Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3469968.3469983acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdcConference Proceedingsconference-collections
research-article

Quantum Private Size Comparison Protocol Based On Grover Algorithm

Published: 06 October 2021 Publication History
First page of PDF

References

[1]
Yao A C. Protocols for secure computation[C]// Foundations of Computer Science, 1982. SFCS '08. 23rd Annual Symposium on. IEEE, 1982.
[2]
Yang Y G, Wen Q Y. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement[J].
[3]
Tseng H Y, Lin J, Hwang T. New quantum private comparison protocol using EPR pairs[J]. Quantum Information Processing,2012,11(2):373-384.
[4]
Lin J, Yang C W, Hwang T. Quantum private comparison of equality protocol without a third party[J]. Quantum information processing, 2014, 13(2):239-247.
[5]
Li J, Jia L, Zhou H F, Secure quantum private comparison protocol based on the entanglement swapping between three-particle W-class state and bell state[J]. International Journal of Theoretical Physics, 2016, 55(3):1710-1718.
[6]
Yang Y G, Xia J, Jia X, Comment on quantum private comparison protocols with a semi-honest third party. Quantum Information Process, 2013, 12, 877-885.
[7]
He G P. Comment on Quantum private comparison of equality protocol without a third party[J]. Quantum Information Processing, 2015, 14(6):2301-2305.
[8]
Gao X, Zhang S B, Chang Y, Cryptanalysis of the quantum private comparison protocol based on the entanglement swapping between three-particle W-class state and bell state[J], International journal of Theoretical Physics, 2018, 57(6):1716-1722.
[9]
Liu W, Wang Y B . Research of secure two-party quantum comparing protocol[J]. Acta Physica Sinica -Chinese Edition-, 2011, 60(3):30305-030305.
[10]
Liu W, Wang Y B . Research of quantum secure multi-party ranking protocol[J]. Acta Physica Sinica -Chinese Edition-, 2011, 60(7):70301-070301.
[11]
Jia H Y, Wen Q Y, Song T T, Quantum protocol for millionaire problem[J]. Optics Communications, 2011, 284(1):545-549.
[12]
Yu C H, Guo G D, Lin Song. Quantum private comparison with d-level single-particle states[J]. Physical Scripta, 2013, 88(6):065013.
[13]
Lin S, Sun Y, Liu X F, Quantum private comparison protocol with d-dimensional Bell states[J]. Quantum Information Processing, 2013, 12(1):559-568.
[14]
Guo F Z, Gao F, Qin S J, Quantum private comparison protocol based on entanglement swapping of d-level Bell states[J]. Quantum information processing, 2013, 12(8): 2793-2802.
[15]
Luo Q B, Yang G W, She K, Multi-party quantum private comparison protocol base on d-dimentional entangle states[J]. Quantum information processing, 2014, 13(10):2343-2352.
[16]
Huang S L, Hwang T, Gope P. Multi-party quantum private comparison with an almost-dishonest third party[J]. Quantum Information Processing, 2015, 14(11):4225-4235.
[17]
Cao H, Ma W P, Multi-party quantum privacy comparison of size based on d-level GHZ states[J]. Quantum Information Processing,2019, 18(9):287.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICBDC '21: Proceedings of the 6th International Conference on Big Data and Computing
May 2021
218 pages
ISBN:9781450389808
DOI:10.1145/3469968
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 October 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Grover algorithm
  2. Quantum private comparison
  3. Quantum secure multiparty computing

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICBDC 2021

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 40
    Total Downloads
  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media