Access the full text.
Sign up today, get DeepDyve free for 14 days.
Zhang Wen, Liu Yimin, Liu Jun, Zhan-Jun Zhang (2008)
Teleportation of arbitrary unknown two-atom state with cluster state via thermal cavityChinese Physics B, 17
D. Greenberger, M. Horne, A. Zeilinger (2007)
Going Beyond Bell’s TheoremarXiv: Quantum Physics
Fuguo Deng, G. Long, Hong-Yu Zhou (2005)
An efficient quantum secret sharing scheme with Einstein–Podolsky–Rosen pairsPhysics Letters A, 340
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
M. Hillery, M. Ziman, V. Buzek, M. Bieliková (2005)
Towards quantum-based privacy and votingPhysics Letters A, 349
A. Furusawa, J. Sørensen, S. Braunstein, C. Fuchs, H. Kimble, E. Polzik (1998)
Unconditional quantum teleportationScience, 282 5389
C.W. Yang, C.W. Tsai, T. Hwang (2011)
Fault tolerant two-step quantum secure direct communication protocol against collective noisesSci. China Ser. G: Phys. Mech. Astron., 54
Fuguo Deng, Xihan Li, Hong-Yu Zhou (2006)
Efficient high-capacity quantum secret sharing with two-photon entanglementPhysics Letters A, 372
Charles Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, W. Wootters (1993)
Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels.Physical review letters, 70 13
Q. Cai (2005)
Eavesdropping on the two-way quantum communication protocols with invisible photonsPhysics Letters A, 351
E. Jeffrey, J. Altepeter, P. Kwiat (2007)
Relativistic Quantum Cryptography with Optical Storage
C. Tsai, C. Hsieh, T. Hwang (2011)
Dense coding using cluster states and its application on deterministic secure quantum communicationThe European Physical Journal D, 61
Zhan-jun Zhang, Yi-min Liu, Z. Man (2004)
Many-Agent Controlled Teleportation of Multi-qubit Quantum Information via Quantum Entanglement SwappingCommunications in Theoretical Physics, 44
(2011)
Quantum key distribution protocol using dense coding of threequbit W state
Song-Kong Chong, T. Hwang (2011)
The enhancement of three-party simultaneous quantum secure direct communication scheme with EPR pairsOptics Communications, 284
Fabrice Boudot, Berry Schoenmakers, Jacques Traoré (2001)
A fair and efficient solution to the socialist millionaires' problemDiscret. Appl. Math., 111
T. Jennewein, C. Simon, G. Weihs, Harald WeinfurterD, Anton Vienna, U. Munich (1999)
Quantum cryptography with entangled photonsPhysical review letters, 84 20
Chun-Wei Yang, Chia-Wei Tsai, T. Hwang (2011)
Fault tolerant two-step quantum secure direct communication protocol against collective noisesScience China Physics, Mechanics and Astronomy, 54
E. Jeffrey, Matthew Brenner, Paul Kwiat (2002)
Delayed-choice quantum cryptographyPostconference Digest Quantum Electronics and Laser Science, 2003. QELS.
