2018
DOI: 10.1007/s10773-018-3823-2
|View full text |Cite
|
Sign up to set email alerts
|

Semi-Quantum Private Comparison Using Single Photons

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(14 citation statements)
references
References 28 publications
0
14
0
Order By: Relevance
“…However, note that λ ± (for both the X and Y operators) are multiples of α, which, itself, is a multiple of 1/(N − 1). Returning to OW , we apply the Winter continuity bound (19) to attain…”
Section: Transactions On Ieeementioning
confidence: 99%
See 1 more Smart Citation
“…However, note that λ ± (for both the X and Y operators) are multiples of α, which, itself, is a multiple of 1/(N − 1). Returning to OW , we apply the Winter continuity bound (19) to attain…”
Section: Transactions On Ieeementioning
confidence: 99%
“…Since its original introduction in 2007, there have been numerous new semiquantum key distribution (SQKD) protocols developed [6]- [12]. There have also been extensions to the model beyond basic key distribution including secret sharing [13]- [15], identification [16], and state comparison [17]- [19].…”
Section: Introductionmentioning
confidence: 99%
“…Since its original introduction in 2007, there have been numerous new semiquantum key distribution (SQKD) protocols developed [6,7,8,9,10,11,12]. There have also been extensions to the model beyond basic key distribution including secret sharing [13,14,15] and state comparison [16,17,18].…”
Section: Introductionmentioning
confidence: 99%
“…Other SQPC protocols have been proposed. In [145,146], protocols requiring only single photons were presented. Another protocol in [135] was developed which used a new semiquantum key agreement protocol developed in the same reference.…”
mentioning
confidence: 99%
“…Beyond key distribution itself, the semi-quantum model has been used for other cryptographic tasks including secret sharing [23,24,25,26], direct communication [27,28,29], and quantum private comparison [30,31,32,33]. There has also been work recently in analyzing SQKD protocols in more practical settings (where it is impossible for B to accurately perform the Measure and Resend operation as he cannot prepare a photon in exactly the same state it was received) [2,34,35].…”
Section: A Semi-quantum Cryptographymentioning
confidence: 99%