Quantum private comparison with a malicious third party
作者: Zhiwei SunJianping YuPing WangLingling XuChunhui Wu
作者单位: 1Shenzhen University
2South China University of Technology
3Guangdong University of Finance
刊名: Quantum Information Processing, 2015, Vol.14 (6), pp.2125-2133
来源数据库: Springer Nature Journal
DOI: 10.1007/s11128-015-0956-6
关键词: Quantum private comparisonThird partyCryptography
原始语种摘要: Abstract(#br)In this paper, we will show that quantum private comparison protocol is secure when a malicious third party is presented. The security of the protocol is considered in a cheat-sensitive model, in which the TP is kept honest by the possibility of being caught cheating. Besides, we enhance the privacy of the quantum private comparison protocol, where the participants’ inputs and the comparison result can be preserved. Furthermore, in contrast to pervious protocols requiring a large amount of quantum resources, such as entanglement and quantum memory, our protocol is based on BB84 protocol, which is more feasible for practical applications. Finally, we analyze the security of the presented protocol.
全文获取路径: PDF下载  Springer Nature  (合作)
影响因子:1.748 (2012)

  • malicious 恶意
  • private 私有的
  • third 第三的
  • comparison 比较
  • party