Skip to main content
Log in

The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

In the literature He et al. (Quantum Inf Process, 2011) performed the cryptanalysis about the protocol of secure quantum auction with post-confirmation, and proposed the melioration algorithm in order to defeat the collusion among some malicious bidders in Zhao et al.’s protocol (Zhao et al. in Opt Commun 283:3194, 2010). But unfortunately, this protocol can’t defeat the collusion among some malicious bidders either. In this paper, we will analyze the security of He et al.’s protocol and point out the potential loophole. Furthermore, we propose an improved protocol which can defeat the collusion among malicious bidders effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Bennett, C.H., Brassard, G.: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. Bangalore, India, p. 175 (1984)

  2. Shurupov A.P., Straupe S.S., Kulik S.P., Gharib M., Wahiddin M.R.B.: Quantum state engineering with ququarts: application for deterministic QKD protocol. EPL 87, 10008 (2009)

    Article  ADS  Google Scholar 

  3. Zhang L.J., Silberhorn C., Walmsley I.A: Secure quantum key distribution using continuous variables of single photons. Phys. Rev. Lett. 100, 110504 (2008)

    Article  ADS  Google Scholar 

  4. Wen K., Tamaki K., Yamamoto Y.: Unconditional security of single-photon differential phase shift quantum key distribution. Phys. Rev. Lett. 103, 170503 (2009)

    Article  ADS  Google Scholar 

  5. Chen X.B., Xu G., Niu X.X., Wen Q.Y., Yang Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561 (2010)

    Article  ADS  Google Scholar 

  6. Chen X.B., Xu G., Yang Y.X., Wen Q.Y.: An efficient protocol for the secure multi-party quantum summation. Int. J. Quantum Inf. 49, 2793 (2010)

    MathSciNet  MATH  Google Scholar 

  7. Gao F., Guo F.Z., Wen Q.Y., Zhu F.C.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. Chin. Ser. G-Phys. Mech. Astron. 51, 559 (2008)

    Article  ADS  Google Scholar 

  8. Chen X.B., Wen Q.Y., Guo F.Z., Sun Y., Xu G., Zhu F.C.: Controlled quantum secure direct communication with W state. Int. J. Quantum Inf. 6, 899 (2008)

    Article  MATH  Google Scholar 

  9. Chen X.B., Wen Q.Y., Xu G., Yang Y.X., Zhu F.C.: Comment on “general relation between the transformation operator and an invariant under stochastic local operations and classical communication in quantum teleportation”. Phy. Rev. A 79, 036301 (2009)

    Article  ADS  Google Scholar 

  10. Naseri M.: Secure quantum sealed-bid auction. Opt. Commun. 282, 1939 (2009)

    Article  ADS  Google Scholar 

  11. He, L.-B., Huang, L.-S., Yang, W., Xu, R., Han, D.-Q.: Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation. Quantum Inf. Process. (2011). doi:10.1007/s11128-011-0275-5

  12. Yang Y.G., Naseri M., Wen Q.Y.: Improved secure quantum sealed-bid auction. Opt. Commun. 282, 4167 (2009)

    Article  ADS  Google Scholar 

  13. Qin S.J., Wen Q.Y., Guo F.Z., Zhu F.C.: Cryptanalysis and improvement of a DSQC using four-particle entangled state. Opt. Commun. 282, 4017 (2009)

    Article  ADS  Google Scholar 

  14. Deng F.G., Long G.L., Liu X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68, 042317 (2003)

    Article  ADS  Google Scholar 

  15. Zheng, Y.Q., Zhao, Z.W.: Comment on: “secure quantumsealed-bid auction” [Opt. Comm. 282 (2009) 1939]. Opt. Commun. 282, 4182 (2009)

    Google Scholar 

  16. Liu Y.M., Wang D., Liu X.S., Zhang Z.J.: Revisiting Naseri’s secure quantum sealed-bid auction. Int. J. Quantum Inf. 7, 1295 (2009)

    Article  MATH  Google Scholar 

  17. Zhao Z.W., Naseri M., Zheng Y.Q.: Secure quantum sealed-bid auction with post-confirmation. Opt. Commun. 283, 3194 (2010)

    Article  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiwen Zhao.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Luo, Y., Zhao, Z., Zhao, Z. et al. The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution. Quantum Inf Process 12, 295–302 (2013). https://doi.org/10.1007/s11128-012-0372-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-012-0372-0

Keywords

Navigation