The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution
详细信息    查看全文
  • 作者:Yi Luo (1)
    Zhiwen Zhao (1) (2)
    Zhangji Zhao (3)
    Haiming Long (1)
    Wen Su (1)
    Yixian Yang (4)
  • 关键词:Quantum sealed ; bid auction with post ; confirmation ; Cryptanalysis ; Collusion
  • 刊名:Quantum Information Processing
  • 出版年:2013
  • 出版时间:January 2013
  • 年:2013
  • 卷:12
  • 期:1
  • 页码:295-302
  • 全文大小:129KB
  • 参考文献:1. Bennett, C.H., Brassard, G.: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. Bangalore, India, p. 175 (1984)
    2. Shurupov A.P., Straupe S.S., Kulik S.P., Gharib M., Wahiddin M.R.B.: Quantum state engineering with ququarts: application for deterministic QKD protocol. EPL 87, 10008 (2009) CrossRef
    3. Zhang L.J., Silberhorn C., Walmsley I.A: Secure quantum key distribution using continuous variables of single photons. Phys. Rev. Lett. 100, 110504 (2008) CrossRef
    4. Wen K., Tamaki K., Yamamoto Y.: Unconditional security of single-photon differential phase shift quantum key distribution. Phys. Rev. Lett. 103, 170503 (2009) CrossRef
    5. Chen X.B., Xu G., Niu X.X., Wen Q.Y., Yang Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561 (2010) CrossRef
    6. Chen X.B., Xu G., Yang Y.X., Wen Q.Y.: An efficient protocol for the secure multi-party quantum summation. Int. J. Quantum Inf. 49, 2793 (2010)
    7. Gao F., Guo F.Z., Wen Q.Y., Zhu F.C.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. Chin. Ser. G-Phys. Mech. Astron. 51, 559 (2008) CrossRef
    8. Chen X.B., Wen Q.Y., Guo F.Z., Sun Y., Xu G., Zhu F.C.: Controlled quantum secure direct communication with W state. Int. J. Quantum Inf. 6, 899 (2008) CrossRef
    9. Chen X.B., Wen Q.Y., Xu G., Yang Y.X., Zhu F.C.: Comment on “general relation between the transformation operator and an invariant under stochastic local operations and classical communication in quantum teleportation- Phy. Rev. A 79, 036301 (2009) CrossRef
    10. Naseri M.: Secure quantum sealed-bid auction. Opt. Commun. 282, 1939 (2009) CrossRef
    11. He, L.-B., Huang, L.-S., Yang, W., Xu, R., Han, D.-Q.: Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation. Quantum Inf. Process. (2011). doi:10.1007/s11128-011-0275-5
    12. Yang Y.G., Naseri M., Wen Q.Y.: Improved secure quantum sealed-bid auction. Opt. Commun. 282, 4167 (2009) CrossRef
    13. Qin S.J., Wen Q.Y., Guo F.Z., Zhu F.C.: Cryptanalysis and improvement of a DSQC using four-particle entangled state. Opt. Commun. 282, 4017 (2009) CrossRef
    14. Deng F.G., Long G.L., Liu X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68, 042317 (2003) CrossRef
    15. Zheng, Y.Q., Zhao, Z.W.: Comment on: “secure quantumsealed-bid auction-[Opt. Comm. 282 (2009) 1939]. Opt. Commun. 282, 4182 (2009)
    16. Liu Y.M., Wang D., Liu X.S., Zhang Z.J.: Revisiting Naseri’s secure quantum sealed-bid auction. Int. J. Quantum Inf. 7, 1295 (2009) CrossRef
    17. Zhao Z.W., Naseri M., Zheng Y.Q.: Secure quantum sealed-bid auction with post-confirmation. Opt. Commun. 283, 3194 (2010) CrossRef
  • 作者单位:Yi Luo (1)
    Zhiwen Zhao (1) (2)
    Zhangji Zhao (3)
    Haiming Long (1)
    Wen Su (1)
    Yixian Yang (4)

    1. Department of Electronics, School of Information, Beijing Normal University, Beijing, 100875, China
    2. School of Instrumentation Science and Optoelectronics Engineering, Beihang University, Beijing, 100191, China
    3. Department of Physics, University of Illinois at Urbana-Champaign, Urbana, IL, 61801-3080, USA
    4. Information Security Center, Beijing University of Posts and Telecommunications, Beijing, 100876, China
  • ISSN:1573-1332
文摘
In the literature He et?al. (Quantum Inf Process, 2011) performed the cryptanalysis about the protocol of secure quantum auction with post-confirmation, and proposed the melioration algorithm in order to defeat the collusion among some malicious bidders in Zhao et?al.’s protocol (Zhao et?al. in Opt Commun 283:3194, 2010). But unfortunately, this protocol can’t defeat the collusion among some malicious bidders either. In this paper, we will analyze the security of He et?al.’s protocol and point out the potential loophole. Furthermore, we propose an improved protocol which can defeat the collusion among malicious bidders effectively.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700