Multi-party quantum private comparison of size relation with d-level single-particle states
暂无分享,去创建一个
[1] Guowu Yang,et al. Multi-party quantum private comparison protocol based on $$d$$d-dimensional entangled states , 2014, Quantum Inf. Process..
[2] Fei Gao,et al. Practical quantum private query with better performance in resisting joint-measurement attack , 2016 .
[3] Ye Tianyu,et al. Multi-party quantum private comparison based on the entanglement swapping of d-level cat states and d-level Bell states , 2017 .
[4] Wen Liu,et al. Multi-party Quantum Private Comparison Protocol Using d-Dimensional Basis States Without Entanglement Swapping , 2014 .
[5] Deng Fu-Guo,et al. Efficient Quantum Cryptography Network without Entanglement and Quantum Memory , 2006 .
[6] Jian-Wei Pan,et al. Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.
[7] Qiaoyan Wen,et al. Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol , 2007, 0801.2418.
[8] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[9] Qiao-Yan Wen,et al. Secure quantum private comparison , 2009 .
[10] 周萍,et al. Efficient Quantum Cryptography Network without Entanglement and Quantum Memory , 2006 .
[11] Ying Sun,et al. Quantum private comparison protocol with d-dimensional Bell states , 2012, Quantum Information Processing.
[12] D. Markham,et al. Quantum secret sharing with qudit graph states , 2010, 1004.4619.
[13] Jian Li,et al. An Efficient Protocol for the Private Comparison of Equal Information Based on Four-Particle Entangled W State and Bell Entangled States Swapping , 2014 .
[14] Tzonelih Hwang,et al. New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.
[15] Xi-Han Li,et al. Efficient quantum key distribution over a collective noise channel (6 pages) , 2008, 0808.0042.
[16] Ping Zhou,et al. Robustness of two-way quantum communication protocols against Trojan horse attack , 2005 .
[17] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[18] Fuguo Deng,et al. Improving the security of secure direct communication based on the secret transmitting order of particles , 2006, quant-ph/0612016.
[19] Fei Gao,et al. Quantum private comparison protocol based on entanglement swapping of $$d$$-level Bell states , 2013, Quantum Inf. Process..
[20] R. Cleve,et al. HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.
[21] Fei Gao,et al. Postprocessing of the Oblivious Key in Quantum Private Query , 2014, IEEE Journal of Selected Topics in Quantum Electronics.
[22] Fei Gao,et al. A simple participant attack on the brádler-dušek protocol , 2007, Quantum Inf. Comput..
[23] Hong-Yu Zhou,et al. An efficient quantum secret sharing scheme with Einstein–Podolsky–Rosen pairs , 2005 .
[24] Bin Liu,et al. A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure , 2017, IEEE Transactions on Computers.
[25] Wang Yan,et al. Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations , 2005 .
[26] Jingjing Zhao,et al. Differential phase shift quantum private comparison , 2014, Quantum Inf. Process..
[27] Guang-Can Guo,et al. Quantum secret sharing without entanglement , 2002 .
[28] Hua Zhang,et al. Comment on quantum private comparison protocols with a semi-honest third party , 2012, Quantum Information Processing.
[29] Zhiwei Sun,et al. Quantum Private Comparison Protocol Based on Cluster States , 2013 .
[30] Qiaoyan Wen,et al. Participant attack on a kind of MQSS schemes based on entanglement swapping , 2010 .
[31] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[32] Yu-Guang Yang,et al. Comment on “efficient and feasible quantum private comparison of equality against the collective amplitude damping noise” , 2014, Quantum Inf. Process..
[33] Barry C. Sanders,et al. Erratum: Graph states for quantum secret sharing [Phys. Rev. A 78, 042309 (2008)] , 2011 .
[34] Fuguo Deng,et al. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.
[35] Gongde Guo,et al. Quantum Private Comparison of Equality with χ-Type Entangled States , 2013 .
[36] Chia-Wei Tsai,et al. Multi-user private comparison protocol using GHZ class states , 2013, Quantum Inf. Process..
