Tian, Yuan Li, Jian Ye, Chongqiang Chen, Xiu-Bo Li, Chaoyang
Published in
International Journal of Theoretical Physics
Semi-quantum private comparison, which authorizes two classical participants to compare the equality of their private information with the cooperation of a semi-honest third party without unveiling privacy. The W-state is more robust against the loss of any single qubit than the GHZ state. In this paper, an efficient and secure semi-quantum private...
Shi, Jinjing Lu, Yuhu Feng, Yanyan Huang, Duan Lou, Xiaoping Li, Qin Shi, Ronghua
Published in
Quantum Information Processing
Boson sampling (BS) is an elegant candidate for the proof of quantum supremacy, and the exploration of its practical cryptographic applications is just at the beginning, including one-way functions, private-key cryptography and quantum signature. In order to investigate improvement methods for the combination of cryptography and BS, we propose a qu...
He, Guang Ping
Published in
Quantum Information Processing
Measurement-device-independent quantum key distribution (MDI-QKD) provides a method for secret communication whose security does not rely on trusted measurement devices. In all existing MDI-QKD protocols, the participant Charlie has to perform Bell state measurement or other joint measurements. Here, we propose an MDI-QKD protocol which requires in...
Zhang, Yuanjing Shang, Tao Chen, Ranyiliu Liu, Jianwei
Published in
Quantum Information Processing
In cryptography, obfuscation is one of the strongest forms of encryption. Point functions have been widely discussed in classical obfuscation so that obfuscation of point functions becomes an important branch of obfuscation theory. For quantum circumstance, a series of positive results in quantum point obfuscation have been proposed and indicate th...
Vyas, Nilesh
Extending the functionality and overcoming the performance limitation of QKD requires either quantum repeaters or new security models. Investigating the latter option, we introduce the Quantum Computational Timelock (QCT) security model, assuming that computationally secure encryption may only be broken after time much longer than the coherence tim...
Li, Jie Yang, Yu-Guang Li, Jian Wang, Yue-Chao Yang, Yong-Li Zhou, Yi-Hua Shi, Wei-Min
Published in
Quantum Information Processing
Deterministic secure quantum communication (DSQC) is an important primitive of quantum cryptography and has attracted continuous attention. Here, we report the first DSQC protocol based on spatial encoding. The qubit information is encoded in the spatial-mode degree of freedom of photons. A decoy state technique is used to ensure the security of th...
Sutradhar, Kartick Om, Hari
Published in
Quantum Information Processing
The secure multi-party quantum multiplication is one of the primitive operations in quantum cryptography that plays an important role to design complex quantum protocols like comparison, sorting, e-voting, etc. The existing multi-party quantum multiplication protocols are efficient, but they have some security issues as these protocols have approac...
Yang, Yu-Guang Wang, Yue-Chao Li, Jian Zhou, Yi-Hua Shi, Wei-Min
Published in
Quantum Information Processing
In quantum key agreement (QKA), a shared key is established among two or more parties where each participant equally contributes its part to the shared key, and none of the participants can determine the shared key alone. Zhou et al. (Electron Lett 40(18):1149, 2004) gave the first QKA protocol based on quantum teleportation and since then quite a ...
Tian, Yuan Li, Jian Chen, Xiu-Bo Ye, Chong-Qiang Li, Chao-Yang Hou, Yan-Yan
Published in
Quantum Information Processing
Semi-quantum private comparison protocol permits two classical participants to compare the equality of their private information with the help of a semi-honest third party without disclosing privacy. An innovative semi-quantum private comparison protocol based on maximally entangled Greenberger–Horne–Zeilinger-type states has been discussed. The pr...
Liu, Zhi-Hao Chen, Han-Wu
Published in
Quantum Information Processing
Recently, a controlled quantum secure direct communication (CQSDC) with authentication protocol based on the five-particle cluster state and the classical XOR operation was put forward (Quantum Inf Process 18:129, 2019). However, it is found that this CQSDC protocol has some serious security problems. Firstly, it is weak against disturbance attack ...