Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Comment on quantum private comparison protocols with a semi-honest third party
Quantum Information Processing
Efficient quantum private comparison employing single photons and collective detection
Quantum Information Processing
Multiparty quantum key agreement with single particles
Quantum Information Processing
Quantum Information Processing
Quantum private comparison against decoherence noise
Quantum Information Processing
A quantum protocol for millionaire problem with Bell states
Quantum Information Processing
Quantum Information Processing
Quantum private comparison protocol based on entanglement swapping of $$d$$-level Bell states
Quantum Information Processing
Symmetric quantum fully homomorphic encryption with perfect security
Quantum Information Processing
Differential phase shift quantum private comparison
Quantum Information Processing
Practical quantum all-or-nothing oblivious transfer protocol
Quantum Information Processing
Quantum Information Processing
A class of protocols for quantum private comparison based on the symmetry of states
Quantum Information Processing
Quantum private comparison of equality protocol without a third party
Quantum Information Processing
Quantum Information Processing
Improvements on "multiparty quantum key agreement with single particles"
Quantum Information Processing
Quantum Information Processing
Two-party quantum privacy comparison with polarization-entangled bell states and the coherent states
Quantum Information & Computation
Hi-index | 0.00 |
Based on EPR pairs, this paper proposes a different quantum private comparison (QPC) protocol enabling two parties to compare the equality of their information without revealing the information content. Due to the use of quantum entanglement of Bell state as well as one-way quantum transmission, the new protocol provides easier implementation as well as better qubit efficiency (near 50%) than the other QPCs. It is secure against Trojan horse attack and other well-known attacks.