Skip to main content
Log in

Cryptanalysis and Improvement of Quantum Sealed-Bid Auction

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

The security of previously proposed Quantum Sealed-bid Auction (QSA) protocols is analyzed. It is shown that there may be a malicious bidder to disrupt the auction that he sends a true bid to auctioneer and commits a fake bid to other bidders. Consequently, these honest bidders may mistakenly think the auctioneer is dishonest. To avoid this security flaw, we propose an improved protocol which can more perfectly meet the security of QSA.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Bennett Ch H, Brassard G. Quantum cryptography: public key distribution and coin tossing Int//Conf. on Computers, Systems and Signal Processing (Bangalore, India, Dec. 1984). 1984: 175–9

  2. Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A. 65(3), 032302 (2002)

    Article  ADS  Google Scholar 

  3. Lo, H.K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94(23), 230504 (2005)

    Article  ADS  Google Scholar 

  4. Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A. 68(4), 042317 (2003)

    Article  ADS  Google Scholar 

  5. Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Quantum secure direct communication with χ-type entangled states. Phys. Rev. A. 78(6), 064304 (2008)

    Article  ADS  Google Scholar 

  6. Wang, J., Zhang, Q., Tang, C.: Quantum secure direct communication based on order rearrangement of single photons. Phys. Lett. A. 358(4), 256–258 (2006)

    Article  ADS  Google Scholar 

  7. Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A. 59(3), 1829–1834 (1999)

    Article  ADS  MathSciNet  Google Scholar 

  8. Zhang, Z., Li, Y., Man, Z.: Multiparty quantum secret sharing. Phys. Rev. A. 71(4), 044301 (2005)

    Article  ADS  MathSciNet  Google Scholar 

  9. Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A. 65(4), 042312 (2002)

    Article  ADS  Google Scholar 

  10. Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A. 84(2), 022344 (2011)

    Article  ADS  Google Scholar 

  11. Naseri, M.: Secure quantum sealed-bid auction. Opt. Commun. 282(9), 1939–1943 (2009)

    Article  ADS  Google Scholar 

  12. Qin, S.J., Gao, F., Wen, Q.Y., Meng, L.M., Zhu, F.C.: Cryptanalysis and improvement of a secure quantum sealed-bid auction. Opt. Commun. 282(19), 4014–4016 (2009)

    Article  ADS  Google Scholar 

  13. Yang, Y.G., Naseri, M., Wen, Q.Y.: Improved secure quantum sealed-bid auction. Opt. Commun. 282(20), 4167–4170 (2009)

    Article  ADS  Google Scholar 

  14. Liu, Y.M., Wang, D., Liu, X.S., et al.: Revisiting Naseri's secure quantum sealed-bid auction. Int. J. Quantum Inf. 7(06), 1295–1301 (2009)

    Article  Google Scholar 

  15. Zheng, Y., Zhao, Z.: Comment on:“ Secure quantum sealed-bid auction”[Opt. Comm. 282 (2009) 1939]. Opt. Commun. 282(20), 4182 (2009)

    Article  ADS  Google Scholar 

  16. Zhao, Z., Naseri, M., Zheng, Y.: Secure quantum sealed-bid auction with post-confirmation. Opt. Commun. 283(16), 3194–3197 (2010)

    Article  ADS  Google Scholar 

  17. Xu, G.A., Zhao, Z.W., Chen, X.B., et al.: Cryptanalysis and improvement of the secure quantum sealed-bid auction with postconfirmation. Int J Quantum Inf. 9(06), 1383–1392 (2011)

    Article  Google Scholar 

  18. He, L.B., Huang, L.S., Yang, W., et al.: Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation. Quantum Inf. Process. 1–11 (2012)

  19. Zhang-Yin, W.: Quantum secure direct communication and quantum sealed-bid auction with EPR pairs. Commun. Theor. Phys. 54(6), 997 (2010)

