Access the full text.
Sign up today, get DeepDyve free for 14 days.
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
Song Lin, Q. Wen, F. Gao, F. Zhu (2008)
Quantum secure direct communication with χ -type entangled statesPhysical Review A, 78
Wei-Wei Zhang, F. Gao, B. Liu, H. Jia, Q. Wen, Hui Chen (2013)
A Quantum Watermark ProtocolInternational Journal of Theoretical Physics, 52
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
W Liu, YB Wang, ZT Jiang, YZ Cao, W Cui (2012)
New quantum private comparison protocol using $$\chi $$ -type stateInt. J. Theor. Phys., 51
A. Yao (1982)
Protocols for secure computations23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)
S. Bose, V. Vedral, P. Knight (1997)
Multiparticle generalization of entanglement swappingPhysical Review A, 57
(1984)
in IEEE International Conference on Computers, Systems and Signal Processing
W. 刘, Y. 王, W. 崔 (2012)
Quantum Private Comparison Protocol Based on Bell Entangled StatesCommunications in Theoretical Physics, 57
Song Lin, Ying Sun, Xiao-Fen Liu, Zhiqiang Yao (2012)
Quantum private comparison protocol with d-dimensional Bell statesQuantum Information Processing, 12
Jiajun Ma, F. Guo, Qian Yang, Yan-Bing Li, Q. Wen (2011)
Semi-loss-tolerant strong coin flipping protocol using EPR pairsQuantum Inf. Comput., 12
Xiubo Chen, Gang Xu, Xinxin Niu, Q. Wen, Yixian Yang (2010)
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurementOptics Communications, 283
F. Gao, S. Qin, Q. Wen, F. Zhu (2007)
A simple participant attack on the brádler-dušek protocolQuantum Inf. Comput., 7
Yuguang Yang, Wei-Feng Cao, Q. Wen (2009)
Secure quantum private comparisonPhysica Scripta, 80
Fabrice Boudot, Berry Schoenmakers, Jacques Traoré (2001)
A fair and efficient solution to the socialist millionaires' problemDiscret. Appl. Math., 111
Wen Liu, Yong-Bin Wang, Zhengtao Jiang, Yi-zhen Cao (2012)
A Protocol for the Quantum Private Comparison of Equality with χ-Type StateInternational Journal of Theoretical Physics, 51
T. Brun (2011)
Quantum Computing
Yuguang Yang, Juan Xia, Xin Jia, Hua Zhang (2013)
Comment on quantum private comparison protocols with a semi-honest third partyQuantum Information Processing, 12
Wen Liu, Yong-Bin Wang, Zhengtao Jiang (2011)
An efficient protocol for the quantum private comparison of equality with W stateOptics Communications, 284
N. Cerf, M. Bourennane, A. Karlsson, N. Gisin (2001)
Security of quantum key distribution using d-level systems.Physical review letters, 88 12
Jian-Wei Pan, D. Bouwmeester, H. Weinfurter, A. Zeilinger (1998)
Experimental Entanglement Swapping: Entangling Photons That Never InteractedPhysical Review Letters, 80
H. Jia, Q. Wen, Yan-Bing Li, F. Gao (2012)
Quantum Private Comparison Using Genuine Four-Particle Entangled StatesInternational Journal of Theoretical Physics, 51
H. Lo (1996)
Insecurity of Quantum Secure ComputationsArXiv, quant-ph/9611031
M. Żukowski, A. Zeilinger, M. Horne, A. Ekert (1993)
"Event-ready-detectors" Bell experiment via entanglement swapping.Physical review letters, 71 26
H. Jia, Q. Wen, Tingting Song, F. Gao (2011)
Quantum protocol for millionaire problemOptics Communications, 284
F. Guo, F. Gao, Q. Wen, F. Zhu (2010)
A TWO-STEP CHANNEL-ENCRYPTING QUANTUM KEY DISTRIBUTION PROTOCOLInternational Journal of Quantum Information, 08
Yuguang Yang, Q. Wen (2009)
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglementJournal of Physics A: Mathematical and Theoretical, 42
Charles Bennett (1992)
Quantum cryptography using any two nonorthogonal states.Physical review letters, 68 21
A. Ekert (1991)
Quantum cryptography based on Bell's theorem.Physical review letters, 67 6
Wen Liu, Yong-Bin Wang (2012)
Quantum Private Comparison Based on GHZ Entangled StatesInternational Journal of Theoretical Physics, 51
Hsinyi Tseng, Jason Lin, T. Hwang (2011)
New quantum private comparison protocol using EPR pairsQuantum Information Processing, 11
M. Hillery, V. Bužek, A. Berthiaume (1998)
Quantum secret sharingPhysical Review A, 59
B. Liu, F. Gao, Q. Wen (2011)
Single-Photon Multiparty Quantum Cryptographic Protocols With Collective DetectionIEEE Journal of Quantum Electronics, 47
F. Guo, S. Qin, Qiao-yan Wen, F. Zhu (2010)
Cryptanalysis and Improvement of Two GHZ-State-Based QSDC ProtocolsChinese Physics Letters, 27
W Liu, YB Wang, ZT Jiang, YZ Cao (2012)
A protocol for the quantum private comparison of equality with $$\chi $$ -type stateInt. J. Theor. Phys., 51
Bin Liu, F. Gao, H. Jia, Wei Huang, Wei-Wei Zhang, Q. Wen (2013)
Efficient quantum private comparison employing single photons and collective detectionQuantum Information Processing, 12
V. Karimipour, S. Bagherinezhad, A. Bahraminasab (2001)
Quantum key distribution for d -level systems with generalized Bell statesPhysical Review A, 65
Wei-Wei Zhang, F. Gao, Bin Liu, Q. Wen, Hui Chen (2013)
A watermark strategy for quantum images based on quantum fourier transformQuantum Information Processing, 12
Wen Liu, Yong-Bin Wang, Zhengtao Jiang, Yi-zhen Cao, W. Cui (2012)
New Quantum Private Comparison Protocol Using χ-Type StateInternational Journal of Theoretical Physics, 51
S. Qin, F. Gao, Q. Wen, F. Zhu (2007)
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocolPhysical Review A, 76
In this paper, we propose a quantum private comparison protocol based on entanglement swapping, where two distrustful parties can compare the values of their secrets with the help of a semi-trusted third party. The protocol can determine not only whether two secrets are equal, but also the size relationship between them. The two parties can deduce the comparison result based on the keys shared between them and the announcement of the third party. Others including the third party will learn nothing about the values of the secrets, as well as the comparison result. The security of our protocol is analyzed. Furthermore, all the particles can be reused in the same protocol model theoretically. So our protocol is efficient and feasible to expand in network service, which in turn gives a solution to the left problem in Lin et al. (Quantum Inf Process, doi: 10.1007/s11128-012-0395-6 , 2012).
Quantum Information Processing – Springer Journals
Published: Mar 17, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.