Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Secure direct communication based on ping---pong protocol
Quantum Information Processing
Sharing a quantum secret without a trusted party
Quantum Information Processing
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states
Quantum Information Processing
A simple participant attack on the brádler-dušek protocol
Quantum Information & Computation
A quantum protocol for millionaire problem with Bell states
Quantum Information Processing
Quantum private comparison protocol based on entanglement swapping of $$d$$-level Bell states
Quantum Information Processing
Symmetric quantum fully homomorphic encryption with perfect security
Quantum Information Processing
Differential phase shift quantum private comparison
Quantum Information Processing
Hi-index | 0.00 |
In this paper, a quantum private comparison protocol with Bell states is proposed. In the protocol, two participants can determine the relationship between their secret inputs in size, with the assistance of a semi-trusted third party. The presented protocol can ensure fairness, correctness, and security. Meanwhile, all the particles undergo only a one-way trip, which improves the efficiency and security of the communication. Furthermore, only Bell states are exploited in the implementation of the protocol, and two participants are just required having the ability to perform single particle operations, which make the presented protocol more feasible in technique.