Access the full text.
Sign up today, get DeepDyve free for 14 days.
YB Li, QY Wen, F Gao, HY Jia, Y Sun (2012)
Information leak in Liu et al.’s quantum private comparison and a new protocolEur. Phys. J. D, 66
FZ Guo, SJ Qin, F Gao, FC Zhu (2010)
Participant attack on a kind of MQSS schemes based on entanglement swappingEur. Phys. J. D, 56
GL Long, XS Liu (2002)
Theoretically efficient high-capacity quantum-key-distribution schemePhys. Rev. A, 65
HD Massound, F Elham (2012)
A novel and efficient multiparty quantum secret sharing scheme using entangled statesSci. China-Phys. Mech. Astron., 55
YG Yang, QY Wen (2009)
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglementJ. Phys. A Math. Theor., 42
TY Wang, QY Wen, XB Chen (2010)
Cryptanalysis and improvement of a multi-user quantum key distribution protocolOpt. Commun., 283
CH Bennett, G Brassard, C Crépeau, R Jozsa, A Peres, WK Wootters (1993)
Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channelsPhys. Rev. Lett., 70
A.M. Steane (1996)
Error Correcting codes in quantum theoryPhys. Rev. Lett., 77
FG Deng, XH Li, HY Zhou, ZJ Zhang (2005)
Improving the security of multiparty quantum secret sharing against Trojan horse attackPhys. Rev. A, 72
GL Long, FG Deng, C Wang, XH Li, K Wen, Wy Wang (2007)
Quantum secure direct communication and deterministic secure quantum communicationFront. Phys. China, 2
YG Yang, WF Cao, QY Wen (2009)
Secure quantum private comparisonPhysica Scripta, 80
F Gao, S Qin, QY Wen, FC Zhu (2007)
A simple participant attack on the Bradler-Dusek protocolQuantum Inf. Comput., 7
K Bostroem, T Felbinger (2002)
Deterministic secure direct communication using entanglementPhys. Rev. Lett., 89
DA Lidar, Il Chuang, KB Whaley (1998)
Decoherence-free subspaces for quantum computationPhys. Rev. Lett., 81
N Gisin, S Fasel, B Kraus, H Zbinden, G Ribordy (2006)
Trojan-horse attacks on quantum-key-distribution systemsPhys. Rev. A, 73
HK Lo, HF Chau (1997)
Is quantum bit commitment really possible?Phys. Rev. Lett., 78
TY Wang, QY Wen (2011)
Controlled quantum teleportation with Bell statesChin. Phys. B, 20
CH Ji, Y Yee, J Choi, SH Kim, JU Bu (2004)
Electromagnetic 2 $$\times $$ 2 MEMS optical switchIEEE J. Sel. Top. Quantum Electron., 10
M Jiang, H Li, ZK Zhang, J Zeng (2012)
Faithful teleportation via multi-particle quantum states in a network with many agentsQuantum Inf. Process., 11
A Karlsson, M Koashi, N Imoto (1999)
Quantum entanglement for secret sharing and secret splittingPhys. Rev. A, 59
D Mayers (1997)
Unconditional secure quantum bit commitment is impossiblePhys. Rev. Lett., 78
J Kempe, D Bacon, DA Lidar, KB Whaley (2001)
Theory of decoherence-free fault-tolerant universal quantum computationPhys. Rev. A., 63
F. Gao, Q.Y. Wen, F.C. Zhu (2007)
Comment on: quantum examPhys. Lett. A, 360
M Jiang, X Huang, LL Zhou, YM Zhou, J Zeng (2012)
An efficient scheme for multi-party quantum state sharing via non-maximally entangled statesChin. Sci. Bull., 57
YB Li, QY Wen, S Qin (2011)
Comment on secure multiparty computation with a dishonest majority via quantum meansPhys. Rev. A, 84
TY Wang, QY Wen, F Gao, S Lin, FC Zhu (2008)
Cryptanalysis and improvement of multiparty quantum secret sharing schemesPhys. Lett. A., 65–68
XB Wang (2004)
Quantum error-rejection code with spontaneous parametric down-conversionPhys. Rev. A, 69
AE Allati, ME Baz, Y Hassouni (2011)
Quantum key distribution via tripartite coherent statesQuantum Inf. Process., 10
PW Shor (1995)
Scheme for reducing decoherence in quantum computer memoryPhys. Rev. A, 52
M Bourennane, M Eibl, S Gaertner, C Kurtsiefer (2004)
Decoherence-free quantum information processing with four-photon entangled statesPhys. Rev. Lett., 92
DA Lidar, D Bacon, J Kempe, KB Whaley (2000)
Protecting quantum information encoded in decoherence-free states against exchange errorsPhys. Rev. A, 61
F Gao, SJ Qin, QY Wen, FC Zhu (2010)
Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger stateOpt. Commun., 283
YY Nie, YH Li, JC Liu, MH Sang (2011)
