2012
DOI: 10.1088/0253-6102/57/4/11
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Private Comparison Protocol Based on Bell Entangled States

Abstract: In this paper, a quantum private comparison protocol is proposed based on bell entangled states. In our protocol, two parties can compare the equality of their information with the help of a semi-honest third party. The correctness and security of our protocol are discussed. One party cannot learn the other's private information and the third party also cannot learn any information about the private information.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
46
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 91 publications
(48 citation statements)
references
References 33 publications
1
46
0
Order By: Relevance
“…If the error rate is higher than the threshold they preset, he will abort the protocol; otherwise, the TP-Alice quantum channel is secure, and Alice discards the checking particles and continues the next step. It should be noted that sequence S [25]. Since our improvement is similar to Liu et al's protocol, so it can also resist these attacks.…”
Section: The Improvementmentioning
confidence: 79%
See 1 more Smart Citation
“…If the error rate is higher than the threshold they preset, he will abort the protocol; otherwise, the TP-Alice quantum channel is secure, and Alice discards the checking particles and continues the next step. It should be noted that sequence S [25]. Since our improvement is similar to Liu et al's protocol, so it can also resist these attacks.…”
Section: The Improvementmentioning
confidence: 79%
“…Since then, with different categories of quantum states, many other QPCE protocols have been proposed [18][19][20][21][22][23][24]. Recently, Liu et al [25] proposed a QPCE protocol based on Bell states. In the protocol, the characteristic of quantum entanglement swapping is utilized to realize the comparison task, and TP is assumed as a semi-honest third party.…”
Section: Introductionmentioning
confidence: 99%
“…In the article (Liu et al 2012), the length of useful secrets is L and the every comparison result was leaked to Calvin. Here, we propose a method to solve this problem.…”
Section: Big Data Quantum Private Comparison Scheme With the Intelligmentioning
confidence: 99%
“…QPC) (Liu et al 2012;Chen et al , 2010Xu et al 2012;Tseng et al 2012;Chang et al 2013;Chen and Hwang 2014) as a special branch of SMC were proposed to solve a variant of the millionaire problem. The main function of QPC protocol is to compare the equality of the secret information of two parties privately, without disclosing any actual information.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation