Security analysis and improvement of a semi-quantum private comparison protocol with three-particle G-like states
From MaRDI portal
Publication:2107067
DOI10.1007/s11128-022-03460-6OpenAlexW4221089339MaRDI QIDQ2107067
Junyu Quan, Peishan Li, Li Xie, Qin Li, Ling-li Chen
Publication date: 29 November 2022
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-022-03460-6
Related Items (2)
Security analysis and improvement in a semi-quantum private comparison without pre-shared key ⋮ Enhanced quantum private comparison
Cites Work
- Multi-party quantum private comparison protocol with an almost-dishonest third party using GHZ states
- New quantum private comparison protocol using EPR pairs
- Quantum cryptography: public key distribution and coin tossing
- Multi-party quantum private comparison with an almost-dishonest third party
- Multiparty quantum private comparison with almost dishonest third parties for strangers
- Semi-quantum private comparison using single photons
- Quantum private comparison protocol based on cluster states
- Efficient quantum private comparison employing single photons and collective detection
- Multi-user private comparison protocol using GHZ class states
- Efficient mediated semi-quantum key distribution
- Efficient semi-quantum private comparison using single photons
- Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation
- Circular multi-party quantum private comparison with \(n\)-level single-particle states
- Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party
- Quantum multi-party private comparison protocol using \(d\)-dimensional Bell states
- Semi-quantum private comparison protocol with three-particle G-like states
- Cryptanalysis and improvement of a semi-quantum private comparison protocol based on Bell states
- Quantum Private Comparison Protocol Based on Bell Entangled States
- Quantum Key Distribution with Classical Bob
- Unconditional security in quantum cryptography
- An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement
- Quantum cryptography based on Bell’s theorem
- Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment
- Quantum secret sharing
- Quantum cryptography
This page was built for publication: Security analysis and improvement of a semi-quantum private comparison protocol with three-particle G-like states