Richard Hughes, J. Nordholt, D. Derkacs, C. Peterson (2002)
Practical free-space quantum key distribution over 10 km in daylight and at nightNew Journal of Physics, 4
Jason Lin, T. Hwang (2011)
An enhancement on Shi et al.'s multiparty quantum secret sharing protocolOptics Communications, 284
T. Hogg, P. Harsha, Kay-Yut Chen (2007)
Quantum Auctions
Fuguo Deng, Hongyu Long (2006)
Circular quantum secret sharingJournal of Physics A, 39
Ziwen Zhang, Liu Yimin, Xue-qin Zuo, Zhang Wen, Zhan-Jun Zhang (2009)
Transformation Operator and Criterion for Perfectly Teleporting Arbitrary Three-Qubit State with Six-Qubit Channel and Bell-State MeasurementChinese Physics Letters, 26
Yuguang Yang, M. Naseri, Q. Wen (2009)
Improved secure quantum sealed-bid auctionOptics Communications, 282
C. Gobby, Z. Yuan, A. Shields (2004)
Quantum key distribution over 122 km of standard telecom fiberApplied Physics Letters, 84
Fuguo Deng, Xihan Li, Hong-Yu Zhou, Zhan-jun Zhang (2005)
Improving the security of multiparty quantum secret sharing against Trojan horse attackPhysical Review A, 72
Chia-Wei Tsai, T. Hwang (2010)
Teleportation of a Pure EPR State via GHZ-like StateInternational Journal of Theoretical Physics, 49
C. Tsai, T. Hwang (2010)
New deterministic quantum communication via symmetric W stateOptics Communications, 283
(1984)
Quantum cryptography: public-key distribution and coin tossing
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
E. Jeffrey, M. Brenner, P. Kwiat (2004)
Delayed-choice quantum cryptographyProc. SPIE, 5161
Li Xiao, G. Long, Fuguo Deng, Jian-Wei Pan (2004)
Efficient multiparty quantum-secret-sharing schemesPhysical Review A, 69
A. Yao (1982)
Protocols for secure computations23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)
S. Wang, Song-Kong Chong, T. Hwang (2010)
On "multiparty quantum secret sharing with Bell states and Bell measurements"Optics Communications, 283
Xiubo Chen, Gang Xu, Xinxin Niu, Q. Wen, Yixian Yang (2010)
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurementOptics Communications, 283
Z. Zhang, Z. Man (2004)
Deterministic secure direct communication by using swapping quantum entanglement and local unitary operationsarXiv: Quantum Physics
Xihan Li, Fuguo Deng, Hong-Yu Zhou (2006)
Improving the security of secure direct communication based on the secret transmitting order of particlesPhysical Review A, 74
Y. Zhan, Ling-ling Zhang, Qun-Yong Zhang (2009)
Quantum secure direct communication by entangled qutrits and entanglement swappingOptics Communications, 282
Zhiwen Zhao, M. Naseri, Yuanqing Zheng (2010)
Secure quantum sealed-bid auction with post-confirmationOptics Communications, 283
H. Lo (1996)
Insecurity of Quantum Secure ComputationsArXiv, quant-ph/9611031
M. Nielsen (2003)
Quantum computation by measurement and quantum memoryPhysics Letters A, 308
Yuguang Yang, Q. Wen (2009)
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglementJournal of Physics A: Mathematical and Theoretical, 42
Lian-Fang Han, Yi-min Liu, Jun Liu, Zhan-Jun Zhang, Zhan-Jun Zhang (2004)
Multiparty quantum secret sharing of secure direct communication using single photonsOptics Communications, 281
M. Hillery, V. Bužek, A. Berthiaume (1998)
Quantum secret sharingPhysical Review A, 59
Ying Sun, Q. Wen, F. Gao, Xiubo Chen, F. Zhu (2009)
Multiparty quantum secret sharing based on Bell measurementOptics Communications, 282
谢朝任, 蔡家纬, 黄宗立 (2010)
Quantum Secret Sharing Using GHZ-Like State
Z. Zhang, Z. Man (2004)
Multiparty quantum secret sharing of classical messages based on entanglement swappingPhysical Review A, 72
J. Vaccaro, J. Vaccaro, Joseph Spring, A. Chefles (2005)
Quantum protocols for anonymous voting and surveyingPhysical Review A, 75
Z.J. Zhang, Z.X. Man (2005)
Many-agent controlled teleportation of multi-qubit quantum informationPhys. Lett. A, 341
Chia-Wei Tsai, T. Hwang (2012)
Multi-party quantum secret sharing based on two special entangled statesScience China Physics, Mechanics and Astronomy, 55
This paper proposes a pioneering quantum private comparison (QPC) protocol for n users. State-of-the-art QPC protocols have been designed for two users who wish to compare their private information. However, if n users want to perform the equality comparison, these two-user QPC protocols have to be executed repeatedly at least n − 1 times. The proposed protocol allows n users’ private information to be compared within one protocol execution. The proposed QPC protocol takes the Greenberger–Horne–Zeilinger (GHZ) class as a quantum resource and uses a special property in the GHZ-class state to perform the equality comparison. Moreover, due to the one-step quantum transmission, the protocol is free from Trojan horse attacks and it is also shown to be secure against other well-known attacks.
Quantum Information Processing – Springer Journals
Published: Jul 26, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.