar] [CrossRef]
- Guo, F.Z.; Gao, F.; Qin, S.J.; Zhang, J.; Wen, Q.Y. Quantum private comparison protocol based on entanglement swapping of-level Bell states. Quantum Inf. Process. 2013, 12, 2793–2802. [Google Scholar] [CrossRef]
- Wu, W.Q.; Zhao, Y.X. Quantum private comparison of size using d-level Bell states with a semi-honest third party. Quantum Inf. Process. 2021, 20, 155. [Google Scholar] [CrossRef]
- Xu, G.A.; Chen, X.B.; Wei, Z.H.; Li, M.J.; Yang, Y.X. An efficient protocol for the quantum private comparison of equality with a four-qubit cluster state. Int. J. Quantum Inf. 2012, 10, 1250045. [Google Scholar] [CrossRef]
- Sun, Z.; Long, D. Quantum private comparison protocol based on cluster states. Int. J. Theor. Phys. 2013, 52, 212–218. [Google Scholar] [CrossRef]
- Chang, Y.; Zhang, W.B.; Zhang, S.B.; Wang, H.C.; Yan, L.L.; Han, G.H.; Sheng, Z.W.; Huang, Y.Y.; Suo, W.; Xiong, J.X. Quantum private comparison of equality based on five-particle cluster state. Commun. Theor. Phys. 2016, 66, 621. [Google Scholar] [CrossRef]
- Li, C.; Chen, X.; Li, H.; Yang, Y.; Li, J. Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state. Quantum Inf. Process. 2019, 18, 158. [Google Scholar] [CrossRef]
- Huang, X.; Zhang, W.; Zhang, S. Practical quantum protocols for blind millionaires’ problem based on rotation encryption and swap test. Phys. A Stat. Mech. Its Appl. 2024, 637, 129614. [Google Scholar] [CrossRef]
- Hou, M.; Wu, Y. Efficient Quantum Private Comparison with Unitary Operations. Mathematics 2024, 12, 3541. [Google Scholar] [CrossRef]
- Huang, X.; Zhang, S.B.; Cheng, W. Quantum Private Comparison Based on GHZ-type States. In Proceedings of the 2021 IEEE AFRICON, Arusha, United Republic of Tanzania, 13–15 September 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–4. [Google Scholar]
- Huang, X.; Zhang, S.; Xia, J. Efficient Quantum Private Comparison Using Locally Indistinguishable Orthogonal Product States. In Proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, 15–20 July 2022; Springer International Publishing: Cham, Switzerland, 2022; pp. 260–273. [Google Scholar]
- Hou, M.; Wu, Y.; Zhang, S. New Quantum Private Comparison Using Four-Particle Cluster State. Entropy 2024, 26, 512. [Google Scholar] [CrossRef]
Operations | ||||
---|---|---|---|---|
Ref. [41] | Ref. [42] | Ref. [43] | Ref. [44] | Ours | |
---|---|---|---|---|---|
Consumption of quantum resources | (L + k) Four-qubit cluster states for comparing 2L bits | L Four-particle cluster states for comparing L bits | (L + k) Five-particle cluster states for comparing 2L bits | L Four-qubit cluster states and L extended Bell states for comparing 3L bits | Four-particle cluster state for comparing 2L bits |
Whether needs the entanglement swapping | No | No | No | Yes | No |
Unitary operation for TP | No | No | No | No | |
Unitary operation for users | I and X | Four Pauli operators | No | No | Z and X |
Quantum Measurement for TP | No | Z basis | Z basis and X basis | Bell basis | Bell-basis |
Quantum measurement for users | Single-particle, Bell basis and basis | Z basis | Z basis and X basis | Bell-basis and extend Bell basis | No |
QKD method between two users | Yes | No | No | Yes | Yes |
QKD method between users and TP | Yes | No | No | Yes | No |
Qubit efficiency | <50% | 25% | <40% | 50% | 50% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hou, M.; Wu, Y. Quantum Private Comparison Protocol with Cluster States. Axioms 2025, 14, 70. https://doi.org/10.3390/axioms14010070
Hou M, Wu Y. Quantum Private Comparison Protocol with Cluster States. Axioms. 2025; 14(1):70. https://doi.org/10.3390/axioms14010070
Chicago/Turabian StyleHou, Min, and Yue Wu. 2025. "Quantum Private Comparison Protocol with Cluster States" Axioms 14, no. 1: 70. https://doi.org/10.3390/axioms14010070
APA StyleHou, M., & Wu, Y. (2025). Quantum Private Comparison Protocol with Cluster States. Axioms, 14(1), 70. https://doi.org/10.3390/axioms14010070