Securing QKD Links in the Full Hilbert Space
Quantum Information Processing
Unambiguous State Discrimination in Quantum Key Distribution
Quantum Information Processing
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Sharing a quantum secret without a trusted party
Quantum Information Processing
Asymmetric multi-party quantum state sharing of an arbitrary m-qubit state
Quantum Information Processing
A simple participant attack on the brádler-dušek protocol
Quantum Information & Computation
Quantum key distribution via tripartite coherent states
Quantum Information Processing
New quantum private comparison protocol using EPR pairs
Quantum Information Processing
Multiparty quantum key agreement with single particles
Quantum Information Processing
Quantum Information Processing
A quantum protocol for millionaire problem with Bell states
Quantum Information Processing
Quantum private comparison protocol based on entanglement swapping of $$d$$-level Bell states
Quantum Information Processing
Symmetric quantum fully homomorphic encryption with perfect security
Quantum Information Processing
Differential phase shift quantum private comparison
Quantum Information Processing
Quantum private comparison of equality protocol without a third party
Quantum Information Processing
Quantum Information Processing
Hi-index | 0.00 |
Two efficient quantum private comparison (QPC) protocols are proposed, employing single photons and collective detection. In the proposed protocols, two distrustful parties (Alice and Bob) compare the equivalence of information with the help of a semi-honest third party (TP). Utilizing collective detection, the cost of practical realization is reduced greatly. In the first protocol, TP gains the result of the comparison. While in the second protocol, TP cannot get the comparison result. In both of our protocols, Alice and Bob only need be equipped with unitary operation machines, such as phase plates. So Alice and Bob need not to have the expensive quantum devices, such as qubit generating machine, quantum memory machine and quantum measuring machine. Security of the protocols is ensured by theorems on quantum operation discrimination.