2016
DOI: 10.48550/arxiv.1604.06834
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Quantum private comparison protocol without a third party

Guang Ping He

Abstract: To evade the well-known impossibility of unconditionally secure quantum two-party computations, previous quantum private comparison protocols have to adopt a third party. Here we study how far we can go with two parties only. We propose a very feasible and efficient protocol. Intriguingly, although the average amount of information leaked cannot be made arbitrarily small, we find that it never exceeds 14 bits for any length of the bit-string being compared.

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…Interestingly, the TP may be semi-honest [5,6], semi-honest having an intelligent robot [10], dishonest [13], or almost-dishonest [11]. Despite, the strong proof of Lo, some efforts have been made to achieve QPC without TP [22,23], but they have been found to be insecure and/or unfair [24]. Thus, in what follows, we will concentrate on three party protocols of QPC, where a TP helps Alice and Bob to compare the equality of their information.…”
Section: Introductionmentioning
confidence: 99%
“…Interestingly, the TP may be semi-honest [5,6], semi-honest having an intelligent robot [10], dishonest [13], or almost-dishonest [11]. Despite, the strong proof of Lo, some efforts have been made to achieve QPC without TP [22,23], but they have been found to be insecure and/or unfair [24]. Thus, in what follows, we will concentrate on three party protocols of QPC, where a TP helps Alice and Bob to compare the equality of their information.…”
Section: Introductionmentioning
confidence: 99%