TY - JOUR
T1 - Improved Dynamic Multi-Party Quantum Private Comparison for Next-Generation Mobile Network
AU - Abulkasim, Hussein
AU - Alsuqaih, Hanan Naser
AU - Hamdan, Walaa Fawzy
AU - Hamad, Safwat
AU - Farouk, Ahmed
AU - Mashatan, Atefeh
AU - Ghose, Shohini
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2019
Y1 - 2019
N2 - The advent of next-generation networks, such as fifth-generation cellular wireless (5G), has transformed every aspect of our lives and promised improvement for various real-life applications. Recently, Liu and Wang proposed a dynamic quantum private comparison protocol that utilizes the property of single photon, in both polarization and spatial-mode degrees of freedom. The protocol is intended to compare the private information of any two parties in $n$ parties with the support of the other $n$ -2 parties. However, we show that their protocol is not secure against a particular strategy of collusion attacks that leads to the problem of information leakage. Therefore, this paper suggests a security enhancement against the proposed attack strategy trying to overcome the security limitation of Liu and Wang's work. The security analysis of the suggested improvement proved that the modified protocol is secure against both the internal and external attacks, which could be used to control the various auction models for 5G services as wireless network virtualization in a secure way.
AB - The advent of next-generation networks, such as fifth-generation cellular wireless (5G), has transformed every aspect of our lives and promised improvement for various real-life applications. Recently, Liu and Wang proposed a dynamic quantum private comparison protocol that utilizes the property of single photon, in both polarization and spatial-mode degrees of freedom. The protocol is intended to compare the private information of any two parties in $n$ parties with the support of the other $n$ -2 parties. However, we show that their protocol is not secure against a particular strategy of collusion attacks that leads to the problem of information leakage. Therefore, this paper suggests a security enhancement against the proposed attack strategy trying to overcome the security limitation of Liu and Wang's work. The security analysis of the suggested improvement proved that the modified protocol is secure against both the internal and external attacks, which could be used to control the various auction models for 5G services as wireless network virtualization in a secure way.
KW - Next generation mobile network
KW - collusion attack
KW - quantum private comparison protocol
KW - single photon in both polarization and spatial-mode degrees of freedom
UR - https://www.scopus.com/pages/publications/85061776477
U2 - 10.1109/ACCESS.2019.2894101
DO - 10.1109/ACCESS.2019.2894101
M3 - Article
AN - SCOPUS:85061776477
SN - 2169-3536
VL - 7
SP - 17917
EP - 17926
JO - IEEE Access
JF - IEEE Access
M1 - 8620509
ER -