2021
DOI: 10.1007/s10773-021-04915-9
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Quantum Private Comparison Based on Entanglement Swapping of Bell States

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 21 publications
(18 citation statements)
references
References 36 publications
0
18
0
Order By: Relevance
“…[15], noting its susceptibility to intercept-resend attacks and emphasizing the need for improvements. Afterward, several QPC protocols were proposed using different quantum states as carriers of quantum information, such as single photons [17], Bell states [18,19], multi-qubit entangled states [20][21][22][23][24], and multi-qubit cluster states [25][26][27][28]. In addition, Ye [29] proposed a QPC protocol using cavity quantum electrodynamics (QED), which requires two-atom product states as carriers of quantum information, and one two-atom product state can be utilized to perform the equality comparison of 1 bit in each round.…”
Section: Introductionmentioning
confidence: 99%
“…[15], noting its susceptibility to intercept-resend attacks and emphasizing the need for improvements. Afterward, several QPC protocols were proposed using different quantum states as carriers of quantum information, such as single photons [17], Bell states [18,19], multi-qubit entangled states [20][21][22][23][24], and multi-qubit cluster states [25][26][27][28]. In addition, Ye [29] proposed a QPC protocol using cavity quantum electrodynamics (QED), which requires two-atom product states as carriers of quantum information, and one two-atom product state can be utilized to perform the equality comparison of 1 bit in each round.…”
Section: Introductionmentioning
confidence: 99%
“…in any way, is one of the most striking manifestations of the quantum-mechanical nonlocal characteristic [5]. Besides being of fundamental interest, this process has applications [3,[6][7][8][9][10][11][12][13][14] in complex entanglement manipulation and quantum communication.…”
Section: Introductionmentioning
confidence: 99%
“…Its primary goal is to determine the equality of confidential values among participants while preserving the secrecy of the information. The groundbreaking QPC protocol introduced by Yang and Wen [ 18 ] has greatly facilitated various QPC protocols that utilize different quantum states as resources, including protocols based on single photons [ 19 ], Bell states [ 20 , 21 , 22 ], GHZ states [ 23 , 24 ], and multi-particle entangled states [ 25 , 26 , 27 ], among others. However, it is always necessary to perform the protocol several times when comparing the secret information of multiple participants when using two-party QPC protocols.…”
Section: Introductionmentioning
confidence: 99%