Comment on quantum private comparison protocols with a semi-honest third party

  • Authors:
  • Yu-Guang Yang;Juan Xia;Xin Jia;Hua Zhang

  • Affiliations:
  • College of Computer Science and Technology, Beijing University of Technology, Beijing, China 100124 and State Key Laboratory of Integrated Services Network, Xidian University, Xi'an, China 710071;College of Computer Science and Technology, Beijing University of Technology, Beijing, China 100124;College of Computer Science and Technology, Beijing University of Technology, Beijing, China 100124;State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China 100876

  • Venue:
  • Quantum Information Processing
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

As an important branch of quantum cryptography, quantum private comparison (QPC) has recently received a lot of attention. In this paper we study the security of previous QPC protocols with a semi-honest third party (TP) from the viewpoint of secure multi-party computation and show that the assumption of a semi-honest TP is unreasonable. Without the unreasonable assumption of a semi-honest TP, one can easily find that the QPC protocol (Tseng et al. in Quantum Inf Process, 2011, doi: 10.1007/s11128-011-0251-0 ) has an obvious security flaw. Some suggestions about the design of QPC protocols are also given.