2022
DOI: 10.1140/epjqt/s40507-022-00156-9
|View full text |Cite
|
Sign up to set email alerts
|

Single-state semiquantum private comparison based on Bell states

Abstract: In this paper, a novel semiquantum private comparison (SQPC) protocol based on single kind of Bell states is proposed, which allows two classical parties to judge the equality of their private inputs securely and correctly under the help of a semi-honest third party (TP) who possesses complete quantum capabilities. TP is allowed to misbehave on her own but cannot conspire with anyone else. Our protocol needs none of unitary operations, quantum entanglement swapping or the reordering operations. Moreover, our p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 59 publications
0
5
0
Order By: Relevance
“…(4)The proposed MQPC protocol can be used in the strange user environment, as there are not any communication and pre-shared key between each pair of users. Recently, by introducing the concept of semiquantumness [37][38][39] into QPC, semiquantum private comparison (SQPC) [36,[40][41][42][43][44][45][46] has gained considerable developments. However, few of the existing SQPC protocols can be used to determine the size relationship for private inputs from more than two classical users through being implemented one round.…”
Section: Discussionmentioning
confidence: 99%
“…(4)The proposed MQPC protocol can be used in the strange user environment, as there are not any communication and pre-shared key between each pair of users. Recently, by introducing the concept of semiquantumness [37][38][39] into QPC, semiquantum private comparison (SQPC) [36,[40][41][42][43][44][45][46] has gained considerable developments. However, few of the existing SQPC protocols can be used to determine the size relationship for private inputs from more than two classical users through being implemented one round.…”
Section: Discussionmentioning
confidence: 99%
“…Nevertheless, Tsai et al highlighted that Jiang's protocol is unable to resist a double CNOT attack, and then they suggested an improved scheme to remedy this security loophole [33]. Geng et al presented an SQPC protocol with single kind of Bell states to judge the equality of two classical participants' privacies [34]. Recently, Tian et al raised a more efficient SQPC protocol by adopting the entanglement property of W-state [35].…”
Section: Introductionmentioning
confidence: 99%
“…[16] In general, we can say that a quantum operation will be covariant with respect to the group G if it commutes with the group action. When a quantum error correction code is covariant with respect to G, its encoding map is called the G-covariant operation, and we can achieve approximate error correction [17][18][19][20] by studying the properties of the recovery operation. A crucial step in quantum error correction is decoding.…”
Section: Introductionmentioning
confidence: 99%