Quantum private comparison with a malicious third party
From MaRDI portal
Publication:2355616
DOI10.1007/s11128-015-0956-6zbMath1317.81087OpenAlexW2105364049MaRDI QIDQ2355616
Ping Wang, Jian-Ping Yu, Lingling Xu, Chunhui Wu, Zhi-Wei Sun
Publication date: 24 July 2015
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-015-0956-6
Related Items
Efficient multi-party quantum key agreement by cluster states ⋮ Statistics attack on ``quantum private comparison with a malicious third party and its improvement ⋮ Quantum private magnitude comparison ⋮ Multi-party quantum key agreement by an entangled six-qubit state ⋮ Efficient multiparty quantum key agreement protocol based on commutative encryption ⋮ Two semi-quantum private comparison protocols of size relation based on single particles ⋮ Quantum private comparison protocol with linear optics ⋮ Multi-party quantum key agreement protocol secure against collusion attacks ⋮ Semi-quantum ring signature protocol based on multi-particle GHZ state ⋮ Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement ⋮ Enhanced quantum private comparison ⋮ Improvements on: ``Multi-party quantum key agreement protocol with Bell states and single particles ⋮ Quantum private comparison protocol based on four-particle GHZ states ⋮ Improvements on: ``Secure multi-party quantum summation based on quantum Fourier transform ⋮ Robust quantum secure multiparty computation protocols for minimum value calculation in collective noises and their simulation ⋮ Quantum summation using \(d\)-level entanglement swapping ⋮ Multiparty quantum private comparison with almost dishonest third parties for strangers ⋮ Quantum private comparison without classical computation ⋮ An efficient circle-type multiparty quantum key agreement protocol with single particles ⋮ Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment ⋮ Semi-quantum private comparison using single photons ⋮ Secure three-party semi-quantum summation using single photons ⋮ Cryptanalysis and improvement for the quantum private comparison protocol based on triplet entangled state and single-particle measurement ⋮ Quantum gate-based quantum private comparison ⋮ Quantum private comparison using single Bell state ⋮ A mediated semi-quantum protocol for millionaire problem based on high-dimensional Bell states ⋮ Efficient semi-quantum private comparison using single photons ⋮ Quantum private magnitude comparison based on maximum operation ⋮ Multi-party quantum privacy comparison of size based on \(d\)-level GHZ states ⋮ Fast quantum private comparison without keys and entanglement ⋮ Efficient multiparty quantum key agreement using block-based single particles
Cites Work
- Unnamed Item
- New quantum private comparison protocol using EPR pairs
- A protocol for the quantum private comparison of equality with \(\chi \)-type state
- Quantum secure direct communication with two-photon four-qubit cluster states
- Quantum private comparison based on phase encoding of single photons
- Quantum cryptography: public key distribution and coin tossing
- Quantum private comparison protocol with \(d\)-dimensional Bell states
- Efficient quantum private comparison employing single photons and collective detection
- Quantum private comparison protocol based on entanglement swapping of \(d\)-level Bell states
- A class of protocols for quantum private comparison based on the symmetry of states
- Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise
- Quantum private comparison of equality protocol without a third party
- SIMPLE QUANTUM PROTOCOLS FOR THE MILLIONAIRE PROBLEM WITH A SEMI-HONEST THIRD PARTY
- QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM IDENTIFICATION
- Universally Composable Quantum Multi-party Computation
- Secure multi-party quantum computation
- An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement
- Quantum cryptography based on Bell’s theorem
- Foundations of Cryptography
- Quantum secret sharing
- Theory of Cryptography