Access the full text.
Sign up today, get DeepDyve free for 14 days.
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
Song Lin, Q. Wen, F. Gao, F. Zhu (2008)
Quantum secure direct communication with χ -type entangled statesPhysical Review A, 78
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
A. Yao (1982)
Protocols for secure computations23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)
YS Zhang, CF Li, GC Guo (2001)
Comment on “Quantum key distribution without alternative measurements”Phys. Rev. A, 63
(2006)
Comment on : “ Quantum exam ” [
Tingting Song, Zhang Jie, Gao Fei, Qiao-yan Wen, F. Zhu (2009)
Participant attack on quantum secret sharing based on entanglement swappingChinese Physics B, 18
W. 刘, Y. 王, W. 崔 (2012)
Quantum Private Comparison Protocol Based on Bell Entangled StatesCommunications in Theoretical Physics, 57
Xiubo Chen, Gang Xu, Xinxin Niu, Q. Wen, Yixian Yang (2010)
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurementOptics Communications, 283
A. Wójcik (2002)
Eavesdropping on the "ping-pong" quantum communication protocol.Physical review letters, 90 15
Liang Hao, Jun-Lin Li, Guilu Long (2010)
Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solutionScience China Physics, Mechanics and Astronomy, 53
F. Gao, S. Qin, Q. Wen, F. Zhu (2007)
A simple participant attack on the brádler-dušek protocolQuantum Inf. Comput., 7
Yuguang Yang, Wei-Feng Cao, Q. Wen (2009)
Secure quantum private comparisonPhysica Scripta, 80
F. Gao, F. Guo, Q. Wen, F. Zhu (2008)
Consistency of shared reference frames should be reexaminedPhysical Review A, 77
S. Qin, F. Gao, Q. Wen, F. Zhu (2006)
Improving the security of multiparty quantum secret sharing against an attack with a fake signalPhysics Letters A, 357
Fabrice Boudot, Berry Schoenmakers, Jacques Traoré (2001)
A fair and efficient solution to the socialist millionaires' problemDiscret. Appl. Math., 111
F. Guo, S. Qin, F. Gao, S. Lin, Qiao-yan Wen, F. Zhu (2010)
Participant attack on a kind of MQSS schemes based on entanglement swappingThe European Physical Journal D, 56
Wen Liu, Yong-Bin Wang, Zhengtao Jiang, Yi-zhen Cao (2012)
A Protocol for the Quantum Private Comparison of Equality with χ-Type StateInternational Journal of Theoretical Physics, 51
Yong-Sheng Zhang, Chuan‐Feng Li, G. Guo (2000)
Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61 , 052312 (2000)]Physical Review A, 63
Yuguang Yang, Juan Xia, Xin Jia, Hua Zhang (2013)
Comment on quantum private comparison protocols with a semi-honest third partyQuantum Information Processing, 12
Wen Liu, Yong-Bin Wang, Zhengtao Jiang (2011)
An efficient protocol for the quantum private comparison of equality with W stateOptics Communications, 284
N. Gisin, S. Fasel, B. Kraus, H. Zbinden, G. Ribordy (2006)
Trojan-horse attacks on quantum- key-distribution systemsPhys. Rev. A, 73
H. Lo, Tsz-Mei Ko (2003)
Some attacks on quantum-based cryptographic protocolsQuantum Inf. Comput., 5
A. Wójcik (2004)
Comment on 'Quantum dense key distribution'Physical Review A, 71
H. Jia, Q. Wen, Yan-Bing Li, F. Gao (2012)
Quantum Private Comparison Using Genuine Four-Particle Entangled StatesInternational Journal of Theoretical Physics, 51
H. Lo (1996)
Insecurity of Quantum Secure ComputationsArXiv, quant-ph/9611031
Q. Cai (2003)
The "ping-pong" protocol can be attacked without eavesdropping.Physical review letters, 91 10
F. Gao, S. Qin, F. Guo, Q. Wen (2010)
Dense-Coding Attack on Three-Party Quantum Key Distribution ProtocolsIEEE Journal of Quantum Electronics, 47
H. Jia, Q. Wen, Tingting Song, F. Gao (2011)
Quantum protocol for millionaire problemOptics Communications, 284
Yuguang Yang, Q. Wen (2009)
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglementJournal of Physics A: Mathematical and Theoretical, 42
Gao Fei, Qiao-yan Wen, F. Zhu (2008)
Teleportation attack on the QSDC protocol with a random basis and orderChinese Physics B, 17
Charles Bennett (1992)
Quantum cryptography using any two nonorthogonal states.Physical review letters, 68 21
A. Ekert (1991)
Quantum cryptography based on Bell's theorem.Physical review letters, 67 6
Wen Liu, Yong-Bin Wang (2012)
Quantum Private Comparison Based on GHZ Entangled StatesInternational Journal of Theoretical Physics, 51
Hsinyi Tseng, Jason Lin, T. Hwang (2011)
New quantum private comparison protocol using EPR pairsQuantum Information Processing, 11
Fuguo Deng, Xihan Li, Hong-Yu Zhou, Zhan-jun Zhang (2005)
Improving the security of multiparty quantum secret sharing against Trojan horse attackPhysical Review A, 72
M. Hillery, V. Bužek, A. Berthiaume (1998)
Quantum secret sharingPhysical Review A, 59
B. Liu, F. Gao, Q. Wen (2011)
Single-Photon Multiparty Quantum Cryptographic Protocols With Collective DetectionIEEE Journal of Quantum Electronics, 47
Bin Liu, F. Gao, H. Jia, Wei Huang, Wei-Wei Zhang, Q. Wen (2013)
Efficient quantum private comparison employing single photons and collective detectionQuantum Information Processing, 12
Wei-Wei Zhang, F. Gao, Bin Liu, Q. Wen, Hui Chen (2013)
A watermark strategy for quantum images based on quantum fourier transformQuantum Information Processing, 12
高飞, 林崧, 温巧燕, 朱甫臣 (2008)
A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol, 25
F. Gao, F. Guo, Q. Wen, F. Zhu, S. Gaertner, M. Bourennane, C. Kurtsiefer, A. Cabello, H. Weinfurter (2008)
Comment on: Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection. Authors' replyPhysical Review Letters, 101
Wen Liu, Yong-Bin Wang, Zhengtao Jiang, Yi-zhen Cao, W. Cui (2012)
New Quantum Private Comparison Protocol Using χ-Type StateInternational Journal of Theoretical Physics, 51
F. Gao, S. Qin, Q. Wen, F. Zhu (2010)
Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger stateOptics Communications, 283
S. Qin, F. Gao, Q. Wen, F. Zhu (2007)
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocolPhysical Review A, 76
(1984)
Quantum cryptography: public-key distribution and coin tossing
F Gao, FZ Guo, QY Wen, FC Zhu (2008)
Comment on “Experimental demonstration of a quantum protocol for byzantine agreement and liar detection”Phys. Rev. Lett., 101
Recently, a quantum private comparison (QPC) protocol with a dishonest third party (TP) (Yang et al. in Quantum Inf Process, 2012. doi: 10.1007/s11128-012-0433-4 ) was proposed, which pointed out that the assumption of semi-honest third party (TP) is unreasonable. Here we find this protocol is not so secure as it was expected, and then we give some improvement strategies, which ensure that both players’ secrets will not be leaked to anyone. We also discuss the assumption for TP in QPC protocls, which gives a constructive suggestions for the design of a new QPC protocol.
Quantum Information Processing – Springer Journals
Published: Nov 11, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.