...
首页> 外文期刊>Communications in Theoretical Physics >Cryptanalysis and improvement of several quantum private comparison protocols
【24h】

Cryptanalysis and improvement of several quantum private comparison protocols

机译:几个量子私有比较方案的密码分析和改进

获取原文
获取原文并翻译 | 示例

摘要

Recently, Wuet al(2019Int. J. Theor. Phys.581854) found a serious information leakage problem in Ye and Ji's quantum private comparison protocol (2017Int. J. Theor. Phys.561517), that is, a malicious participant can steal another's secret data without being detected through an active attack means. In this paper, we show that Wuet al's active attack is also effective for several other existing protocols, including the ones proposed by Jiet aland Zhaet al(2016Commun. Theor. Phys.65711; 2018Int. J. Theor. Phys.573874). In addition, we propose what a passive attack means, which is different from Wuet al's active attack in that the malicious participant can easily steal another's secret data only by using his own secret data after finishing the protocol, instead of stealing the data by forging identities when executing the protocol. Furthermore, we find that several other existing quantum private comparison protocols also have such an information leakage problem. In response to the problem, we propose a simple solution, which is more efficient than the ones proposed by Wuet al, because it does not consume additional classical and quantum resources.
机译:最近,Wuet al(2019 int。j.bor。phys.581854)在Ye和Ji的Quantum私人比较方案(2017Int。J. Hy.77.561517)中发现了一个严重的信息泄漏问题(Phys.561517),即恶意参与者可以偷走另一个人秘密数据不通过主动攻击手段检测。在本文中,我们表明,WUET AL的积极攻击对于其他几个现有议定书也是有效的,包括Jiet Aland Zhaet Al(2016Commun。)。Physm.65711; 2018Int。J. Weal.Phys.573874)。此外,我们提出了一种被动攻击手段,与Wuet Al的积极攻击不同,因为恶意参与者只能通过在完成协议后使用自己的秘密数据来轻松窃取另一个的秘密数据,而不是通过锻造身份窃取数据执行协议时。此外,我们发现其他几个现有量子私有比较协议也具有这样的信息泄漏问题。为了响应问题,我们提出了一种简单的解决方案,它比Wuet al提出的解决方案更有效,因为它不会消耗额外的经典和量子资源。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号