Quantum private comparison with a malicious third party

Zhiwei Sun,Jianping Yu,Ping Wang,Lingling Xu,Chunhui Wu
DOI: https://doi.org/10.1007/s11128-015-0956-6
IF: 1.965
2015-01-01
Quantum Information Processing
Abstract:In this paper, we will show that quantum private comparison protocol is secure when a malicious third party is presented. The security of the protocol is considered in a cheat-sensitive model, in which the TP is kept honest by the possibility of being caught cheating. Besides, we enhance the privacy of the quantum private comparison protocol, where the participants’ inputs and the comparison result can be preserved. Furthermore, in contrast to pervious protocols requiring a large amount of quantum resources, such as entanglement and quantum memory, our protocol is based on BB84 protocol, which is more feasible for practical applications. Finally, we analyze the security of the presented protocol.
What problem does this paper attempt to address?