Access the full text.
Sign up today, get DeepDyve free for 14 days.
I-C. Yu, F.-L. Lin, C.-Y. Huang (2008)
Quantum secret sharing with multilevel mutually (un)biased basesPhys. Rev. A, 78
F.G. Deng, G.L. Long (2004)
Secure direct communication with a quantum one-time padPhys. Rev. A, 69
X.H. Li, F.G. Deng, H.Y. Zhou (2006)
Improving the security of secure direct communication based on the secret transmitting orderPhys. Rev. A, 74
R. Cleve, D. Gottesman, H.K. Lo (1999)
How to share a quantum secretPhys. Rev. Lett., 83
L. Xiao, G.-L. Long, F.-G. Deng, J.-W. Pan (2004)
Efficient multiparty quantum-secret-sharing schemesPhys. Rev. A, 69
F. Gao, S.-J. Qin, Q.-Y. Wen, F.-C. Zhu (2010)
Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger stateOpt. Commun., 283
Y.-Y. Nie, Y.-H. Li, J.-C. Liu, M.-H. Sang (2011)
Quantum state sharing of an arbitrary three-qubit state by using four sets of W-class statesOpt. Commun., 284
F.Z. Guo, S.J. Qin, F. Gao, S. Lin, Q.Y. Wen, F.C. Zhu (2010)
Participant attack on a kind of MQSS schemes based on entanglement swappingEur. Phys. J. D, 56
G.L. Long, X.S. Liu (2002)
Theoretically efficient high-capacity quantum-key-distribution schemePhys. Rev. A, 65
Y.-G. Yang, Q.-Y. Wen (2009)
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglementJ. Phys. A Math. Theor., 42
H.K. Lo (1997)
Insecurity of quantum secure computationsPhys. Rev. A, 56
X.-M. Xiu, L. Dong, Y.-J. Gao (2011)
Secure four-site distribution and quantum communication of X type entangled statesOpt. Commun., 284
A.D. Zhu, Y. Xia, Q.B. Fan, S. Zhang (2006)
Secure direct communication based on secret transmitting order of particlesPhys. Rev. A, 73
H.-Y. Jia, Q.-Y. Wen, T.-T. Song, F. Gao (2011)
Quantum protocol for millionaire problemOpt. Commun., 284
F.-L. Yan, T. Gao (2005)
Quantum secret sharing between multiparty and multiparty without entanglementPhys. Rev. A, 72
F.G. Deng, G.L. Long, X.S. Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhys. Rev. A, 68
F.G. Deng, X.H. Li, C.Y. Li, P. Zhou, H.-Y. Zhou (2005)
Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairsPhys. Rev. A, 72
J. Wang, Q. Zhang, C.J. Tang (2006)
Multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger stateOpt. Commun., 266
F. Gao, S.J. Qin, Q.Y. Wen, F.C. Zhu (2007)
A simple participant attack on the Bradler–Dusek protocolQuantum Inf. Comput., 7
K. Boströem, T. Felbinger (2002)
Deterministic secure direct communication using entanglementPhys. Rev. Lett., 89
S. Lin, Q.-Y. Wen, F. Gao, F.-C. Zhu (2008)
Quantum secure direct communication with chi-type entangled statesPhys. Rev. A, 78
A.M. Lance, T. Symul, W.P. Bowen, B.C. Sanders, P.K. Lam (2004)
Tripartite quantum state sharingPhys. Rev. Lett., 92
G.P. Guo, G.C. Guo (2003)
Quantum secret sharing without entanglementPhys. Lett. A, 310
M. Hillery, V. Buz̆ek, A. Berthiaume (1999)
Quantum secret sharingPhys. Rev. A, 59
W. Liu, Y.-B. Wang, Z.-T. Jiang (2011)
An efficient protocol for the quantum private comparison of equality with W stateOpt. Commun., 284
Y.-B. Zhan, L.-L. Zhang, Q.-Y. Zhang (2009)
Quantum secure direct communication by entangled qutrits and entanglement swappingOpt. Commun., 282
W. Tittel, H. Zbinden, N. Gisin (2001)
Experimental demonstration of quantum secret sharingPhys. Rev. A, 63
L.-Y. Hsu, C.-M. Li (2005)
Quantum secret sharing using product statesPhys. Rev. A, 71
