Security loophole and improvement of quantum private query protocol based on W state
From MaRDI portal
Publication:6169999
Recommendations
- Quantum private query using W state
- A new protocol for quantum private query against joint-measurement attack
- Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources
- Practical quantum private query based on Bell state
- Practical two-way QKD-based quantum private query with better performance in user privacy
Cites work
- scientific article; zbMATH DE number 1256737 (Why is no real title available?)
- Effective agent quantum private data query against malicious joint attack with blind quantum computing
- Multi-user quantum private query using symmetric multi-particle W state
- Practical efficient 1-out-of-n quantum oblivious transfer protocol
- Quantum Private Queries
- Quantum Private Queries: Security Analysis
- Quantum cryptography
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography: public key distribution and coin tossing
- Quantum private query based on Bell state and single photons
- Quantum private query using W state
- Quantum secret sharing
- Security analysis and improvement in a semi-quantum private comparison without pre-shared key
This page was built for publication: Security loophole and improvement of quantum private query protocol based on W state
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6169999)