Access the full text.
Sign up today, get DeepDyve free for 14 days.
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
Song Lin, Q. Wen, F. Gao, F. Zhu (2008)
Quantum secure direct communication with χ -type entangled statesPhysical Review A, 78
Wei-Wei Zhang, F. Gao, B. Liu, H. Jia, Q. Wen, Hui Chen (2013)
A Quantum Watermark ProtocolInternational Journal of Theoretical Physics, 52
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
W Liu, Y-B Wang, Z-T Jiang, Y-Z Cao, W Cui (2012)
New quantum private comparison protocol using $$\chi $$ -type stateInt. J. Theor. Phys., 51
A. Yao (1982)
Protocols for secure computations23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)
S Lin, F Gao, FZ Guo (2007)
Comment on “Multiparty quantum secret sharing of classical messages based on entanglement swapping”Phys. Rev. A, 76
Tingting Song, Zhang Jie, Gao Fei, Qiao-yan Wen, F. Zhu (2009)
Participant attack on quantum secret sharing based on entanglement swappingChinese Physics B, 18
W. 刘, Y. 王, W. 崔 (2012)
Quantum Private Comparison Protocol Based on Bell Entangled StatesCommunications in Theoretical Physics, 57
Song Lin, Ying Sun, Xiao-Fen Liu, Zhiqiang Yao (2012)
Quantum private comparison protocol with d-dimensional Bell statesQuantum Information Processing, 12
Xiubo Chen, Gang Xu, Xinxin Niu, Q. Wen, Yixian Yang (2010)
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurementOptics Communications, 283
F. Gao, S. Qin, Q. Wen, F. Zhu (2007)
A simple participant attack on the brádler-dušek protocolQuantum Inf. Comput., 7
F Gao, QY Wen, FC Zhu (2007)
Comment on: “Quantum exam” [Phys. Lett. A, 350:174 (2006)]Phys. Lett. A, 360
G. Long, X. Liu (2000)
Theoretically efficient high-capacity quantum-key-distribution schemePhysical Review A, 65
Yuguang Yang, Wei-Feng Cao, Q. Wen (2009)
Secure quantum private comparisonPhysica Scripta, 80
(2007)
Comment on: “Quantum exam” [Phys
F. Guo, S. Qin, F. Gao, S. Lin, Qiao-yan Wen, F. Zhu (2010)
Participant attack on a kind of MQSS schemes based on entanglement swappingThe European Physical Journal D, 56
Wen Liu, Yong-Bin Wang, Zhengtao Jiang, Yi-zhen Cao (2012)
A Protocol for the Quantum Private Comparison of Equality with χ-Type StateInternational Journal of Theoretical Physics, 51
Yuguang Yang, Juan Xia, Xin Jia, Hua Zhang (2013)
Comment on quantum private comparison protocols with a semi-honest third partyQuantum Information Processing, 12
Wen Liu, Yong-Bin Wang, Zhengtao Jiang (2011)
An efficient protocol for the quantum private comparison of equality with W stateOptics Communications, 284
H. Jia, Q. Wen, Yan-Bing Li, F. Gao (2012)
Quantum Private Comparison Using Genuine Four-Particle Entangled StatesInternational Journal of Theoretical Physics, 51
H. Lo (1996)
Insecurity of Quantum Secure ComputationsArXiv, quant-ph/9611031
H. Jia, Q. Wen, Tingting Song, F. Gao (2011)
Quantum protocol for millionaire problemOptics Communications, 284
Yuguang Yang, Q. Wen (2009)
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglementJournal of Physics A: Mathematical and Theoretical, 42
Charles Bennett (1992)
Quantum cryptography using any two nonorthogonal states.Physical review letters, 68 21
Wei-Wei Zhang, Kejia Zhang (2013)
Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third partyQuantum Information Processing, 12
A. Ekert (1991)
Quantum cryptography based on Bell's theorem.Physical review letters, 67 6
Wen Liu, Yong-Bin Wang (2012)
Quantum Private Comparison Based on GHZ Entangled StatesInternational Journal of Theoretical Physics, 51
Hsinyi Tseng, Jason Lin, T. Hwang (2011)
New quantum private comparison protocol using EPR pairsQuantum Information Processing, 11
Song Lin, Q. Wen, F. Gao, F. Zhu (2008)
Improving the security of multiparty quantum secret sharing based on the improved Boström–Felbinger protocolOptics Communications, 281
Wei Huang, F. Guo, Zheng Huang, Q. Wen, F. Zhu (2011)
Three-particle QKD protocol against a collective noiseOptics Communications, 284
M. Hillery, V. Bužek, A. Berthiaume (1998)
Quantum secret sharingPhysical Review A, 59
B. Liu, F. Gao, Q. Wen (2011)
Single-Photon Multiparty Quantum Cryptographic Protocols With Collective DetectionIEEE Journal of Quantum Electronics, 47
W Liu, Y-B Wang, Z-T Jiang, Y-Z Cao (2012)
A protocol for the quantum private comparison of equality with $$\chi $$ -type stateInt. J. Theor. Phys., 51
Song Lin, F. Gao, F. Guo, Q. Wen, F. Zhu, Zhan-Jun Zhang, Zhong-Xiao Man (2007)
Comment on: Multiparty quantum secret sharing of classical messages based on entanglement swapping. Authors' replyPhysical Review A, 76
Bin Liu, F. Gao, H. Jia, Wei Huang, Wei-Wei Zhang, Q. Wen (2013)
Efficient quantum private comparison employing single photons and collective detectionQuantum Information Processing, 12
Wei-Wei Zhang, F. Gao, Bin Liu, Q. Wen, Hui Chen (2013)
A watermark strategy for quantum images based on quantum fourier transformQuantum Information Processing, 12
F. Gao, F. Guo, Q. Wen, F. Zhu, S. Gaertner, M. Bourennane, C. Kurtsiefer, A. Cabello, H. Weinfurter (2008)
Comment on: Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection. Authors' replyPhysical Review Letters, 101
Wen Liu, Yong-Bin Wang, Zhengtao Jiang, Yi-zhen Cao, W. Cui (2012)
New Quantum Private Comparison Protocol Using χ-Type StateInternational Journal of Theoretical Physics, 51
F. Gao, S. Qin, Q. Wen, F. Zhu (2010)
Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger stateOptics Communications, 283
S. Qin, F. Gao, Q. Wen, F. Zhu (2007)
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocolPhysical Review A, 76
F Gao, FZ Guo, QY Wen (2008)
Comment on “Experimental demonstration of a quantum protocol for Byzantine agreement and liar detection”Phys. Rev. Lett., 101
We propose a quantum protocol for the millionaire problem with Bell states, where two distrustful parties can compare the values of their fortune with the help of a semi-dishonest third party. The efficiency of our protocol is higher than that of previous protocols for millionaire problem. In our protocol, any information about the values of their fortune will not be leaked out. The security of our protocol is also discussed.
Quantum Information Processing – Springer Journals
Published: Jan 5, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.