Computer Science ›› 2023, Vol. 50 ›› Issue (6): 291-296.doi: 10.11896/jsjkx.220500063

• Computer Network • Previous Articles     Next Articles

Quantum Auction Protocol Based on Semi-quantum Private Comparison

YANG Han1, FENG Yan1,2, XIE Sijiang1,2   

  1. 1 Cyberspace Security Department,Beijing Electronic Science and Technology Institute,Beijing 100070,China
    2 University of Science and Technology of China,Hefei 230026,China
  • Received:2022-05-06 Revised:2022-09-08 Online:2023-06-15 Published:2023-06-06
  • About author:YANG Han,born in 1998,postgra-duate.Her main research interests include cyberspace security and quantum cryptography.FENG Yan,born in 1979,master,associate professor.Her main research interests include cryptography,network security,and quantum communication network security system.
  • Supported by:
    Anhui Province Guidance Project of Quantum Communication and Quantum Computer Major Projects (AHY180500) and Guangdong Province Key Research and Development Project(2020B03030100001).

Abstract: A quantum sealed-bid auction protocol using high-energy single particles as information carriers,based on semi-quantum private comparison is proposed to address the situation of insufficient privacy protection for quotations,the untrustworthy third party,and high quantum capability requirements for both participants in quantum sealed-bid auction protocols.This protocol does not involve third parties and uses a semi-quantum approach,requiring only that the auctioneer be a strong quantum capable party and that the bidder only have the ability to reflect particles and prepare single particles.This protocol achieves privacy protection for quotations through semi-quantum private comparison,where the auctioneer only has access to the size relationship between quotations,but not to specific quotations.It is theoretically analyzed that the protocol has high security and can resist the attacks of measure-resend,intercept-resend,entanglement,and collusion.And the communication efficiency of this protocol is stable,which is not affected by the number of bidders.

Key words: Quantum auction, Quantum sealed-bid auction, Semi-quantum, Semi-quantum private comparison, High-level quantum state

CLC Number: 

  • TN918.1
[1]NASERI M.Secure quantum sealed-bid auction[J].OpticsCommunications,2009,282(9):1939-1943.
[2]QIN S J,GAO F,WEN Q Y,et al.Cryptanalysis and improvement of a secure quantumsealed-bid auction [J].Optics Communications,2009,282(19):4014-4016.
[3]YANG Y G,NASERI M,WEN Q Y.Improved secure quantum sealed-bid auction [J].Optics Communications,2009,282(20):4167-4170.
[4]LIU,Y M,WANG D,LIU X S,et al.Revisiting Naseri's Secure Quantum Sealed-bid Auction [J].International Journal of Quantum Information,2009,7(6):1295-1301.
[5]ZHENG Y Q,ZHAO Z W.Comment on:“Secure QuantumSealed-bid Auction” [J].Optics Communications,2009,282(20):4182.
[6]WANG Z Y.Quantum Secure Direct Communication and Quantum Sealed-Bid Auction with EPR Pairs [J].Communications in Theoretical Physics,2010,54(6):997-1002.
[7]LIU W J,WANG F,JI S,et al.Attacks and Improvement ofQuantum Sealed-Bid Auction with EPR Pairs [J].Communications in Theoretical Physics,2014,61(6):686-690.
[8]ZHAO Z W,NASERI M,ZHENG Y Q.Secure quantum sealed-bid auction with post-confirmation [J].Optics Communications,2010,283(16):3194-3197.
[9]ZHAO Z J,WANG W J.Comment on:“Cryptanalysis and Improvement of the Secure Quantum Sealed-bid Auction with Post Confirmation” [J].International Journal of Quantum Information,2014,12(6):1475001-1-1475001-3.
[10]XU G A,ZHAO Z W,CHEN X B,et al.Cryptanalysis and improvement of the secure quantum sealed-bid auction with post-confirmation [J].International Journal of Quantum Information,2011,9(6):1383-1392.
[11]HE L B,HUANG L S,YANG W,et al.Cryptanalysis and Melioration of Secure Quantum Sealed-bid Auction with Post-confirmation [J].Quantum Information Processing,2012,11(6):1359-1369.
[12]WANG Q L,ZHANG W W,SU Q.Revisiting “The Loophole of the Improved Secure Quantum Sealed-Bid Auction with Post-Confirmation and Solution”[J].International Journal of Theoretical Physics,2014,53(9):3147-3153.
[13]SHI R H,LIANG F Y,WANG Q,et al.An Effective Quantum Sealed-bid Auction Protocol [J].Netinfo Security,2019,19(8):44-50.
[14]WANG Q,SHI R H,CHEN Z K,et al.A Quantum Sealed Auction Protocol Based on Secret Sharing [J].International Journal of Theoretical Physics,2019,58(4):1128-1137.
[15]SHI R H,ZHANG R,LIU B,et al.Cryptanalysis and Improvement of Quantum Sealed-Bid Auction [J].International Journal of Theoretical Physics,2020(59):1917-1926.
[16]LIANG F Y.Design of a Verifiable Bidding auction Protocol for Quantum Seals[D].Hefei:Anhui University,2020.
[17]ZHANG R,SHI R H,QIN J Q,et al.An Economic and Feasible Quantum Sealed-bid Auction Protocol [J].Quantum Information Processing,2018,17(2):35-1-35-14.
[18]WANG Q.Research on privacy protection and post confirmation mechanism of quantum sealed bidding auction[D].Hefei:Anhui University,2020.
[19]SHI R H.Quantum Sealed-Bid AuctionWithout a Trusted Third Party [J].IEEE Transactions on Circuits and Systems I:Regular Papers,2021,68(10):4221-4231.
[20]SHI R H.Anonymous Quantum Sealed-Bid Auction [J].IEEE Transactions on Circuits and Systems II:Express Briefs,2022,69(2):414-418.
[21]SHI R H,LI Y F.A Feasible Quantum Sealed-Bid Auction Scheme Without an Auctioneer [J].IEEE Transactions on Quantum Engineering,2022(3):1-12.
[22]XU Q D.Design and analysis of a two-party semi-quantum secret comparison protocol[D].Nanchang:Nanchang University,2021.
[23]YE X L.Generation of high-dimensional quantum entangled states and its application in quantum communication [D].Xiamen:Huaqiao University,2013.
[24]HU X M,XING W B,LIU B H,et al.Efficient generation of high-dimensional entanglement through multipath down-conversion [J].Physical Review Letters,2020,125(9):090503-1-090503-6.
[25]BOYER M,KENIGSBERG D,MOR T.Quantum key distribution with classical Bob [J].Physical Review Letters,2007,99(14):140501-1-140501-4.
[26]NIE Y Y,LI Y H,WANG Z S.Semi-quantum information splitting using GHZ-type states [J].Quantum Information Proces-sing,2013,12(1):437-448.
[27]LUO Y,ZHAO Z W,ZHAO Z J,et al.The loophole of the Improved Secure Quantum Sealed-bid Auction with Post-confirmation and Solution [J].Quantum Information Processing,2013,12(1):295-302.
[1] FENG Yan, WANG Rui-cong. Quantum Voting Protocol Based on Quantum Fourier Transform Summation [J]. Computer Science, 2022, 49(5): 311-317.
[2] WGAN Ting-ting, ZHU Jiang. Network Security Situation Forecast Based on Differential WGAN [J]. Computer Science, 2019, 46(11A): 433-437.
[3] MAO He-feng, HU Bin. Homomorphic Evaluation of Lightweight Block Cipher over Integers [J]. Computer Science, 2018, 45(11): 169-175.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!