999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Novel Semi-Quantum Private Comparison Scheme Using Bell Entangle States

2021-12-16 06:38:18YuhuaSunLiliYanZhibinSunShibinZhangandJiazhongLu
Computers Materials&Continua 2021年3期

Yuhua Sun,Lili Yan,*,Zhibin Sun,Shibin Zhang and Jiazhong Lu

1School of Cybersecurity, Chengdu University of Information Technology, Chengdu, 610225, China

2Natural Resource Ecology Laboratory, Colorado State University, Fort Collins,CO 80523,USA

Abstract: Private comparison is the basis of many encryption technologies, and several related Quantum Private Comparison (QPC) protocols have been published in recent years.In these existing protocols, secret information is encoded by using conjugate coding or orthogonal states, and all users are quantum participants.In this paper, a novel semi-quantum private comparison scheme is proposed, which employs Bell entangled states as quantum resources.Two semi-quantum participants compare the equivalence of their private information with the help of a semi-honest third party(TP).Compared with the previous classical protocols, these two semi-quantum users can only make some particular action,such as to measure,prepare and reflect quantum qubits only in the classical basis {|0〉, |1〉}, and TP needs to perform Bell basis measurement on reflecting qubits to obtain the results of the comparison.Further, analysis results show that this scheme can avoid outside and participant attacks and its’ qubit efficiency is better than the other two protocols mentioned in the paper.

Keywords: Cryptography; Bell entangled states; a semi-honest TP; security analysis;semi-quantum private comparison

1 Introduction

Since Bennett and Brassard published the initial Quantum Key Distribution(QKD)protocol[1]in 1984,many quantum cryptography protocols have been published to solve security problems, such as Quantum Key Distribution (QKD) [1-4], Quantum Secure Direct Communication(QSDC) [5-12], Quantum Secret Sharing(QSS) [13-15],Quantum Secure Multiparty Computation (QSMC) [16-23],and so on.

Secure Multiparty Computing (SMC), also known as secure function evaluation, is a primitive basic form of distributed computation.It can correctly distribute computing to outputs when inputs are given by a group of distrustful users.As a subfield of QSMC, Quantum Private Comparison (QPC) was first established as a computing task by Yao [24] in 1982, “a socialist millionaire problem”, in which two millionaires want to know who is richer without publishing their properties to each other.Like QSMC,QPC is used to compare the quantum bits sent by two participants to determine whether the secret inputs of two participants are equal.Since then, many QPC protocols [25-41] have been proposed by using different kinds of quantum states and technologies.For example, Bell states were used in References [28,35,38], Reference [33] uses χ-Type State, single-photon was used in References [32-40],GHZ states were used in Reference [37].Meanwhile, three kinds of TP are mentioned in related protocols: semi-honest [32,33], dishonest [34], almost-dishonest [42].In most protocols, TP does not need to be completely honest, but only needs to execute the protocol honestly to make the TP know the comparison result 0 or 1 and the length of secret input.

Boyer et al.[43,44] proposed the first semi-quantum cryptography protocol based on the classical BB84 protocol in 2007.In this protocol, some participants have not quantum ability to participate in key distribution, but they can communicate by following the semi-quantum operation rules in quantum channel: (1) Reflect qubits back to the sender without any interference (referred to as REFLECT), and (2)Measure qubits in the basis {|0〉, |1〉}and prepare the same quantum states, then resend them back to the sender (referred to as MEASURE).Compared with traditional quantum cryptography, semi-quantum cryptography can make some participants need neither complete quantum capabilities nor participating in the preparation and measurement of quantum superposition states.Based on this concept, semi-quantum Private Comparison (SQPC) protocols [45-47] had been put forward recently.In 2016, Chou et al.[45]published the first SQPC protocol under an almost dishonest third party.After that, Thapliyal et al.[46]proposed one QPC protocol and one SQPC protocol in 2018 by using Bell state as quantum resources.In their studies, they not only allow classical users to participate in the protocol, but also create a unique method of security detection and avoid TP from obtaining additional information in the process.In the same year, Lang et al.[47] published two SQPC protocols using single photons as quantum resources,which are modified schemes of Sun et al.[48].

In order to improve the qubits’ efficiency and make classical users be involved in quantum private comparison, we propose an SQPC protocol based on Bell state.Two semi-quantum users can compare their private information with the help of a semi-honest TP.Nevertheless, both of them can only make specific actions, such as measuring, preparing and reflecting the quantum qubits on the classical basis{|0〉, |1〉}.With the help of a pre-shared key, this protocol can eliminate participant attacks by making Alice and Bob choose the same semi-quantum operation simultaneously.The encoding of private information is hidden in the returned particles after Alice and Bob choose the MEASURE operation.In addition, quantum TP only needs to prepare 2N Bell states as quantum resources, and releases one qubit to announce the comparison.

The rest of this paper is arranged as follows.The detailed description of the SQPC protocol is described in Section 2,and the security analysis of the protocol is explained in Section 3.In Section 4,the discussion and conclusion of this protocol are provided, and the following semi-quantum research work is analyzed and arranged.

2 The Novel SQPC Scheme Based on Bell Entangled States

In the following, the detailed description of an SQPC scheme is provided step by step.Two semiquantum participants, Alice and Bob, are involved.Both of them have the same length of secret information.A= {a1,a2,···,an}and B= {b1,b2,···,bn}ai,bi∈ {0,1}(n is the length of private information).The third participant is a semi-honest quantum host TP, who always follows the process of the protocol but does not insure the safety of the protocol.Before performing the protocol, Alice and Bob share a master key KAB( KAB∈ {0,1}2n) by using Semi-quantum Key Distribution (SQKD) protocol[49].KABis used for indicating Alice and Bob to choose the operation of MEASURE or REFLECT.When KABi=0, Alice and Bob will choose the MEASURE operation.Otherwise, they will choose the REFLECT operation.

The description of the scheme is the following steps.

Step 1:Semi-honest TP arranges 2n-bit Bell state sequence randomly chosen fromand splits every single Bell state into q1and q2,consisting of sequences S1and S2.Then TP sends the qubits S1and S2to Alice and Bob one by one,respectively.

Step 2:According to KAB,Alice(Bob)performs the operational rules of semi-quantum,MEASURE or REFLECT, on each qubit of S1(S2) sequence.When KABi=0, Alice (Bob) chooses the MEASURE operation on the qubit to obtain result cifor calculating KAi=ci⊕ai(KBi=di⊕bi).Then she (he)prepares a single photon according to the result of KAi(if KAi=0, prepare |0〉; Otherwise, prepare |1〉) and send it back to TP.When KABi=1, Alice(Bob) will reflect the qubit back to TP without any disturbance.

Step 3:TP makes Bell basis measurement with related qubits (the same position of S1′ and S2′) and records the result.Then TP confirms through a public channel.

Step 4:After receiving the announcement,Alice and Bob publishes the value of KABto TP through the public channel.If these two KABare not the same,TP terminates the protocol.Otherwise,TP proceeds to the next step.

Step 5:According to KAB,TP divides the result of measurement into MEASURE(M)and REFLECT(R)sequencesWhen KABi=0,TP splits it into M sequence;When KABi=1,TP splits it into R sequence.For example:

Then TP takes the next two steps:

1.Verifying the equivalence.Assume that TP prepares the initial Bell state to beIf the result of measurement in the same position isTP believes that eavesdropping exists in the channel.After finishing the comparison,TP calculates its error rate.If the error rate is above the predefined threshold, TP terminates the process of the protocol.Otherwise, TP announces the result of the comparison by operating.

2.Publishing the result of comparison.Assume that TP prepares the initial Bell state to beand the measurement result at the same position is Mi=then TP thinks the secret information of Alice and Bob at the same position are same.When the measurement result at the same position is Mi=TP recognizes the secret information of Alice and Bob at the same position are different.After checking all n bits, TP announces one qubit 0 or 1.If all of them are the same, TP publishes 0.Otherwise, TP publishes 1 through the public channel.

3 Security Analysis

In this section, the security of the proposed protocol is analyzed from two aspects: (1) The secret information of participants is plagued by external eavesdroppers, and (2) Dishonest users or the semi-honest TP may steal the secret information in the procedure of the scheme.Then,the efficiency analysis of the scheme with some previous SQPC protocols are provided.

Figure 1: The flow chart of the proposed protocol

3.1 Outside Attack

We will give out the eavesdropping detection that Eve may take at every step of the proposed protocol.

3.1.1 Security Analysis of Trojan Horse Attack

In Step 1, When TP sends S1and S2to Alice and Bob,respectively, Eve may launch an attack on the quantum channel.The attack is titled the Trojan horse attack [50,51], and can be prevented by adding a legitimate wavelength filter and a photon number splitter to both sides of Alice and Bob.

