2023
DOI: 10.3390/e25111552
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Quantum Private Comparison without Sharing a Key

Jian Li,
Fanting Che,
Zhuo Wang
et al.

Abstract: Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics. To improve the use of quantum resources and the efficiency of private comparison, a new QPC protocol based on GHZ-like states is proposed. The protocol adopts unitary operations to encode the secret information instead of performing quantum key distribution (QKD), which can reduce the amount of computation required to perform QKD… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Besides, to compare both the size and the equality of privacies, Chen et al came up with a novel two-party QPC protocol via quantum walks on circle [8]. Other than that, there are considerable QPC protocols based on other quantum states that have been investigated [9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…Besides, to compare both the size and the equality of privacies, Chen et al came up with a novel two-party QPC protocol via quantum walks on circle [8]. Other than that, there are considerable QPC protocols based on other quantum states that have been investigated [9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…In this protocol, secrets are divided into multiple groups, which improves efficiency by eliminating the need to compare all groups of information. Since then, different QPC protocols have been continuously proposed, aiming to determine the relationship between private and these studies mainly utilize various quantum states, including single photons [ 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 ], Bell states [ 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 ], entangled states [ 34 , 35 , 36 , 37 , 38 , 39 ], cluster states [ 40 , 41 , 42 , 43 , 44 , 45 ] and d-level quantum states [ 46 , 47 , 48 , 49 ] as quantum resources. They also employ different quantum technologies, such as entanglement swapping and unitary operations, as well as determine whether to distribute keys for sharing secret keys to accomplish the comparison.…”
Section: Introductionmentioning
confidence: 99%
“…Quantum superdense coding is utilized to achieve higher efficiency. Since then, several QPC protocols have been proposed, utilizing various quantum resources such as single photons [8][9][10][11], entangled states [12][13][14][15][16][17][18][19][20][21], and cluster states [22][23][24][25][26]. Additionally, two-atom product states and single-atom measurements are used in a QPC protocol [27].…”
Section: Introductionmentioning
confidence: 99%