999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Novel Semi-Quantum Private Comparison Scheme Using Bell Entangle States

2021-12-16 06:38:18YuhuaSunLiliYanZhibinSunShibinZhangandJiazhongLu
Computers Materials&Continua 2021年3期

Yuhua Sun,Lili Yan,*,Zhibin Sun,Shibin Zhang and Jiazhong Lu

1School of Cybersecurity, Chengdu University of Information Technology, Chengdu, 610225, China

2Natural Resource Ecology Laboratory, Colorado State University, Fort Collins,CO 80523,USA

Abstract: Private comparison is the basis of many encryption technologies, and several related Quantum Private Comparison (QPC) protocols have been published in recent years.In these existing protocols, secret information is encoded by using conjugate coding or orthogonal states, and all users are quantum participants.In this paper, a novel semi-quantum private comparison scheme is proposed, which employs Bell entangled states as quantum resources.Two semi-quantum participants compare the equivalence of their private information with the help of a semi-honest third party(TP).Compared with the previous classical protocols, these two semi-quantum users can only make some particular action,such as to measure,prepare and reflect quantum qubits only in the classical basis {|0〉, |1〉}, and TP needs to perform Bell basis measurement on reflecting qubits to obtain the results of the comparison.Further, analysis results show that this scheme can avoid outside and participant attacks and its’ qubit efficiency is better than the other two protocols mentioned in the paper.

Keywords: Cryptography; Bell entangled states; a semi-honest TP; security analysis;semi-quantum private comparison

1 Introduction

Since Bennett and Brassard published the initial Quantum Key Distribution(QKD)protocol[1]in 1984,many quantum cryptography protocols have been published to solve security problems, such as Quantum Key Distribution (QKD) [1-4], Quantum Secure Direct Communication(QSDC) [5-12], Quantum Secret Sharing(QSS) [13-15],Quantum Secure Multiparty Computation (QSMC) [16-23],and so on.

Secure Multiparty Computing (SMC), also known as secure function evaluation, is a primitive basic form of distributed computation.It can correctly distribute computing to outputs when inputs are given by a group of distrustful users.As a subfield of QSMC, Quantum Private Comparison (QPC) was first established as a computing task by Yao [24] in 1982, “a socialist millionaire problem”, in which two millionaires want to know who is richer without publishing their properties to each other.Like QSMC,QPC is used to compare the quantum bits sent by two participants to determine whether the secret inputs of two participants are equal.Since then, many QPC protocols [25-41] have been proposed by using different kinds of quantum states and technologies.For example, Bell states were used in References [28,35,38], Reference [33] uses χ-Type State, single-photon was used in References [32-40],GHZ states were used in Reference [37].Meanwhile, three kinds of TP are mentioned in related protocols: semi-honest [32,33], dishonest [34], almost-dishonest [42].In most protocols, TP does not need to be completely honest, but only needs to execute the protocol honestly to make the TP know the comparison result 0 or 1 and the length of secret input.

Boyer et al.[43,44] proposed the first semi-quantum cryptography protocol based on the classical BB84 protocol in 2007.In this protocol, some participants have not quantum ability to participate in key distribution, but they can communicate by following the semi-quantum operation rules in quantum channel: (1) Reflect qubits back to the sender without any interference (referred to as REFLECT), and (2)Measure qubits in the basis {|0〉, |1〉}and prepare the same quantum states, then resend them back to the sender (referred to as MEASURE).Compared with traditional quantum cryptography, semi-quantum cryptography can make some participants need neither complete quantum capabilities nor participating in the preparation and measurement of quantum superposition states.Based on this concept, semi-quantum Private Comparison (SQPC) protocols [45-47] had been put forward recently.In 2016, Chou et al.[45]published the first SQPC protocol under an almost dishonest third party.After that, Thapliyal et al.[46]proposed one QPC protocol and one SQPC protocol in 2018 by using Bell state as quantum resources.In their studies, they not only allow classical users to participate in the protocol, but also create a unique method of security detection and avoid TP from obtaining additional information in the process.In the same year, Lang et al.[47] published two SQPC protocols using single photons as quantum resources,which are modified schemes of Sun et al.[48].

