2017
DOI: 10.1142/s0219749917500149
|View full text |Cite
|
Sign up to set email alerts
|

Quantum private comparison protocol without a third party

Abstract: To evade the well-known impossibility of unconditionally secure quantum two-party computations, previous quantum private comparison protocols have to adopt a third party. Here we study how far we can go with two parties only. We propose a very feasible and efficient protocol. Intriguingly, although the average amount of information leaked cannot be made arbitrarily small, we find that it never exceeds 14 bits for any length of the bit-string being compared.Comment: 4 pages, 1 figur

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
30
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(31 citation statements)
references
References 21 publications
1
30
0
Order By: Relevance
“…It is not considered as a "loophole" even if the external party Eve can cheat in these protocols. This is also the case of our previous QPC protocol in [5]. Nevertheless, it is surely an appealing improvement * Electronic address: hegp@mail.sysu.edu.cn if external eavesdropping can be defeated too.…”
Section: Introductionsupporting
confidence: 52%
See 3 more Smart Citations
“…It is not considered as a "loophole" even if the external party Eve can cheat in these protocols. This is also the case of our previous QPC protocol in [5]. Nevertheless, it is surely an appealing improvement * Electronic address: hegp@mail.sysu.edu.cn if external eavesdropping can be defeated too.…”
Section: Introductionsupporting
confidence: 52%
“…Therefore, most existing quantum private comparison (QPC) protocols added a third party to accomplish the task (see [4] and the references therein). In 2016, we proposed a QPC protocol [5] which involves two parties only. Although it is not unconditionally secure, the loose upper bound of the average amount of information leaked is 14 bits only.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In quantum summation protocols, the privacy of participants’ inputs is preserved and the correctness of the summation is guaranteed by quantum properties. Quantum summation has also potential applications in quantum voting [ 17 , 18 , 19 , 20 , 21 ] and quantum private equality comparison [ 22 , 23 , 24 ]. Designing quantum summation protocols that can be implemented with current or near future quantum technologies is therefore of interest, as we pursue in this paper.…”
Section: Introductionmentioning
confidence: 99%