Quantum state sharing of an arbitrary four-qubit GHZ-type state by using a four-qubit cluster stateQuantum Inf. Process., 10
S Lin, F Gao, FZ Guo, FC Zhu (2007)
Comment on “Multiparty quantum secret sharing of classical messages based on entanglement swapping”Phys. Rev. A, 76
SJ Qin, F Gao, QY Wen, FC Zhu (2007)
Cryptanalysis of the Hillery-Buek-Berthiaume quantum secret-sharing protocolPhys. Rev. A, 76
D Bouwmeester, JW Pan, K Mattle, M Eibl, H Weinfurter, A Zeilinger (1997)
Experimental quantum teleportationNature (London), 390
D Saha, PK Panigrahi (2012)
N-qubit quantum teleportation, information splitting and superdense coding through the composite GHZ-Bell channelQuantum Inf. Process., 11
W Liu, YB Wang, ZT Jiang, YZ Cao, W Cui (2012)
New quantum private comparison protocol using-type stateInt. J. Theor. Phys., 51
TY Wang, ZL Wen (2012)
One-time proxy signature based on quantum cryptographyQuantum Inf. Process., 11
FG Deng, GL Long, XS Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhys. Rev. A, 68
J Lin, HY Tseng, T Hwang (2011)
InterceptCresend attacks on Chen et al’.s quantum private comparison protocol and the improvementsOpt. Commun., 284
CH Bennett (1992)
Quantum cryptography using any two nonorthogonal statesPhys. Rev. Lett., 68
A Cabello (2007)
Six-qubit permutation-based decoherence-free orthogonal basisPhys. Rev. A, 75
M Hillery, V Buzěk, A Berthiaume (1999)
Quantum secret sharingPhys. Rev. A, 59
W Liu, YB Wang, ZT Jiang (2011)
An efficient protocol for the quantum private comparison of equality with W stateOpt. Commun., 284
C Wang, L Hao, LJ Zhao (2011)
Implementation of quantum private queries using nuclear magnetic resonanceChin. Phys. Lett., 28
TY Wang, QY Wen (2011)
Security of a kind of quantum secret sharing with single photonsQuantum Inf. Comput., 11
YG Yang, YW Teng, HP Chai, QY Wen (2011)
Revisiting the security of secure direct communication based on ping-pong protocolQuantum Inf. Process., 10
S Lin, QY Wen, F Gao, FC Zhu (2008)
Quantum secure direct communication with $$\chi $$ -type entangled statesPhys. Rev. A, 78
Y Sun, QY Wen, F Gao, FC Zhu (2009)
Robust variations of the Bennett-Brassard protocol against collective noisePhys. Rev. A, 80
TT Song, J Zhang, F Gao, QY Wen, FC Zhu (2009)
Participant attack on quantum secret sharing based on entanglement swappingChin. Phys. B, 18
TY Wang, QY Wen, FC Zhu (2009)
Secure authentication of classical messages with decoherence-free statesOpt. Commun., 282
XB Chen, G Xu, XX Niu, QY Wen, YX Yang (2010)
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurementOpt. Commun., 283
HY Jia, QY Wen, YB Li, F Gao (2012)
Quantum private comparison using genuine four-particle entangled statesInt. J. Theor. Phys., 51
TY Chen, J Zhang, JC Boileau, XM Jin, B Yang, Q Zhang, T Yang, R Laflamme, JW Pan (2006)
Experimental quantum communication without a shared reference framePhys. Rev. Lett., 96
HY Tseng, J Lin, T Hwang (2012)
New quantum private comparison protocol using EPR pairsQuantum Inf. Process., 11
XB Chen, QY Wen, FC Zhu (2007)
Quantum circuits for probabilistic entanglement teleportation via a partially entangled pairInt. J. Quantum Inf., 5
R. Laflamme, C. Miquel, J.P. Paz, W.H. Zurek (1996)
Perfect quantum error correcting codePhys. Rev. Lett., 77
W Liu, YB Wang, JZ Tao, YZ Cao (2012)
A protocol for the quantum private comparison of equality with-type stateInt. J. Theor. Phys., 51
F Gao, FZ Guo, QY Wen, FC Zhu (2008)
Comment on experimental demonstration of a quantum protocol for byzantine agreement and liar detectionPhys. Rev. Lett., 101
In this paper, we propose a quantum private comparison scheme which can be used in decoherence noise scenario. With the combination of decoherence-free states and error-correcting code, it achieves a fault tolerant quantum private comparison to prevent collective decoherence noise and limited other decoherence noise. And the third party used in the protocol is not needed to be semi-honest.
Quantum Information Processing – Springer Journals
Published: Dec 14, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.