In order to improve the qubits’ efficiency and make classical users be involved in quantum private comparison, we propose an SQPC protocol based on Bell state.Two semi-quantum users can compare their private information with the help of a semi-honest TP.Nevertheless, both of them can only make specific actions, such as measuring, preparing and reflecting the quantum qubits on the classical basis{|0〉, |1〉}.With the help of a pre-shared key, this protocol can eliminate participant attacks by making Alice and Bob choose the same semi-quantum operation simultaneously.The encoding of private information is hidden in the returned particles after Alice and Bob choose the MEASURE operation.In addition, quantum TP only needs to prepare 2N Bell states as quantum resources, and releases one qubit to announce the comparison.

The rest of this paper is arranged as follows.The detailed description of the SQPC protocol is described in Section 2,and the security analysis of the protocol is explained in Section 3.In Section 4,the discussion and conclusion of this protocol are provided, and the following semi-quantum research work is analyzed and arranged.

2 The Novel SQPC Scheme Based on Bell Entangled States

In the following, the detailed description of an SQPC scheme is provided step by step.Two semiquantum participants, Alice and Bob, are involved.Both of them have the same length of secret information.A= {a1,a2,···,an}and B= {b1,b2,···,bn}ai,bi∈ {0,1}(n is the length of private information).The third participant is a semi-honest quantum host TP, who always follows the process of the protocol but does not insure the safety of the protocol.Before performing the protocol, Alice and Bob share a master key KAB( KAB∈ {0,1}2n) by using Semi-quantum Key Distribution (SQKD) protocol[49].KABis used for indicating Alice and Bob to choose the operation of MEASURE or REFLECT.When KABi=0, Alice and Bob will choose the MEASURE operation.Otherwise, they will choose the REFLECT operation.

The description of the scheme is the following steps.

Step 1:Semi-honest TP arranges 2n-bit Bell state sequence randomly chosen fromand splits every single Bell state into q1and q2,consisting of sequences S1and S2.Then TP sends the qubits S1and S2to Alice and Bob one by one,respectively.

Step 2:According to KAB,Alice(Bob)performs the operational rules of semi-quantum,MEASURE or REFLECT, on each qubit of S1(S2) sequence.When KABi=0, Alice (Bob) chooses the MEASURE operation on the qubit to obtain result cifor calculating KAi=ci⊕ai(KBi=di⊕bi).Then she (he)prepares a single photon according to the result of KAi(if KAi=0, prepare |0〉; Otherwise, prepare |1〉) and send it back to TP.When KABi=1, Alice(Bob) will reflect the qubit back to TP without any disturbance.

Step 3:TP makes Bell basis measurement with related qubits (the same position of S1′ and S2′) and records the result.Then TP confirms through a public channel.

Step 4:After receiving the announcement,Alice and Bob publishes the value of KABto TP through the public channel.If these two KABare not the same,TP terminates the protocol.Otherwise,TP proceeds to the next step.

Step 5:According to KAB,TP divides the result of measurement into MEASURE(M)and REFLECT(R)sequencesWhen KABi=0,TP splits it into M sequence;When KABi=1,TP splits it into R sequence.For example:

Then TP takes the next two steps:

1.Verifying the equivalence.Assume that TP prepares the initial Bell state to beIf the result of measurement in the same position isTP believes that eavesdropping exists in the channel.After finishing the comparison,TP calculates its error rate.If the error rate is above the predefined threshold, TP terminates the process of the protocol.Otherwise, TP announces the result of the comparison by operating.

2.Publishing the result of comparison.Assume that TP prepares the initial Bell state to beand the measurement result at the same position is Mi=then TP thinks the secret information of Alice and Bob at the same position are same.When the measurement result at the same position is Mi=TP recognizes the secret information of Alice and Bob at the same position are different.After checking all n bits, TP announces one qubit 0 or 1.If all of them are the same, TP publishes 0.Otherwise, TP publishes 1 through the public channel.

3 Security Analysis

In this section, the security of the proposed protocol is analyzed from two aspects: (1) The secret information of participants is plagued by external eavesdroppers, and (2) Dishonest users or the semi-honest TP may steal the secret information in the procedure of the scheme.Then,the efficiency analysis of the scheme with some previous SQPC protocols are provided.

Figure 1: The flow chart of the proposed protocol

3.1 Outside Attack

We will give out the eavesdropping detection that Eve may take at every step of the proposed protocol.

3.1.1 Security Analysis of Trojan Horse Attack

In Step 1, When TP sends S1and S2to Alice and Bob,respectively, Eve may launch an attack on the quantum channel.The attack is titled the Trojan horse attack [50,51], and can be prevented by adding a legitimate wavelength filter and a photon number splitter to both sides of Alice and Bob.

