Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state
暂无分享,去创建一个
Xiu-Bo Chen | Jian Li | Yu-Guang Yang | Hengji Li | Chaoyang Li | Yuguang Yang | Xiubo Chen | Jian Li | Chaoyang Li | Hengji Li
[1] Tian-Yin Wang,et al. Security of quantum digital signatures for classical messages , 2015, Scientific Reports.
[2] Bin Liu,et al. Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels , 2013 .
[3] Jian Li,et al. Secure Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State , 2016 .
[4] Yu-Guang Yang,et al. Arbitrated quantum signature scheme based on cluster states , 2016, Quantum Inf. Process..
[5] Gang Xu,et al. Cryptanalysis of secret sharing with a single d-level quantum system , 2018, Quantum Inf. Process..
[6] Gerardo Adesso,et al. Unconditional security of entanglement-based continuous-variable quantum secret sharing , 2016, 1603.03224.
[7] Jian Li,et al. Deterministic Quantum Secure Direct Communication Protocol Based on Omega State , 2019, IEEE Access.
[8] Binayak S. Choudhury,et al. Simultaneous Teleportation of Arbitrary Two-qubit and Two Arbitrary Single-qubit States Using A Single Quantum Resource , 2018 .
[9] Tian-Yin Wang,et al. Economical quantum anonymous transmissions , 2010 .
[10] Tian-Yin Wang,et al. One-time proxy signature based on quantum cryptography , 2012, Quantum Inf. Process..
[11] H. Briegel,et al. Persistent entanglement in arrays of interacting particles. , 2000, Physical review letters.
[12] Tzonelih Hwang,et al. New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.
[13] Zhiwen Zhao,et al. Secure quantum sealed-bid auction with post-confirmation , 2010 .
[14] Bin Liu,et al. Quantum private comparison employing single-photon interference , 2017, Quantum Inf. Process..
[15] Yixian Yang,et al. An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement , 2010 .
[16] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[17] Ling Xu,et al. Quantum private comparison protocol based on the entanglement swapping between $$\chi ^+$$χ+ state and W-Class state , 2017, Quantum Inf. Process..
[18] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[19] Na Li,et al. A Survey on Quantum Cryptography , 2018 .
[20] Tian-Yin Wang,et al. The postprocessing of quantum digital signatures , 2017, Quantum Inf. Process..
[21] Fan Yang,et al. Cryptanalysis of the Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State , 2018 .
[22] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[23] Tad Hogg,et al. Quantum Auctions , 2007, 0704.0800.
[24] V. Buzek,et al. Toward protocols for quantum-ensured privacy and secure voting , 2011, 1108.5090.
[25] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[26] W. Dur,et al. Entanglement properties of multipartite entangled states under the influence of decoherence , 2005 .
[27] Qiaoyan Wen,et al. Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol , 2007, 0801.2418.
[28] Gang Xu,et al. A class of protocols for quantum private comparison based on the symmetry of states , 2014, Quantum Inf. Process..
[29] Jian Li,et al. An Efficient Protocol for the Private Comparison of Equal Information Based on Four-Particle Entangled W State and Bell Entangled States Swapping , 2014 .
[30] P. Lu,et al. Isolation of Live Premature Senescent Cells Using FUCCI Technology , 2016, Scientific Reports.
[31] Jian Li,et al. One Step Quantum Key Distribution Based on EPR Entanglement , 2016, Scientific Reports.
[32] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[33] Qiaoyan Wen,et al. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .
[34] A. Zeilinger,et al. Experimental one-way quantum computing , 2005, Nature.
[35] Qiao-Yan Wen,et al. Improved secure quantum sealed-bid auction , 2009 .
[36] Anthony Chefles,et al. Quantum protocols for anonymous voting and surveying , 2005, quant-ph/0504161.
[37] Jingjing Zhao,et al. Differential phase shift quantum private comparison , 2014, Quantum Inf. Process..
[38] Fei Gao,et al. Quantum protocol for millionaire problem , 2011 .
[39] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[40] Tian-Yin Wang,et al. Security of a sessional blind signature based on quantum cryptograph , 2014, Quantum Information Processing.
[41] Charles H. Bennett,et al. Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.
[42] Su-Juan Qin,et al. Quantum anonymous ranking , 2014 .
[43] Wen Liu,et al. An efficient protocol for the quantum private comparison of equality with W state , 2011 .
[44] Wei Cui,et al. Quantum Private Comparison Protocol Based on Bell Entangled States , 2012 .