C. Wang, F.G. Deng, G.L. Long (2005)
Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger stateOpt. Commun., 253
Q. Li, W.H. Chan, D.-Y. Long (2010)
Semiquantum secret sharing using entangled statesPhys. Rev. A, 82
A. Karlsson, M. Koashi, N. Imoto (1999)
Quantum entanglement for secret sharing and secret splittingPhys. Rev. A, 59
N. Gisin, G. Ribordy, W. Tittel, H. Zbinden (2002)
Quantum cryptographyRev. Mod. Phys., 74
S. Muralidharan, P.K. Panigrahi (2008)
Perfect teleportation, quantum-state sharing, and superdense coding through a genuinely entangled five-qubit statePhys. Rev. A, 77
Q. Li, D.Y. Long, W.H. Chan, D.W. Qiu (2011)
Sharing a quantum secret without a trusted partyQuantum Inf. Process., 10
M. Lucamarini, S. Mancini (2005)
Secure deterministic communication without entanglementPhys. Rev. Lett., 94
T.T. Song, J. Zhang, F. Gao, Q.Y. Wen, F.C. Zhu (2009)
Participant attack on quantum secret sharing based on entanglement swappingChin. Phys. B, 18
X.R. Jin, X. Ji, Y.Q. Zhang (2006)
Three-party quantum secure direct communication based on GHZ statesPhys. Lett. A, 354
X.-B. Chen, G. Xu, X.-X. Niu, Q.-Y. Wen, Y.-X. Yang (2010)
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurementOpt. Commun., 283
S.J. Qin, F. Gao, Q.Y. Wen, F.C. Zhu (2007)
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocolPhys. Rev. A, 76
C. Wang, F.G. Deng, Y.S. Li, X.S. Liu, G.L. Long (2005)
Quantum secure direct communication with high-dimension quantum superdense codingPhys. Rev. A, 71
X.H. Li, F.G. Deng, C.Y. Li, Y.J. Liang, P. Zhou, H.Y. Zhou (2006)
Deterministic secure quantum communication without maximally entangled statesJ. Korean Phys. Soc., 49
A. Chamoli, C.M. Bhandari (2009)
Secure direct communication based on ping-pong protocolQuantum Inf. Process., 8
C.Y. Li, H.Y. Zhou, Y. Wang, F.G. Deng (2005)
Secure quantum key distribution network with bell states and local unitary operationsChin. Phys. Lett., 22
C.Y. Li, X.H. Li, F.G. Deng, P. Zhou, Y.J. Liang, H.Y. Zhou (2006)
Efficient quantum cryptography network without entanglement and quantum memoryChin. Phys. Lett., 23
R.-H. Shi, L.-S. Huang, W. Yang, H. Zhong (2011)
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell statesQuantum Inf. Process., 10
Q.Y. Cai, B.W. Li (2004)
Improving the capacity of the Boström–Felbinger protocolPhys. Rev. A, 69
F. Gao, F.Z. Guo, Q.Y. Wen, F.C. Zhu (2008)
Comment on “Experimental demonstration of a quantum protocol for byzantine agreement and liar detection”Phys. Rev. Lett., 101
In this paper, a quantum private comparison protocol with Bell states is proposed. In the protocol, two participants can determine the relationship between their secret inputs in size, with the assistance of a semi-trusted third party. The presented protocol can ensure fairness, correctness, and security. Meanwhile, all the particles undergo only a one-way trip, which improves the efficiency and security of the communication. Furthermore, only Bell states are exploited in the implementation of the protocol, and two participants are just required having the ability to perform single particle operations, which make the presented protocol more feasible in technique.
Quantum Information Processing – Springer Journals
Published: Apr 5, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.