3.1.2 Security Analysis of Intercept-resend Attack

Table 1: All kinds of situation of analysis when initial Bell state is

Table 1: All kinds of situation of analysis when initial Bell state is

The initial Bell state Fake particles Alice(Bob)’s choice The result Probability of being detected or M/R ψ±■■ 〉 |00 〉 REFLECT secret Inf 1/2 ■■?+ 〉1/2 ?-| 〉 100%MEASURE Different 1/2 ■■ψ+ 〉1/2 ψ-| 〉 Right Same 1/2 ■■?+ 〉1/2 ?-| 〉 Mistake 01| 〉or 10| 〉 REFLECT 1/2 ■■ψ+ 〉1/2 ψ-| 〉 0 MEASURE Different 1/2 ■■ψ+ 〉1/2 ψ-| 〉 Mistake Same 1/2 ■■?+ 〉1/2 ?-| 〉 100%11| 〉 REFLECT 1/2 ■■?+ 〉1/2 ?-| 〉 100%MEASURE Different 1/2 ■■ψ+ 〉1/2 ψ-| 〉 Mistake Same 1/2 ■■?+ 〉1/2 ?-| 〉 Mistake

It should also be pointed out that Even Eve cannot obtain any secret information by performing intercept-resend attacks.She can still affect the comparison of secret information in some cases.The protocol can avoid Eve’s mistake by performing the detection firstly (Step 5).

3.1.3 Security Analysis of Measure-Resend Attack

The measure-resend attack refers to that Eve intercepts the particles sent from TP to Alice (Bob),measures them, then sends the measured states to Alice (Bob).She inevitably causes the original Bell state to collapse into two-particle states.When Alice and Bob choose REFLECT operation, TP only has 50% possibility to obtain the initial Bell state.For the MEASURE operation, Eve cannot be detected and does not cause any interfere with the comparison result.In Tab.2 are shown all situations.

3.1.4 Security Analysis of Flip Attack

Table 2: All situation after suffering this attack

3.1.5 Security Analysis of Entangle-Measure Attack

The entangle-measure attack means that Eve performs attack (UE,UF) on the Bell states among TP,Alice and Bob.UE and UF share a common probe space with initial state |0〉E.As the explanation in Refs.[43,56], the shared probe enables Eve to launch an attack on the returning qubits depending on the information acquired by UE.Assume that the initial Bell state is

Case 1:When Alice and Bob choose the REFLECT operation,Eve may obtain any secret information from (UE,UF).

They wandered in the woods the whole day, but could not find their way out. As night fell they found an inn and went inside. The servant gave the raven to the innkeeper to prepare for supper.

3.2 Participant Attack

In the proposed protocol,dishonest users and semi-honest TP may try to obtain secret information.We analyze them in two ways.

Case 1:Alice or Bob eavesdrops the other’s secret information or disturbs the protocol’s process.

In Step 1,TP sends S1 to Alice and S2 to Bob.Firstly,both Alice and Bob can never perform certain operations on the other sequence.TP performs all joint measurements.This is the reason why Alice or Bob cannot obtain other’s secret information.Besides, if Alice or Bob deliberately choose different KAB sequence, it will be checked out in Step 4.In the last step, TP only uses 1 qubit to stand for the equivalence of their private information.They have no way to know the different of secret information.

Case 2:Semi-honest TP eavesdrops Alice and Bob’s private information.

The Semi-honesty determines that TP must implement the protocol base on the rules.Therefore,TP has only one way to obtain the private information of participants through M sequence (the sequence are all qubits that participants encode with their private information).For example, if the M sequence is 00 11 01 10, Eve only has the probability of 1/2 to obtain the initial state.When n is large enough, the probability of obtaining the private information of Alice is

3.3 Comparison

In this subsection,we aim to compare the efficiency of the proposed protocol with an SQPC protocols from References [46,52] .

4 Discussion and Conclusion

In this paper, we have proposed a novel SQPC protocol with detailed procedures based on Bell entangled states.As the only quantum participant, TP can calculate the equivalence of private information of Alice and Bob, but he cannot obtain any private information of them.In addition, TP only needs to release 1 qubit through public channel to announce whether their private information is same.In addition,the paper has shown the detail of security against some eavesdropping attacks, and the qubit efficiency of the proposed scheme is higher than two other protocols.

