Quantum private comparison with d-level single-particle states
暂无分享,去创建一个
Chao-Hua Yu | Song Lin | Gong-De Guo | Gongde Guo | Song Lin | Chao-Hua Yu
[1] Qiaoyan Wen,et al. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .
[2] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[3] Tingting Song,et al. Quantum Private Comparison Based on Quantum Search Algorithm , 2013 .
[4] Anders Karlsson,et al. Security of quantum key distribution using d-level systems. , 2001, Physical review letters.
[5] Qiaoyan Wen,et al. Quantum Private Comparison Using Genuine Four-Particle Entangled States , 2012 .
[6] Fei Gao,et al. Quantum protocol for millionaire problem , 2011 .
[7] Wen Liu,et al. New Quantum Private Comparison Protocol Using χ-Type State , 2012 .
[8] Fei Gao,et al. Quantum private comparison protocol based on entanglement swapping of $$d$$-level Bell states , 2013, Quantum Inf. Process..
[9] Ying Sun,et al. Quantum private comparison against decoherence noise , 2013, Quantum Inf. Process..
[10] Wen Liu,et al. A Protocol for the Quantum Private Comparison of Equality with χ-Type State , 2012 .
[11] Valerio Scarani,et al. Erratum: Security proof for quantum key distribution using qudit systems [Phys. Rev. A 82, 030301(R) (2010)] , 2011 .
[12] Q. Cai. Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.
[13] Yixian Yang,et al. An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement , 2010 .
[14] Valerio Scarani,et al. Security proof for quantum key distribution using qudit systems , 2010, 1003.5464.
[15] Stefano Mancini,et al. Deterministic quantum distribution of a d-ary key , 2009, Quantum Inf. Comput..
[16] Fei Gao,et al. Efficient quantum private comparison employing single photons and collective detection , 2013, Quantum Inf. Process..
[17] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.
[18] Wen Liu,et al. An efficient protocol for the quantum private comparison of equality with W state , 2011 .
[19] N. Gisin,et al. Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.
[20] Ying Sun,et al. Quantum private comparison protocol with d-dimensional Bell states , 2012, Quantum Information Processing.
[21] Fuguo Deng,et al. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.
[22] Qiaoyan Wen,et al. Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks , 2009 .
[23] Hua Zhang,et al. Comment on quantum private comparison protocols with a semi-honest third party , 2012, Quantum Information Processing.
[24] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[25] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[26] Tzonelih Hwang,et al. New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.
[27] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[28] Wei-Wei Zhang,et al. A quantum protocol for millionaire problem with Bell states , 2013, Quantum Inf. Process..
[29] Marco Lucamarini,et al. Secure deterministic communication without entanglement. , 2005, Physical review letters.
[30] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[31] M. Koashi,et al. Quantum entanglement for secret sharing and secret splitting , 1999 .
[32] Xingtong Liu,et al. Cryptanalysis of the secure quantum private comparison protocol , 2013 .