Cryptanalysis of the efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

5 pages

Scientific paper

We analyze the security of the efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. It is shown that the compromised third party (TP) can obtain the final comparison result without introducing any detectable errors in the standard semi-honest model. The attack strategy is discussed in detail and an improvement of this protocol is demonstrated. The idea of our attack might be instructive for the cryptanalysis of quantum cryptographic schemes.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Cryptanalysis of the efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Cryptanalysis of the efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptanalysis of the efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-5522

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.