2015
DOI: 10.1016/j.physleta.2015.05.040
|View full text |Cite
|
Sign up to set email alerts
|

Controllable quantum private queries using an entangled Fibonacci-sequence spiral source

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…When Bob cheats, Alice is automatically regarded as honest. As we know, unconditionally secure private queries are known to be impossible, so cheat-sensitive QPQ is desirable 5 7 8 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 . Our protocol is also cheat-sensitive in terms of the user security.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…When Bob cheats, Alice is automatically regarded as honest. As we know, unconditionally secure private queries are known to be impossible, so cheat-sensitive QPQ is desirable 5 7 8 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 . Our protocol is also cheat-sensitive in terms of the user security.…”
Section: Resultsmentioning
confidence: 99%
“… 8 suggested the first practical QPDQ protocol (J-protocol) based on the SARG04 QKD protocol 9 . Since then, the QKD-based QPDQ model has attracted a great deal of attention and many theoretical and experimental attempts have been made at devising QKD-based QPDQ protocols 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 .…”
mentioning
confidence: 99%
“…Similar to existing QKD-based QPQ protocols [11,[13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28], our protocol is also cheatsensitive in terms of user privacy. The user privacy is based on the impossibility of perfectly distinguishing non-orthogonal quantum states and superluminal communication.…”
Section: User Privacymentioning
confidence: 98%