Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Some attacks on quantum-based cryptographic protocols
Quantum Information & Computation
A simple participant attack on the brádler-dušek protocol
Quantum Information & Computation
New quantum private comparison protocol using EPR pairs
Quantum Information Processing
Comment on quantum private comparison protocols with a semi-honest third party
Quantum Information Processing
Efficient quantum private comparison employing single photons and collective detection
Quantum Information Processing
A watermark strategy for quantum images based on quantum fourier transform
Quantum Information Processing
A quantum protocol for millionaire problem with Bell states
Quantum Information Processing
Quantum Information Processing
Differential phase shift quantum private comparison
Quantum Information Processing
Quantum private comparison of equality protocol without a third party
Quantum Information Processing
Quantum Information Processing
Hi-index | 0.00 |
Recently, a quantum private comparison (QPC) protocol with a dishonest third party (TP) (Yang et al. in Quantum Inf Process, 2012. doi: 10.1007/s11128-012-0433-4 ) was proposed, which pointed out that the assumption of semi-honest third party (TP) is unreasonable. Here we find this protocol is not so secure as it was expected, and then we give some improvement strategies, which ensure that both players' secrets will not be leaked to anyone. We also discuss the assumption for TP in QPC protocls, which gives a constructive suggestions for the design of a new QPC protocol.