Table 3: The comparison of our SQPC protocol and the two similar SQOC protocols

Meanwhile,the quantum participants need several techniques in the scheme,such as the generation of Bell states in Reference[54]and the quantum storage techniques in Reference[55].After focusing on semiquantum use, we are looking forward to analyzing the effect of noisy environment or noise channel.As mentioned in References [46,52] , there are various noise models, such as amplitude damping (AD)channels, bit flip (BF) channels, phase flip (PF) channels and depolarizing channels (DC).Different noise environments have different influence on quantum states and need to be analyzed separetedly.

As for the decoherence noise channel,the coupling of the quantum system to the environment will cause the decay of quantum information.It can be described as:

where ?is the parameters of the noise.It means that |0〉does not change and |1〉has a phase shift of i? after transferring in the noise channel.Furthermore, we also find out that |01 〉 and |10 〉 cannot change in the channel because they have the same phase shift of i?.In this protocol,TP needs to prepare 2N Bell states as quantum resources.TP can prepare the Bell statein the state ofto ensure that the Bell states will not change, but it only works in the situation of Alice and Bob’s choosing the operation of REFLECT.Once they make MEASURE, |01 〉A1A2|10 〉B1B2(|10 〉A1A2|01 〉B1B2), it will induce error.They only have the ability of singlephoton measurement in the classical basis,and TP cannot obtain the actual results of comparison.

Further,future studies will focus on analyzing the impact of the noise channel to quantum cryptography protocols and preventing the classical users’operations from the influence of noise channels.Our studies also continue to track the possibilities between block-chain and quantum secure communication in Reference[56].

Funding Statement:This work was supported by the National Natural Science Foundation of China(Grant Nos.61402058,61572086),Major Project of Education Department in Sichuan(Grant No.18ZA0109),and Web Culture Project Sponsored by the Humanities and Social Science Research Base of the Sichuan Provincial Education Department (Grant No.WLWH18-22).

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 成年免费在线观看| 爽爽影院十八禁在线观看| 91美女视频在线| 欧美一道本| 国产又色又刺激高潮免费看 | 亚洲va在线∨a天堂va欧美va| 久久性视频| 国产aaaaa一级毛片| 国产成人久久综合777777麻豆| 91po国产在线精品免费观看| 国产xxxxx免费视频| 92午夜福利影院一区二区三区| 蜜臀AV在线播放| 亚洲第一成年免费网站| 毛片久久网站小视频| 国产自无码视频在线观看| 亚洲国产第一区二区香蕉| 97视频免费在线观看| 精品一区二区无码av| 国产免费人成视频网| 欧美午夜视频| 成人夜夜嗨| 四虎精品国产永久在线观看| 四虎精品国产AV二区| 国产精品专区第1页| 亚洲综合专区| 久久夜色精品| 欧美黄色a| 精品伊人久久久大香线蕉欧美| 国产欧美日韩视频怡春院| 91国语视频| 国产精品一线天| 国产成人h在线观看网站站| 国产欧美日韩在线一区| 亚洲乱伦视频| 日韩性网站| 亚洲动漫h| 成人一级免费视频| 亚洲永久精品ww47国产| 美女一区二区在线观看| 国产午夜精品一区二区三区软件| 欧美一区日韩一区中文字幕页| 亚洲国产日韩欧美在线| 99在线视频免费| 中文字幕日韩丝袜一区| 国产精品亚欧美一区二区| 亚洲欧洲美色一区二区三区| 在线亚洲精品福利网址导航| 亚洲不卡影院| 一级毛片中文字幕| 99久久精品国产精品亚洲| 女同国产精品一区二区| 久久精品一卡日本电影| 日韩东京热无码人妻| 欧美一区二区人人喊爽| 91综合色区亚洲熟妇p| 无码国内精品人妻少妇蜜桃视频 | 色综合久久88色综合天天提莫| 怡红院美国分院一区二区| 亚洲日本中文字幕乱码中文| 午夜日b视频| 色婷婷狠狠干| 亚洲日韩精品综合在线一区二区 | 久久国产精品电影| 中文字幕亚洲综久久2021| 亚洲精品第五页| 99热最新在线| 久久人搡人人玩人妻精品一| www.精品国产| 亚洲欧洲日产无码AV| 亚洲人成日本在线观看| 国产精品亚洲专区一区| 国产黑丝一区| 亚洲国产日韩视频观看| 国产成人精品一区二区免费看京| 麻豆精品在线播放| 国产激情在线视频| 亚洲欧美另类日本| 亚洲精品国产首次亮相| 天天色天天综合| 国产91熟女高潮一区二区| 国产91麻豆视频|