Physics – Quantum Physics
Scientific paper
2012-04-20
Physics
Quantum Physics
5 pages
Scientific paper
We analyze the security of the efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. It is shown that the compromised third party (TP) can obtain the final comparison result without introducing any detectable errors in the standard semi-honest model. The attack strategy is discussed in detail and an improvement of this protocol is demonstrated. The idea of our attack might be instructive for the cryptanalysis of quantum cryptographic schemes.
Long Dongyang
Sun Zhiwei
No associations
LandOfFree
Cryptanalysis of the efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Cryptanalysis of the efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptanalysis of the efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-5522