Access the full text.
Sign up today, get DeepDyve free for 14 days.
F. Boudot, B. Schoenmakers, J. Traore (2001)
A fair and efficient solution to the socialist millionaires problemDiscr. Appl. Math. (Special Issue on Coding and Cryptology), 111
J. Barrett, S. Massar (2004)
Quantum coin tossing and bit-string generation in the presence of noisePhys. Rev. A, 69
R. Cleve, D. Gottesman, H.-K. Lo (1999)
How to share a quantum secretPhys. Rev. Lett., 83
G.M. Wang, M.S. Ying (2006)
Unambiguous discrimination among quantum operationsPhys. Rew. A, 73
D.J. Jackson, G.M. Hockney (2005)
Securing QKD links in the full Hilbert spaceQuantum Inf. Process., 4
J. Lin, H.Y. Tseng, T. Hwang (2011)
Intercept-resend attacks on Chen et al.’s quantum private comparison protocol and the improvementsOpt. Commun., 284
G. Long, X. Liu (2002)
Theoretically efficient high-capacity quantum-key-distribution schemePhys. Rev. A, 65
A. Nayak (2003)
Bit-commitment-based quantum coin flippingPhys. Rev. A, 67
H.K. Lo (1997)
Insecurity of quantum secure computationsPhys. Rev. A, 56
Y.G. Yang, Q.Y. Wen (2009)
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglementJ. Phys. A-Math. Theor., 42
G. Berlín, G. Brassard, F. Bussières, N. Godbout (2009)
Fair loss-tolerant quantum coin flippingPhys. Rev. A, 80
H.Y. Jia, Q.Y. Wen, T.T. Song, F. Gao (2011)
Quantum protocol for millionaire problemOpt. Commun., 284
A.K. Ekert (1991)
Quantum cryptography based on Bell theoremPhys. Rev. Lett., 67
F. Gao, S.J. Qin, Q.Y. Wen (2007)
A simple participant attack on the Bradler-Dusek protocolQuantum Inf. Comput., 7
S.J. Qin, F. Gao, Q.Y. Wen, F.C. Zhu (2006)
Improving the security of multiparty quantum secret sharing against an attack with a fake signalPhys. Lett. A, 357
P. Scherpelz, R. Resch, D. Berryrieser, T.W. Lynn (2011)
Entanglement-secured single-qubit quantum secret sharingPhys. Rev. A, 84
R.H. Shi, L.S. Huang, W. Yang, H. Zhong (2011)
Asymmetric multi-party quantum state sharing of an arbitrary m-qubit stateQuantum Inf. Process., 10
C.H. Bennett (1992)
Quantum cryptography using any two nonorthogonal statesPhys. Rev. Lett., 68
M. Hillery, V. Buzěk, A. Berthiaume (1999)
Quantum secret sharingPhys. Rev. A, 59
N. Gisin, S. Fasel, B. Kraus, H. Zbinden, G. Ribordy (2006)
Trojan-horse attacks on quantum-key-distribution systemsPhys. Rev. A, 73
W. Liu, Y.B. Wang, Z.T. Jiang (2011)
An efficient protocol for the quantum private comparison of equality with W stateOpt. Commun., 284
H.E. Brandt (2005)
Unambiguous state discrimination in quantum key distributionQuantum Inf. Process., 4
Y.G. Yang, W.F. Cao, Q.Y. Wen (2009)
Secure quantum private comparisonPhsy. Scripta, 80
B. Liu, F. Gao, Q.Y. Wen (2011)
Single-photon multiparty quantum cryptographic protocols with collective detectionIEEE J. Quant. Electron., 47
A. Karlsson, M. Koashi, N. Imoto (1999)
Quantum entanglement for secret sharing and secret splittingPhys. Rev. A, 59
M.G D’Ariano, P Lo Presti, M.G.A Paris (2001)
Using entanglement improves the precision of quantum measurementsPhys. Rev. Lett., 87
Q. Li, D.Y. Long, W.H. Chan, D.W. Qiu (2011)
Sharing a quantum secret without a trusted partyQuantum Inf. Process., 10
X.B. Chen, G. Xu, X.X. Niu, Q.Y. Wen, Y.X. Yang (2009)
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurementOpt. Commun., 283
A. El Allati, M. El Baz, Y. Hassouni (2011)
Quantum key distribution via tripartite coherent statesQuantum Inf. Process., 10
H. Shih, K. Lee, T. Hwang (2009)
New efficient three-party quantum key distribution protocolsIEEE J. Sel. Top. Quant. Electron., 15
Y. Yang, Y. Wang, H. Chai, Y. Teng, H. Zhang (2011)
Member expansion in quantum (t,n) threshold secret sharing schemesOpt. Commun., 284
Y.G. Yang, Q.Y. Wen (2010)
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement (vol. 42, 055305, 2009)J. Phys. A-Math. Theor., 43
F. Gao, S.J. Qin, F.Z. Guo, Q.Y. Wen (2011)
Dense-coding attack on three-party quantum key distribution protocolsIEEE J. Quant. Electron., 47
Two efficient quantum private comparison (QPC) protocols are proposed, employing single photons and collective detection. In the proposed protocols, two distrustful parties (Alice and Bob) compare the equivalence of information with the help of a semi-honest third party (TP). Utilizing collective detection, the cost of practical realization is reduced greatly. In the first protocol, TP gains the result of the comparison. While in the second protocol, TP cannot get the comparison result. In both of our protocols, Alice and Bob only need be equipped with unitary operation machines, such as phase plates. So Alice and Bob need not to have the expensive quantum devices, such as qubit generating machine, quantum memory machine and quantum measuring machine. Security of the protocols is ensured by theorems on quantum operation discrimination.
Quantum Information Processing – Springer Journals
Published: Jun 24, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.