2012
DOI: 10.1007/s11128-012-0439-y
|View full text |Cite
|
Sign up to set email alerts
|

Efficient quantum private comparison employing single photons and collective detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
73
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 103 publications
(73 citation statements)
references
References 32 publications
0
73
0
Order By: Relevance
“…Compared with the the existing MQCP-CDs [33], [34], [35], [36], [37], [38], [39], [40], the protocols proposed in this paper have the following advantages. First, the proposed protocols are more feasible since they do not need to employ quantum storage machine.…”
Section: B Conclusionmentioning
confidence: 99%
“…Compared with the the existing MQCP-CDs [33], [34], [35], [36], [37], [38], [39], [40], the protocols proposed in this paper have the following advantages. First, the proposed protocols are more feasible since they do not need to employ quantum storage machine.…”
Section: B Conclusionmentioning
confidence: 99%
“…Hence, the advantages of our protocols are easier to be implemented and feasible with current technique, which is the same to the protocols of Refs. [34,35] On the other hand, the previous protocols are considered in the semi-honest model [22][23][24][25][26][27][28][29][30]34,35]; if TP lies in the final stages, Alice and Bob will get a wrong t is the number of running the protocol P0 in protocol P1 P0 . For consistence, we take n = t and m = 2t for Ref.…”
Section: Quantum Private Comparison With Malicious Tpmentioning
confidence: 99%
“…Refs. [19,22,27,29] show that besides the comparison result, Alice and Bob can still obtain extra amount of information on the secret inputs. From the Table 1, it can be found that our protocol does not have a distinctive advantage in terms of the QKD cost.…”
Section: Quantum Private Comparison With Malicious Tpmentioning
confidence: 99%
See 1 more Smart Citation
“…In essence, its security is guaranteed by the hash function. Since then, many other QPCE protocols have been proposed, such as the QPCE protocols with nonentangled state (i.e., single photon) [7,8], the QPCE protocols with maximally entangled state (Bell state, GHZ state, etc.) [9][10][11][12][13], and the QPCE protocols with non-maximally entangled state (W state, cluster state, 蠂-type state, etc.)…”
mentioning
confidence: 99%