2024
DOI: 10.1088/1612-202x/ad3a54
|View full text |Cite
|
Sign up to set email alerts
|

Novel semi-quantum private comparison protocol with Bell states

Li-Hua Gong,
Mao-Long Li,
Hao Cao
et al.

Abstract: Based on Bell states, a new semi-quantum private comparison protocol is proposed that enables two classical users to securely compare the equality of their private information with the aid of a semi-honest third party. Different from the existing semi-quantum private comparison protocols, the two classical participants in the presented protocol do not need to measure and prepare any quantum state, which not only reduces the consumption of quantum devices, but also greatly improves the feasibility of the protoc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 43 publications
0
1
0
Order By: Relevance
“…Semi-quantum protocols reduce the dependency of users on quantum resources, thus attracting widespread attention from researchers. Current research in the field of semi-quantum cryptography includes semiquantum key distribution [20][21][22][23][24][25], semi-quantum secure direct communication [26][27][28][29], semi-quantum secret sharing (SQSS) [30][31][32][33][34][35][36][37][38][39], semi-quantum secure multi-party computation [40][41][42], and more. Readers can refer to [43] for a detailed overview of semi-quantum cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…Semi-quantum protocols reduce the dependency of users on quantum resources, thus attracting widespread attention from researchers. Current research in the field of semi-quantum cryptography includes semiquantum key distribution [20][21][22][23][24][25], semi-quantum secure direct communication [26][27][28][29], semi-quantum secret sharing (SQSS) [30][31][32][33][34][35][36][37][38][39], semi-quantum secure multi-party computation [40][41][42], and more. Readers can refer to [43] for a detailed overview of semi-quantum cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…In this protocol, secrets are divided into multiple groups, which improves efficiency by eliminating the need to compare all groups of information. Since then, different QPC protocols have been continuously proposed, aiming to determine the relationship between private and these studies mainly utilize various quantum states, including single photons [ 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 ], Bell states [ 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 ], entangled states [ 34 , 35 , 36 , 37 , 38 , 39 ], cluster states [ 40 , 41 , 42 , 43 , 44 , 45 ] and d-level quantum states [ 46 , 47 , 48 , 49 ] as quantum resources. They also employ different quantum technologies, such as entanglement swapping and unitary operations, as well as determine whether to distribute keys for sharing secret keys to accomplish the comparison.…”
Section: Introductionmentioning
confidence: 99%