    Article  ADS  Google Scholar 

  20. Liu, W.J., Wang, H.B., Yuan, G.L., Xu, Y., Chen, Z.Y., An, X.X., Ji, F.G., Gnitou, G.T.: Multiparty quantum sealed-bid auction using single photons as message carrier. Quantum Inf. Process. 15(2), 869–879 (2016)

    Article  ADS  MathSciNet  Google Scholar 

  21. Yang, Y.G., Jia, X., Wang, H.Y., Zhang, H.: Verifiable quantum (k, n)-threshold secret sharing. Quantum Inf. Process. 11(6), 1619–1625 (2012)

    Article  ADS  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Nos. 61772001 and 61672010).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingwu Zhang.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

We design a new Quantum Secret Sharing (QSS) protocol to meet the QSA protocol proposed above. Suppose that the protocol consists of one secret distributor (Dick), and n participants (P1, P2, …, Pn). The secret distributor Dick wants to distribute a random m-bit secret to n participants, which is binary sequence and can be expressed as KD. In addition, any participant can only get partial secret called sub-secret. When n participants put all sub-secrets together, the original secret will be recovered, but less than n participants cannot recover the original secret. The proposed QSS protocol consists of 9 Steps, which can be described in detail as follows:

  • Step 1: According to the secret KD, the secret distributor Dick prepares a sequence of ordered m single photons SD, where the coding rules are as follows:

$$ 0\longleftrightarrow \mid \left.0\right\rangle\ \mathrm{or}\mid \left.+\right\rangle; 1\longleftrightarrow \mid \left.1\right\rangle\ \mathrm{or}\mid \left.-\right\rangle $$
(3)

Furthermore, Dick prepares p decoy photons to prevent the eavesdropping. And the state of each decoy photon is randomly selected from {| 0⟩, | 1⟩, | +⟩, | −⟩}. Then, Dick randomly inserts the p decoy photons into the sequence SD to form a new one S, and Dick makes a record of the positions and initial states of these inserted photons, which are unknown to all participants. Finally, Dick sends the photon sequence S to the participants Pi for i = 1, 2, …, n, who is randomly chose by the secret distributor.

  • Step 2: After confirming that he has received the sequence S, the participant Pi randomly selects a unitary operation U from {I, y} and then performs it on each photon of the sequence S. If U = I, the initial sub-secret correspinding to the photon is the classic bit 0. If U = y, the initial sub-secret correspinding to the photon is the classic bit 1. In this way, the participant Pi can get his initial sub-secret, expressed as SKi. In addition, he can obtain a transformed photon sequence S. Furthermore, the participant Pi randomly selects another participant Pj and sends the transformed sequence S to Pj through the quantum channel, where j ∈ {1, 2, …, n} and j ≠ i. Meanwhile, the participant Pi returns an 1-bit feedback information to Dick through the classical channel, indicating that he has obtained the corresponding initial sub-secret.

  • Step 3: After receiving the transformed photon sequence S, the participant Pj judges whether it is the first time that the photon sequence is received. If it is, step 4 is executed; otherwise, step 5 or step 6 is executed randomly.

  • Step 4: Similar to Step 2, the participant Pj performs a random unitary operation on each photon in the sequence S to get initial sub-secret, expressed as SKj, where the unitary operation U is randomly selected from {I, y}. Similarly, he can get the transformed photon sequence S′′. Furthermore, the participant Pj randomly selects another participant Pl and sends the transformed sequence S′′ to Pl through the quantum channel, where l ∈ {1, 2, …, n} and l ≠ j ≠ i. In addition, the participant Pj also needs to return an 1-bit feedback message to Dick through the classical channel.

  • Step 5: The participant Pj already has the initial sub-secret SKj, and he performs another random unitary operation U on each photon of the sequence S to form a middle sub-secret \( {SK}_j^{\prime } \). And then, Pj can obtain an updated initial sub-secret through Eq. 4.

$$ {SK}_j^{\ast }={SK}_j\oplus {SK}_j^{\prime } $$
(4)

In addition, he can get another transformed photon sequence S′′. Furthermore, the participant Pj randomly selects another participant Pl and sends the transformed sequence S′′ to Pl through the quantum channel, where l ∈ {1, 2, …, n} and l ≠ j ≠ i.

