Cryptanalysis of Zhang et al's quantum private comparison and the improvement
From MaRDI portal
Publication:2322068
DOI10.1007/s10773-019-04084-wzbMath1422.81095MaRDI QIDQ2322068
Publication date: 3 September 2019
Published in: International Journal of Theoretical Physics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10773-019-04084-w
94A60: Cryptography
81P40: Quantum coherence, entanglement, quantum correlations
81P45: Quantum information, communication, networks (quantum-theoretic aspects)
81P94: Quantum cryptography (quantum-theoretic aspects)
Related Items
A novel pure entangled state based two-party quantum private comparison protocol, Quantum private comparison protocol without a third party
Cites Work
- Unnamed Item
- Unnamed Item
- Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system
- Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states
- Reexamination of arbitrated quantum signature: the impossible and the possible
- New quantum private comparison protocol using EPR pairs
- Intercept-resend-measure attack towards quantum private comparison protocol using genuine four-particle entangled states and its improvement
- Quantum-secret-sharing scheme based on local distinguishability of orthogonal seven-qudit entangled states
- Cryptanalysis of the quantum private comparison protocol based on the entanglement swapping between three-particle W-class state and Bell state
- Quantum cryptography beyond quantum key distribution
- Multi-party quantum private comparison based on the entanglement swapping of \(d\)-level cat states and \(d\)-level Bell states
- The security problems in some novel arbitrated quantum signature protocols
- Improvements of quantum private comparison protocol based on cluster states
- A new improving quantum secret sharing scheme
- Comment on quantum private comparison protocols with a semi-honest third party
- Quantum key distribution without alternative measurements and rotations
- Quantum homomorphic signature
- Trojan-horse attacks on quantum key distribution with classical bob
- Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party
- An arbitrated quantum signature protocol based on the chained CNOT operations encryption
- Quantum secret sharing using the \(d\)-dimensional GHZ state
- Improving the security of arbitrated quantum signature against the forgery attack
- Trojan horse attack free fault-tolerant quantum key distribution protocols
- An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement
- A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure