Multi-party quantum private comparison based on the entanglement swapping of d-level cat states and d-level Bell states
暂无分享,去创建一个
[1] Wen Liu,et al. A Protocol for the Quantum Private Comparison of Equality with χ-Type State , 2012 .
[2] Wen Liu,et al. Multi-party Quantum Private Comparison Protocol Using d-Dimensional Basis States Without Entanglement Swapping , 2014 .
[3] 周萍,et al. Efficient Quantum Cryptography Network without Entanglement and Quantum Memory , 2006 .
[4] Jian Li,et al. An Efficient Protocol for the Private Comparison of Equal Information Based on Four-Particle Entangled W State and Bell Entangled States Swapping , 2014 .
[5] Tzonelih Hwang,et al. Intercept–resend attacks on Chen et al.'s quantum private comparison protocol and the improvements , 2011 .
[6] Tzonelih Hwang,et al. New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.
[7] V. Karimipour,et al. Entanglement swapping of generalized cat states and secret sharing , 2001, quant-ph/0112050.
[8] Wei Cui,et al. Quantum Private Comparison Protocol Based on Bell Entangled States , 2012 .
[9] Ziyun Zhang,et al. Perfect teleportation of an arbitrary three-qubit state with the highly entangled six-qubit genuine state , 2010 .
[10] Nicolas Cerf,et al. Asymmetric quantum cloning machines , 1998 .
[11] Fuguo Deng,et al. Improving the security of secure direct communication based on the secret transmitting order of particles , 2006, quant-ph/0612016.
[12] Ping Zhou,et al. Robustness of two-way quantum communication protocols against Trojan horse attack , 2005 .
[13] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[14] Deng Fu-Guo,et al. Efficient Quantum Cryptography Network without Entanglement and Quantum Memory , 2006 .
[15] Yixian Yang,et al. An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement , 2010 .
[16] Qiaoyan Wen,et al. Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol , 2007, 0801.2418.
[17] Fei Gao,et al. A simple participant attack on the brádler-dušek protocol , 2007, Quantum Inf. Comput..
[18] Tzonelih Hwang,et al. New Efficient Three-Party Quantum Key Distribution Protocols , 2009, IEEE Journal of Selected Topics in Quantum Electronics.
[19] Man Zhong-xiao,et al. Quantum Bidirectional Secure Direct Communication via Entanglement Swapping , 2007 .
[20] Tian-Yu Ye,et al. Improvement of Controlled Bidirectional Quantum Direct Communication Using a GHZ State , 2013 .
[21] Wang Yan,et al. Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations , 2005 .
[22] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[23] Qiaoyan Wen,et al. Quantum Private Comparison Protocol with the Random Rotation , 2013 .
[24] Qiaoyan Wen,et al. Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .
[25] Wei-Wei Zhang,et al. Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party , 2013, Quantum Inf. Process..
[26] G. Long,et al. Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.
[27] Wen Liu,et al. New Quantum Private Comparison Protocol Using χ-Type State , 2012 .
[28] Jingjing Zhao,et al. Differential phase shift quantum private comparison , 2014, Quantum Inf. Process..
[29] Zhiwei Sun,et al. Quantum Private Comparison Protocol Based on Cluster States , 2013 .
[30] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[31] Wen Liu,et al. Quantum Private Comparison Based on GHZ Entangled States , 2012 .
[32] Gang Xu,et al. CRYPTANALYSIS AND IMPROVEMENTS FOR THE QUANTUM PRIVATE COMPARISON PROTOCOL USING EPR PAIRS , 2013 .
[33] Wen Liu,et al. An efficient protocol for the quantum private comparison of equality with W state , 2011 .
[34] Tzonelih Hwang,et al. An enhancement on Shi et al.'s multiparty quantum secret sharing protocol , 2011 .
[35] Dan Li,et al. Quantum Private Comparison Protocol with W States , 2014 .
[36] Cerf,et al. Pauli cloning of a quantum Bit , 2000, Physical review letters.
[37] Qiaoyan Wen,et al. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .
[38] Tian-Yu Ye,et al. Reply to the Comment on “Improvement of Controlled Bidirectional Quantum Direct Communication Using a GHZ State" [Chin. Phys. Lett. 30 (2013) 040305] , 2013 .
[39] Yi-min Liu,et al. Many-Agent Controlled Teleportation of Multi-qubit Quantum Information via Quantum Entanglement Swapping , 2005 .
[40] Qiaoyan Wen,et al. Participant attack on a kind of MQSS schemes based on entanglement swapping , 2010 .
[41] Yu-Guang Yang,et al. Comment on “efficient and feasible quantum private comparison of equality against the collective amplitude damping noise” , 2014, Quantum Inf. Process..
[42] A Cabello. Quantum key distribution in the Holevo limit. , 2000, Physical review letters.
[43] Yuguang Yang,et al. NEW QUANTUM PRIVATE COMPARISON PROTOCOL WITHOUT ENTANGLEMENT , 2012 .
[44] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.
[45] Nicolas J. Cerf,et al. Asymmetric quantum cloning in any dimension , 1998, quant-ph/9805024.
[46] Gongde Guo,et al. Quantum Private Comparison of Equality with χ-Type Entangled States , 2013 .
[47] Chia-Wei Tsai,et al. Multi-user private comparison protocol using GHZ class states , 2013, Quantum Inf. Process..
[48] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[49] Qiao-Yan Wen,et al. Secure quantum private comparison , 2009 .
[50] Hua Zhang,et al. Comment on quantum private comparison protocols with a semi-honest third party , 2012, Quantum Information Processing.
[51] H. Weinfurter,et al. Experimental quantum teleportation , 1997, Nature.
[52] Q. Cai. Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.
[53] Jacques Traoré,et al. A fair and efficient solution to the socialist millionaires' problem , 2001, Discret. Appl. Math..
[54] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[55] Fei Gao,et al. Efficient quantum private comparison employing single photons and collective detection , 2013, Quantum Inf. Process..
[56] Zhaoxu Ji,et al. Quantum Private Comparison of Equal Information Based on Highly Entangled Six-Qubit Genuine State , 2016 .
[57] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[58] Yan-Bing Li,et al. Quantum Private Comparison Based on Phase Encoding of Single Photons , 2014, International Journal of Theoretical Physics.
[59] Yan Wang,et al. Secure quantum key distribution network with Bell states and local unitary operations , 2007, 0705.1746.
[60] Tzonelih Hwang,et al. THE ENHANCEMENT OF ZHOU et al.'s QUANTUM SECRET SHARING PROTOCOL , 2009 .
[61] Tzonelih Hwang,et al. The enhancement of three-party simultaneous quantum secure direct communication scheme with EPR pairs , 2011 .
[62] Wei Huang,et al. Multi-party quantum private comparison protocol with $$n$$n-level entangled states , 2014, Quantum Inf. Process..