[37] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[38] Wei Huang,et al. Multi-party quantum private comparison protocol with $$n$$n-level entangled states , 2014, Quantum Inf. Process..
[39] Man Zhong-xiao,et al. Quantum Bidirectional Secure Direct Communication via Entanglement Swapping , 2007 .
[40] Yan Wang,et al. Secure quantum key distribution network with Bell states and local unitary operations , 2007, 0705.1746.
[41] H. Weinfurter,et al. Experimental quantum teleportation , 1997, Nature.
[42] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[43] Dan Li,et al. Quantum Private Comparison Protocol with W States , 2014 .
[44] Jian Wang,et al. Quantum secure direct communication based on order rearrangement of single photons , 2006, quant-ph/0603100.
[45] Q. Cai. Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.
[46] D. Markham,et al. Graph states for quantum secret sharing , 2008, 0808.1532.
[47] Tian-Yu Ye,et al. Reply to the Comment on “Improvement of Controlled Bidirectional Quantum Direct Communication Using a GHZ State" [Chin. Phys. Lett. 30 (2013) 040305] , 2013 .
[48] Wei Cui,et al. Quantum Private Comparison Protocol Based on Bell Entangled States , 2012 .
[49] Ziyun Zhang,et al. Perfect teleportation of an arbitrary three-qubit state with the highly entangled six-qubit genuine state , 2010 .
[50] Yixian Yang,et al. An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement , 2010 .
[51] Qiaoyan Wen,et al. Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .
[52] D. Gottesman. Theory of quantum secret sharing , 1999, quant-ph/9910067.
[53] M. Koashi,et al. Quantum entanglement for secret sharing and secret splitting , 1999 .
[54] Wei Chen,et al. Delayed error verification in quantum key distribution , 2014 .
[55] Qiaoyan Wen,et al. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .
[56] Prosanta Gope,et al. Multi-party quantum private comparison with an almost-dishonest third party , 2015, Quantum Inf. Process..
[57] Yi-min Liu,et al. Many-Agent Controlled Teleportation of Multi-qubit Quantum Information via Quantum Entanglement Swapping , 2005 .
[58] K. Peng,et al. Multiparty secret sharing of quantum information based on entanglement swapping , 2004 .
[59] Jacques Traoré,et al. A fair and efficient solution to the socialist millionaires' problem , 2001, Discret. Appl. Math..
[60] Christoph Simon,et al. Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.
[61] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[62] Gu Bin,et al. A two-step quantum secure direct communication protocol with hyperentanglement , 2011 .
[63] Chao-Hua Yu,et al. Quantum private comparison with d-level single-particle states , 2013 .
[64] Gang Xu,et al. CRYPTANALYSIS AND IMPROVEMENTS FOR THE QUANTUM PRIVATE COMPARISON PROTOCOL USING EPR PAIRS , 2013 .
[65] Tian-Yu Ye,et al. Improvement of Controlled Bidirectional Quantum Direct Communication Using a GHZ State , 2013 .
[66] Qiaoyan Wen,et al. Quantum Private Comparison Protocol with the Random Rotation , 2013 .
[67] Wei-Wei Zhang,et al. Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party , 2013, Quantum Inf. Process..
[68] A Cabello. Quantum key distribution in the Holevo limit. , 2000, Physical review letters.
[69] Yuguang Yang,et al. NEW QUANTUM PRIVATE COMPARISON PROTOCOL WITHOUT ENTANGLEMENT , 2012 .
[70] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.
[71] Fei Gao,et al. Efficient quantum private comparison employing single photons and collective detection , 2013, Quantum Inf. Process..
[72] Zhaoxu Ji,et al. Quantum Private Comparison of Equal Information Based on Highly Entangled Six-Qubit Genuine State , 2016 .
[73] Xiu-Bo Chen,et al. An efficient and secure multiparty quantum secret sharing scheme based on single photons , 2008 .
[74] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[75] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[76] Tzonelih Hwang,et al. Multiparty quantum private comparison with almost dishonest third parties for strangers , 2017, Quantum Inf. Process..