3.1.2 Security Analysis of Intercept-resend Attack

Table 1: All kinds of situation of analysis when initial Bell state is

Table 1: All kinds of situation of analysis when initial Bell state is

The initial Bell state Fake particles Alice(Bob)’s choice The result Probability of being detected or M/R ψ±■■ 〉 |00 〉 REFLECT secret Inf 1/2 ■■?+ 〉1/2 ?-| 〉 100%MEASURE Different 1/2 ■■ψ+ 〉1/2 ψ-| 〉 Right Same 1/2 ■■?+ 〉1/2 ?-| 〉 Mistake 01| 〉or 10| 〉 REFLECT 1/2 ■■ψ+ 〉1/2 ψ-| 〉 0 MEASURE Different 1/2 ■■ψ+ 〉1/2 ψ-| 〉 Mistake Same 1/2 ■■?+ 〉1/2 ?-| 〉 100%11| 〉 REFLECT 1/2 ■■?+ 〉1/2 ?-| 〉 100%MEASURE Different 1/2 ■■ψ+ 〉1/2 ψ-| 〉 Mistake Same 1/2 ■■?+ 〉1/2 ?-| 〉 Mistake

It should also be pointed out that Even Eve cannot obtain any secret information by performing intercept-resend attacks.She can still affect the comparison of secret information in some cases.The protocol can avoid Eve’s mistake by performing the detection firstly (Step 5).

3.1.3 Security Analysis of Measure-Resend Attack

The measure-resend attack refers to that Eve intercepts the particles sent from TP to Alice (Bob),measures them, then sends the measured states to Alice (Bob).She inevitably causes the original Bell state to collapse into two-particle states.When Alice and Bob choose REFLECT operation, TP only has 50% possibility to obtain the initial Bell state.For the MEASURE operation, Eve cannot be detected and does not cause any interfere with the comparison result.In Tab.2 are shown all situations.

3.1.4 Security Analysis of Flip Attack

Table 2: All situation after suffering this attack

3.1.5 Security Analysis of Entangle-Measure Attack

The entangle-measure attack means that Eve performs attack (UE,UF) on the Bell states among TP,Alice and Bob.UE and UF share a common probe space with initial state |0〉E.As the explanation in Refs.[43,56], the shared probe enables Eve to launch an attack on the returning qubits depending on the information acquired by UE.Assume that the initial Bell state is

Case 1:When Alice and Bob choose the REFLECT operation,Eve may obtain any secret information from (UE,UF).

They wandered in the woods the whole day, but could not find their way out. As night fell they found an inn and went inside. The servant gave the raven to the innkeeper to prepare for supper.

3.2 Participant Attack

In the proposed protocol,dishonest users and semi-honest TP may try to obtain secret information.We analyze them in two ways.

Case 1:Alice or Bob eavesdrops the other’s secret information or disturbs the protocol’s process.

In Step 1,TP sends S1 to Alice and S2 to Bob.Firstly,both Alice and Bob can never perform certain operations on the other sequence.TP performs all joint measurements.This is the reason why Alice or Bob cannot obtain other’s secret information.Besides, if Alice or Bob deliberately choose different KAB sequence, it will be checked out in Step 4.In the last step, TP only uses 1 qubit to stand for the equivalence of their private information.They have no way to know the different of secret information.

Case 2:Semi-honest TP eavesdrops Alice and Bob’s private information.

The Semi-honesty determines that TP must implement the protocol base on the rules.Therefore,TP has only one way to obtain the private information of participants through M sequence (the sequence are all qubits that participants encode with their private information).For example, if the M sequence is 00 11 01 10, Eve only has the probability of 1/2 to obtain the initial state.When n is large enough, the probability of obtaining the private information of Alice is

3.3 Comparison

In this subsection,we aim to compare the efficiency of the proposed protocol with an SQPC protocols from References [46,52] .

4 Discussion and Conclusion

In this paper, we have proposed a novel SQPC protocol with detailed procedures based on Bell entangled states.As the only quantum participant, TP can calculate the equivalence of private information of Alice and Bob, but he cannot obtain any private information of them.In addition, TP only needs to release 1 qubit through public channel to announce whether their private information is same.In addition,the paper has shown the detail of security against some eavesdropping attacks, and the qubit efficiency of the proposed scheme is higher than two other protocols.

