0010251一种有效的比特承诺方案〔刊〕/郑东//通信学报.—2000,21(2)—78~80(L)本文给出了一种基于子集和问题的比特承诺方案,该方案的优点是接受者 Bob 不需要向承诺者 Alice发送任何消息,其安全性是基于子集和问题的困难性。此方案...0010251一种有效的比特承诺方案〔刊〕/郑东//通信学报.—2000,21(2)—78~80(L)本文给出了一种基于子集和问题的比特承诺方案,该方案的优点是接受者 Bob 不需要向承诺者 Alice发送任何消息,其安全性是基于子集和问题的困难性。此方案的另一个优点是:它对承诺一个 bit 或承诺多个bit 都是有效的。展开更多
The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed...The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed to misbehave on his own but cannot conspire with either of the two users. The proposed protocol adopts two-atom product states rather than entangled states as the initial quantum resource, and only needs single-atom measurements for two users. Both the unitary operations and the quantum entanglement swapping operation are not necessary for the proposed protocol. The proposed protocol can compare the equality of one bit from each user in each round comparison with one two-atom product state. The proposed protocol can resist both the outside attack and the participant attack.Particularly, it can prevent TP from knowing two users' secrets. Furthermore, the qubit efficiency of the proposed protocol is as high as 50%.展开更多
文摘0010251一种有效的比特承诺方案〔刊〕/郑东//通信学报.—2000,21(2)—78~80(L)本文给出了一种基于子集和问题的比特承诺方案,该方案的优点是接受者 Bob 不需要向承诺者 Alice发送任何消息,其安全性是基于子集和问题的困难性。此方案的另一个优点是:它对承诺一个 bit 或承诺多个bit 都是有效的。
基金Supported by the National Natural Science Foundation of China under Grant No.61402407
文摘The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed to misbehave on his own but cannot conspire with either of the two users. The proposed protocol adopts two-atom product states rather than entangled states as the initial quantum resource, and only needs single-atom measurements for two users. Both the unitary operations and the quantum entanglement swapping operation are not necessary for the proposed protocol. The proposed protocol can compare the equality of one bit from each user in each round comparison with one two-atom product state. The proposed protocol can resist both the outside attack and the participant attack.Particularly, it can prevent TP from knowing two users' secrets. Furthermore, the qubit efficiency of the proposed protocol is as high as 50%.