Font Size: a A A

The Design And Analysis Of Quantum Private Comparison Protocol

Posted on:2017-07-04Degree:MasterType:Thesis
Country:ChinaCandidate:L JiaFull Text:PDF
GTID:2310330518495434Subject:Intelligent Science and Technology
Abstract/Summary:PDF Full Text Request
Secure Multi-party computation(SMC)is an important part and hot field in secure communication,and two-party private comparison is a basic problem of SMC,which enables two participants to compare the equality of their private inputs without exposing any information about their respective private inputs.private comparison shows a big potential for the applications in secret sharing,electronic auction,anonymous voting and surveying.Private comparison has been extensively researched in classical cryptography.However,classical cryptography,whose security is based on the computational complexity of mathematical NP problems,is vulnerable to strong quantum computer.Different from the classical cryptography,the security of quantum communication technology is based on the basic principle of quantum mechanics,thus having properties of unconditional security and eavesdropping detectability.The research of quantum cryptography brings new ideas and methods for secure communication.Based on this,three different quantum private comparison of equality(QPCE)protocols are proposed innovatively after a deep research in this design,including a QPCE protocol based on the three particle W-Class state and unitary operation,a QPCE protocol based on the entanglement swapping between three particle W-Class state and Bell state and a QPCE protocol based on the entanglement swapping between four particle W state and Bell state.The correctness,security and fairness of the protocols are also analyzed in detail,which shows that the proposed protocols can not only get the correct comparison results,but also be able to resist various attacks.In addition,a comparison is made between the proposed protocols and the previous QPCE protocols.The comparison result shows that the proposed protocol has higher security,efficiency and quantum efficiency.
Keywords/Search Tags:secure multi-party computation, quantum private comparison, quantum cryptography
PDF Full Text Request
Related items