Two-party quantum privacy comparison with polarization-entangled bell states and the coherent states

  • Authors:
  • Xiao-Ming Xiu;Li Dong;Hong-Zhi Shen;Ya-Jun Gao;X. X. Yi

  • Affiliations:
  • College of Mathematics and Physics, Bohai University, Jinzhou, P.R.China and School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian, P.R.China;College of Mathematics and Physics, Bohai University, Jinzhou, P.R.China and School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian, P.R.China;School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian, P.R.China;College of Mathematics and Physics, Bohai University, Jinzhou, P.R.China;School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian, P.R.China

  • Venue:
  • Quantum Information & Computation
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose a protocol of quantum privacy comparison with polarization-entangled Bell states and the coherent states. One of two legitimate participants, Alice, prepares polarization-entangled Bell states and keeps one photon of each photon pair and sends the other photons to the third party, Charlie. Receiving the photons, Charlie performs single-photon transformation operations on them and then sends them to the other legitimate participant, Bob. Three participants adopt parity analysis method to check the distribution security of Bell states. Exploiting polarization beam splitters and non-linear interactions mediated by the probe coherent states in Kerr media, Alice and Bob check the parities of their photons using the bases of {|H〉, |V〉} or {|+〉, |-〉}. On the basis of the parity analysis outcomes and Charlie's publicized information, they can analyze the security of the distributed quantum channel. Confirming secure distribution of the shared Bell states, two participants perform respective parity measurements on the privacy photons and own photons of Bell states, and then send the results to Charlie. According to information provided by two legitimate participants and his single-qubit transformation operations, Charlie compares the privacy information of Alice and Bob and publicizes the conclusion.