2017
DOI: 10.1007/s11128-017-1766-9
|View full text |Cite
|
Sign up to set email alerts
|

A novel quantum scheme for secure two-party distance computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…, t, so the communication complexity of this protocol is O (t), which is only proportional to t. Note that t is the minimum number of TP required to recover secrets, which can be adjusted according to needs. The results computed by previous protocols [13,14,25] are estimated values, and their accuracy has positive correlation with the size of the database, while the results in our protocol are accurate. In previous protocols, the space of the participants' coordinates was evenly divided into N cells.…”
Section: ) Performancementioning
confidence: 59%
See 3 more Smart Citations
“…, t, so the communication complexity of this protocol is O (t), which is only proportional to t. Note that t is the minimum number of TP required to recover secrets, which can be adjusted according to needs. The results computed by previous protocols [13,14,25] are estimated values, and their accuracy has positive correlation with the size of the database, while the results in our protocol are accurate. In previous protocols, the space of the participants' coordinates was evenly divided into N cells.…”
Section: ) Performancementioning
confidence: 59%
“…The communication complexity can be defined as the total number of communication times. Under this definition, the complexities of the existing protocols are O (log N) and O (N log N), which are mentioned in [13,14,25]. This is because all three protocols are based on QPQs, and quantum messages need to be exchanged during QPQ.…”
Section: ) Performancementioning
confidence: 99%
See 2 more Smart Citations
“…They endow quantum computing with absolute security. With this advantage, a huge number of quantum cryptography protocols have been proposed to solve cryptography challenges, embracing quantum secure direct communication (QSDC), [5][6][7][8] quantum secret sharing (QSS), [9][10][11][12] and quantum key distribution (QKD), [13][14][15][16][17] as well as quantum secure multiparty computation (QSMPC), [18][19][20][21][22][23][24] etc.…”
Section: Introductionmentioning
confidence: 99%