Two-party quantum private comparison protocol with maximally entangled seven-qubit state
From MaRDI portal
Publication:5197361
DOI10.1142/S0217732319502298zbMath1421.81029OpenAlexW2960693627MaRDI QIDQ5197361
Zhao-Xu Ji, Huanguo Zhang, Peiru Fan
Publication date: 23 September 2019
Published in: Modern Physics Letters A (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1142/s0217732319502298
quantum cryptographyinformation securityquantum private comparisonsecure multi-party quantum computationmaximally entangled seven-qubit state
Related Items
Quantum private magnitude comparison, Two semi-quantum private comparison protocols of size relation based on single particles, Enhanced quantum private comparison, Quantum private comparison protocol based on four-particle GHZ states, Semi-quantum private comparison protocol of size relation with \(d\)-dimensional Bell states, Quantum private comparison protocol based on continuous variables, Efficient multiparty quantum private comparison protocol based on single photons and rotation encryption, Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform, Quantum private comparison without classical computation, Cryptanalysis and improvement of several quantum private comparison protocols, Efficient quantum private comparison based on entanglement swapping of Bell states, Quantum private comparison using single Bell state, Quantum private magnitude comparison based on maximum operation, Fast quantum private comparison without keys and entanglement
Cites Work
- A new quantum proxy multi-signature scheme using maximally entangled seven-qubit states
- New quantum private comparison protocol using EPR pairs
- A protocol for the quantum private comparison of equality with \(\chi \)-type state
- New quantum private comparison protocol using \(\chi \)-type state
- An efficient protocol for the private comparison of equal information based on four-particle entangled W state and Bell entangled states swapping
- Bidirectional quantum controlled teleportation via a maximally seven-qubit entangled state
- Multi-party quantum private comparison protocol with \(n\)-level entangled states
- Bidirectional and asymmetric quantum controlled teleportation
- Eavesdropping on the two-way quantum communication protocols with invisible photons
- Quantum algorithm to solve function inversion with time-space trade-off
- Quantum private comparison based on GHZ entangled states
- Quantum private comparison protocol based on cluster states
- Comment on quantum private comparison protocols with a semi-honest third party
- Quantum algorithm to find invariant linear structure of \(MD\) hash functions
- Quantum protocols for secure multi-party summation
- Polynomial-time quantum algorithms for finding the linear structures of Boolean function
- Two-party quantum private comparison with five-qubit entangled states
- A maximally entangled seven-qubit state
- Quantum entanglement
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Secure multi-party quantum computation
- Quantum secret sharing