  • Step 6: Instead of performing another unitary operation, the participant Pj directly selects another participant Pl and then sends the transformed photon sequence S to Pl, where l ∈ {1, 2, …, n} and l ≠ j ≠ i.

  • Step 7: The participant Pl executes Step 4 again until the secret distributor Dick receives the 1-bit feedback messages of all n participants. After that, Dick broadcasts a classic message to inform that the participant with current single photon sequence S should send it back to him, where S denotes the photon sequence transformed by n participants.

  • Step 8: After confirming that Dick has received the photon sequence S, he announces the positions of all p decoy photons. Furthermore, n participants also announce the unitary operations in the corresponding positions. According to the initial states and unitary operations of these decoy photons, Dick computes the error rate and then compares it with the security threshold value of the communication channel. If the error rate exceeds the threshold value, the process will be aborted. Otherwise, Dick believes all participants are honest and the quantum channel is secure.

  • Step 9: All participants remove these decoy photons from the initial sub-secrets, and they can obtain the final sub-secrets, which can be expressed as K1, K2, …, Kn. In addition, n participants can recover the m-bit secret KD by the following formula:

$$ {K}_D={K}_1\oplus {K}_2\oplus \dots \oplus {K}_n $$
(5)

Furthermore, we analyze the security of our proposed QSS protocol. Since dishonest participants are easier to steal the useful information than external eavesdroppers, the primary security goal of QSS is to prevent dishonest participants from cheating. First, the current participant sends the photon sequence to the next participant, who is randomly chosen. Dishonest participants cannot know which one is the next one to be chosen, so they cannot get the unitary operations or sub-secrets of other participants. And then, the secret KD of the distributor is restored by XOR operations by the sub-secrets of all participants. Thus, any less than n − 1 participants cannot recover the distributor’s secret without the sub-secrets of the remaining participants. Finally, there is eavesdropping detection procedure with the decoy photons to check the security of the protocol. If a malicious bidder wants to perform intercept-and-resend attack, he/she will be found because the states and positions of decoy photons are unknown to him/her.

Security

(1) The outsider attacks: The attacks usually have the following type of attacks: intercept-and-resend attack, double-CNOT attack, entangle-and-measure attack, etc. Similar to most QSS protocol schemes, in our protocol, the decoy photons can effectively prevent the outer eavesdroppers from stealing the secret. If there is an eavesdropper Eve who wants to get useful messages, she must remove these decoy photons without being found. In fact, this is impossible because the decoy photons are inserted randomly into the sequence and Eve does not know the positions and initial states of these decoy photons. Furthermore, if Eve wants to measure the photon sequence, the state of the decoy photons will be destroyed and she will be found.

(2) The collusion attacks: there are two common types of collusion attacks in most Quantum Secret Sharing protocols. One type is that the first participant (e.g., P1) and the last participant (e.g., Pn) collude to obtain the aggregate sub-secrets of other participants. Another type is that the previous participant (e.g., Pi − 1) and the next participant (e.g., Pi + 1) collude to get the participant Pi’s sub-secret. Obviously our proposed protocol can resist these collusion attacks. On the one hand, the next participant is randomly selected when sending the photon sequence. On the other hand, the sub-secret of each participant is dynamically updated. Therefore, the collusion attacks are invalid for our QSS protocol.

Furthermore, our protocol has a low quantum consumption rate (i.e., the amount of qubits for every transmitted classic bit message). In addition, it only needs to perform one joint measurement to detect the eavesdropping, so the efficiency of proposed protocol is higher.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shi, Rh., Zhang, R., Liu, B. et al. Cryptanalysis and Improvement of Quantum Sealed-Bid Auction. Int J Theor Phys 59, 1917–1926 (2020). https://doi.org/10.1007/s10773-020-04463-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-020-04463-8

Keywords

Navigation