Table 3: The comparison of our SQPC protocol and the two similar SQOC protocols

Meanwhile,the quantum participants need several techniques in the scheme,such as the generation of Bell states in Reference[54]and the quantum storage techniques in Reference[55].After focusing on semiquantum use, we are looking forward to analyzing the effect of noisy environment or noise channel.As mentioned in References [46,52] , there are various noise models, such as amplitude damping (AD)channels, bit flip (BF) channels, phase flip (PF) channels and depolarizing channels (DC).Different noise environments have different influence on quantum states and need to be analyzed separetedly.

As for the decoherence noise channel,the coupling of the quantum system to the environment will cause the decay of quantum information.It can be described as:

where ?is the parameters of the noise.It means that |0〉does not change and |1〉has a phase shift of i? after transferring in the noise channel.Furthermore, we also find out that |01 〉 and |10 〉 cannot change in the channel because they have the same phase shift of i?.In this protocol,TP needs to prepare 2N Bell states as quantum resources.TP can prepare the Bell statein the state ofto ensure that the Bell states will not change, but it only works in the situation of Alice and Bob’s choosing the operation of REFLECT.Once they make MEASURE, |01 〉A1A2|10 〉B1B2(|10 〉A1A2|01 〉B1B2), it will induce error.They only have the ability of singlephoton measurement in the classical basis,and TP cannot obtain the actual results of comparison.

Further,future studies will focus on analyzing the impact of the noise channel to quantum cryptography protocols and preventing the classical users’operations from the influence of noise channels.Our studies also continue to track the possibilities between block-chain and quantum secure communication in Reference[56].

Funding Statement:This work was supported by the National Natural Science Foundation of China(Grant Nos.61402058,61572086),Major Project of Education Department in Sichuan(Grant No.18ZA0109),and Web Culture Project Sponsored by the Humanities and Social Science Research Base of the Sichuan Provincial Education Department (Grant No.WLWH18-22).

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 91探花在线观看国产最新| 国产精品免费露脸视频| 成人免费午夜视频| 免费aa毛片| 无码网站免费观看| 国产主播福利在线观看| 成人无码区免费视频网站蜜臀| 九九热视频精品在线| a级免费视频| 日韩一区精品视频一区二区| 国产SUV精品一区二区6| 日韩一级二级三级| 日韩欧美91| 国产白浆视频| 999国产精品永久免费视频精品久久 | 日本成人不卡视频| 国产精品免费露脸视频| 国模沟沟一区二区三区| 一本大道视频精品人妻| 欧美精品v| 99热6这里只有精品| 一本一本大道香蕉久在线播放| 97国产精品视频自在拍| 国产精品久久久久鬼色| 在线一级毛片| 亚洲成年人网| 欧美一区中文字幕| 伊人成色综合网| 国产精品自拍露脸视频| 91网红精品在线观看| 久久影院一区二区h| 亚洲精品黄| 99精品免费欧美成人小视频| 无码综合天天久久综合网| 91久久国产综合精品| 亚洲综合精品香蕉久久网| 亚洲av无码久久无遮挡| 国产成人精品一区二区不卡| 国产激情无码一区二区三区免费| 国产成人福利在线视老湿机| 成人在线第一页| 狠狠色噜噜狠狠狠狠奇米777 | 国产视频入口| 99热这里只有免费国产精品| 国产成人AV男人的天堂| 一本大道视频精品人妻| 日本高清在线看免费观看| 香蕉国产精品视频| 重口调教一区二区视频| 亚洲男女在线| 久久99精品久久久久纯品| 亚洲男人的天堂在线观看| 国产女人爽到高潮的免费视频| 国产毛片基地| 婷婷午夜影院| 国产美女无遮挡免费视频| 天天操天天噜| 久久国产成人精品国产成人亚洲| 亚洲福利片无码最新在线播放| 亚洲欧美另类中文字幕| 思思99思思久久最新精品| 毛片国产精品完整版| 亚洲日韩国产精品综合在线观看| 久久五月天综合| 国产青青草视频| 五月天在线网站| 欧美日韩激情在线| 国国产a国产片免费麻豆| 国产亚洲欧美另类一区二区| 一级福利视频| 国产亚洲精品自在久久不卡| 中文字幕人妻无码系列第三区| AV色爱天堂网| 福利在线不卡| 欧美日在线观看| 中文字幕无码av专区久久| 亚洲第一网站男人都懂| 日本三区视频| www成人国产在线观看网站| 欧美综合区自拍亚洲综合天堂| 国产成人a毛片在线| 色噜噜狠狠狠综合曰曰曰|