Access the full text.
Sign up today, get DeepDyve free for 14 days.
JW Pan, D Bouwmeester, H Weinfurter, A Zeilinger (1998)
Experimental entanglement swapping: entangling photons that never interactedPhys. Rev. Lett., 80
D Bouwmeester, JW Pan, K Mattle, M Eibl, H Weinfurter, A Zeilinger (1997)
Experimental quantum teleportationNature, 390
ZJ Zhang (2006)
Robust multiparty quantum secret key sharing over two collective-noise channelsPhys. A, 361
Y-J Chang, C-W Tsai, T Hwang (2013)
Multi-user private comparison protocol using GHZ class statesQuantum Inf. Process., 12
J Lin, H-Y Tseng, T Hwang (2011)
Intercept-resend attacks on Chen et al.’s quantum private comparison protocol and the improvementsOpt. Commun., 284
C-W Yang, C-W Tsai, T Hwang (2011)
Fault tolerant two-step quantum secure direct communication protocol against collective noisesSci. China Phys., 54
HK Lo (1997)
Insecurity of quantum secure computationsPhys. Rev. A, 56
Y.G. Yang, Q.Y. Wen (2009)
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglementJ. Phys. A Math. Theor., 42
XH Li, FG Deng, HY Zhou (2006)
Improving the security of secure direct communication based on the secret transmitting order of particlesPhys. Rev. A, 74
T Hwang, C-C Hwang, C-W Yang, C-M Li (2011)
Revisiting Deng et al.’s multiparty quantum secret sharing protocolInt. J. Theor. Phys., 50
CH Bennett, G Brassard, C Crepeau, R Jozsa, A Peres, WK Wootters (1993)
Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channelsPhys. Rev. Lett., 70
I.B. Damgard (1990)
A design principle for hash functionsAdv Cryptol., 89
Y.-B. Li, S.-J. Qin, Z. Yuan, W. Huang, Y. Sun (2013)
Quantum private comparison against decoherence noiseQuantum Inf. Process., 12
J Lin, T Hwang (2011)
An enhancement on Shi et al.’s multiparty quantum secret sharing protocolOpt. Commun., 284
F-G Deng, G Long, X-S Liu (2003)
Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair blockPhys. Rev. A, 68
FG Deng, XH Li, HY Zhou, ZJ Zhang (2005)
Improving the security of multiparty quantum secret sharing against Trojan horse attackPhys. Rev. A, 72
ZJ Zhang (2006)
Multiparty secret sharing of quantum information via cavity QEDOpt. Commun., 261
K Boström, T Felbinger (2002)
Deterministic secure direct communication using entanglementPhys. Rev. Lett., 89
F Boudot, B Schoenmakers, J Traoré (2001)
A fair and efficient solution to the socialist millionaires’ problemDiscret Appl. Math., 111
M Zukowski, A Zeilinger, MA Horne, AK Ekert (1993)
Event-ready-detectors Bell experiment via entanglement swappingPhys. Rev. Lett., 71
C-W Yang, T Hwang (2012)
Improved QSDC protocol over a collective-dephasing noise channelInt. J. Theor. Phys., 51
M Hillery, V Buzek, A Berthiaume (1999)
Quantum secret sharingPhys. Rev. A, 59
W Liu, YB Wang, ZT Jiang (2011)
An efficient protocol for the quantum private comparison of equality with W stateOpt. Commun., 284
W.-W. Zhang, K.-J. Zhang (2013)
Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third partyQuantum Inf. Process., 12
W Liu, YB Wang, W Cui (2012)
Quantum private comparison protocol based on bell entangled statesCommun. Theor. Phys, 57
Y.G. Yang, W.F. Cao, Q.Y. Wen (2009)
Secure quantum private comparisonPhys. Scripta, 80
ZJ Zhang (2005)
Multiparty quantum secret sharing of secure direct communicationPhys. Lett. A, 342
C-W Yang, T Hwang, Y-P Luo (2013)
Enhancement on “quantum blind signature based on two-state vector formalism”Quantum Inf. Process., 12
XB Chen, G Xu, XX Niu, QY Wen, YX Yang (2010)
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurementOpt. Commun., 283
W Liu, YB Wang, ZT Jiang, YZ Cao (2012)
A protocol for the quantum private comparison of equality with $$\chi $$ χ -type stateInt. J. Theor. Phys., 51
QY Cai (2006)
Eavesdropping on the two-way quantum communication protocols with invisible photonsPhys. Lett. A, 351
F.G. Deng, X.H. Li, H.Y. Zhou, Z.J. Zhang (2006)
Improving the security of multiparty quantum secret sharing against Trojan horse attack (vol 72, art no 044302, 2005)Phys. Rev. A, 73
H.-Y. Tseng, J. Lin, T. Hwang (2012)
New quantum private comparison protocol using EPR pairsQuantum Inf. Process., 11
(2013)
Efficient quantum private comparison employing single photons and collective detectionQuantum Inf. Process., 12
This paper presents a novel quantum private comparison protocol that uses Einstein–Podolsky–Rosen pairs. The proposed protocol allows two parties to secretly compare their information without exposing their actual contents. The technique of entanglement swapping enables the comparison to be achieved without the help of a third party. Moreover, because the proposed protocol employs one-step transmission and decoy photons, it is secure against the various quantum attacks in existence thus far.
Quantum Information Processing – Springer Journals
Published: Oct 1, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.