A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure
From MaRDI portal
Publication:4567268
DOI10.1109/TC.2017.2721404zbMath1390.81134arXiv1706.07575OpenAlexW2685986899WikidataQ114985444 ScholiaQ114985444MaRDI QIDQ4567268
Bin Liu, Tian-Yin Wang, Fei Gao, Chun-Yan Wei, Xiao-Qiu Cai
Publication date: 27 June 2018
Published in: IEEE Transactions on Computers (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1706.07575
Related Items (63)
A proof for the existence of nonsquare unextendible maximally entangled bases ⋮ Authenticated QKD based on orthogonal states ⋮ Private comparison protocol for multiple semi-quantum users based on Bell states ⋮ Arbitrated quantum signature scheme with quantum teleportation by using two three-qubit GHZ states ⋮ Semi-quantum private comparison based on Bell states ⋮ Semi-quantum secure direct communication using entanglement ⋮ Memory-free quantum secret sharing protocol with collective detection ⋮ A measurement device independent multi-party quantum key agreement protocol with identity authentication ⋮ Quantum protocol for privacy preserving Hamming distance problem of DNA sequences ⋮ New flexible quantum private query protocol against rotation noise ⋮ Quantum-based anonymity and secure veto ⋮ Nearest private query based on quantum oblivious key distribution ⋮ A quantum protocol for private substitution problem ⋮ Quantum private query with authentication ⋮ Quantum Bell states-based anonymous voting with anonymity trace ⋮ Practical efficient 1-out-of-n quantum oblivious transfer protocol ⋮ Novel quantum voting protocol with eight-qubit cluster entangled state ⋮ Practical quantum database private query protocol with classical database owner ⋮ Reliability estimation for zero-failure data based on confidence limit analysis method ⋮ A hybrid universal blind quantum computation ⋮ A new \(n\)-party quantum secret sharing model based on multiparty entangled states ⋮ The critical detection efficiency for closing the detection loophole of some modified Bell inequalities ⋮ Offline arbitrated quantum blind dual-signature protocol with better performance in resisting existential forgery attack ⋮ A new quantum proxy signature model based on a series of genuine entangled states ⋮ Participant attacks on quantum secret sharing based on local measurements ⋮ A novel quantum protocol for private set intersection ⋮ Entanglement protection about four-particle cluster state ⋮ Secure multi-party quantum summation based on quantum Fourier transform ⋮ Establishing rational networking using the DL04 quantum secure direct communication protocol ⋮ Quantum-enhanced feature selection with forward selection and backward elimination ⋮ Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states ⋮ Decoherence can help quantum cryptographic security ⋮ A high capacity quantum weak blind signature based on logistic chaotic maps ⋮ Multi-party quantum private comparison of size relation with \(d\)-level single-particle states ⋮ Quantum secret sharing and Mermin operator ⋮ Effects of measurement dependence on tilted CHSH Bell tests ⋮ Restricted \((k,n)\)-threshold quantum secret sharing scheme based on local distinguishability of orthogonal multiqudit entangled states ⋮ Improving the security of quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom ⋮ A new multi-party quantum private comparison protocol based on circle model ⋮ Tighter superadditivity relations in multiqubit systems ⋮ Semi-quantum key agreement and private comparison protocols using Bell states ⋮ Distribution of additive quantum resources ⋮ Quantum private query based on Bell state and single photons ⋮ Cryptanalysis of the quantum private comparison protocol based on the entanglement swapping between three-particle W-class state and Bell state ⋮ Two quantum private query protocols based on Bell states and single photons ⋮ A novel quantum solution to privacy-preserving lexicographical string sorting problem ⋮ Secure multi-party quantum private information query ⋮ Cryptanalysis of Zhang et al's quantum private comparison and the improvement ⋮ A controller-independent quantum dialogue protocol with four-particle states ⋮ Practical two-way QKD-based quantum private query with better performance in user privacy ⋮ Quantum protocol for millionaire problem ⋮ New secure quantum dialogue protocols over collective noisy channels ⋮ Cryptanalysis and improvement of some quantum proxy blind signature schemes ⋮ Verifiable quantum secret sharing protocols based on four-qubit entangled states ⋮ Improving the secure key rate and error tolerance of the interferometer-based time-frequency encoding QKD system ⋮ A new protocol for quantum private query against joint-measurement attack ⋮ Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources ⋮ Quantum identity authentication in the orthogonal-state-encoding QKD system ⋮ Cryptanalysis of secure multiparty quantum summation ⋮ Cryptanalysis of multiparty quantum digital signatures ⋮ A novel quantum multi-signature protocol based on locally indistinguishable orthogonal product states ⋮ Constructions of locally distinguishable sets of maximally entangled states which require two-way LOCC ⋮ Quantum identity authentication based on round robin differencial phase shift communication line
This page was built for publication: A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure