{"title":"Quantum Private Comparison Based on GHZ-type States","authors":"Xi Huang, Shibin Zhang, Wen Cheng","doi":"10.1109/africon51333.2021.9570929","DOIUrl":null,"url":null,"abstract":"In this paper, an efficient quantum private comparison (QPC) protocol based on GHZ-type states is proposed. Two participants can compare the equality of two classical bits in each comparison, which could greatly reduce comparison times and increase efficiency. A semi-honest third-party (TP) is involved in assisting the participants to compare their secrets. TP may misbehave on her own, but she is not allowed to conspire with any participants. Besides, the proposed protocol needs Hadamard operation as well as single-particle measurements and Bell measurements, which are easy to implement with current technologies. Finally, the analysis shows the proposed protocol is correct and it can resist various attacks including outside attacks and dishonest participant attacks.","PeriodicalId":170342,"journal":{"name":"2021 IEEE AFRICON","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE AFRICON","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/africon51333.2021.9570929","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, an efficient quantum private comparison (QPC) protocol based on GHZ-type states is proposed. Two participants can compare the equality of two classical bits in each comparison, which could greatly reduce comparison times and increase efficiency. A semi-honest third-party (TP) is involved in assisting the participants to compare their secrets. TP may misbehave on her own, but she is not allowed to conspire with any participants. Besides, the proposed protocol needs Hadamard operation as well as single-particle measurements and Bell measurements, which are easy to implement with current technologies. Finally, the analysis shows the proposed protocol is correct and it can resist various attacks including outside attacks and dishonest participant attacks.