期刊文献+
共找到124篇文章
< 1 2 7 >
每页显示 20 50 100
Multi-party semi-quantum private comparison protocol of size relation based on two-dimensional Bell states
1
作者 Bing Wang Li-Hua Gong San-Qiu Liu 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第11期184-192,共9页
Currently,all quantum private comparison protocols based on two-dimensional quantum states can only compare equality,via using high-dimensional quantum states that it is possible to compare the size relation in existi... Currently,all quantum private comparison protocols based on two-dimensional quantum states can only compare equality,via using high-dimensional quantum states that it is possible to compare the size relation in existing work.In addition,it is difficult to manipulate high-dimensional quantum states under the existing conditions of quantum information processing,leading to low practicality and engineering feasibility of protocols for comparing size relation.Considering this situation,we propose an innovative protocol.The proposed protocol can make size comparison by exploiting more manageable two-dimensional Bell states,which significantly enhances its feasibility with current quantum technologies.Simultaneously,the proposed protocol enables multiple participants to compare their privacies with the semi-quantum model.The communication process of the protocol is simulated on the IBM Quantum Experience platform to verify its effectiveness.Security analysis shows that the proposed protocol can withstand common attacks while preserving the privacies of all participants.Thus,the devised protocol may provide an important reference for implementation of quantum private size comparison protocols. 展开更多
关键词 two-dimensional Bell state size relation multi-party semi-quantum private comparison
下载PDF
Semi-quantum private comparison protocol of size relation with d-dimensional GHZ states
2
作者 Bing Wang San-Qiu Liu Li-Hua Gong 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第1期130-135,共6页
A novel efficient semi-quantum private comparison protocol based on the d-dimensional GHZ states is proposed.With the assistance of semi-honest third party,two classical participants can compare the size relation of t... A novel efficient semi-quantum private comparison protocol based on the d-dimensional GHZ states is proposed.With the assistance of semi-honest third party,two classical participants can compare the size relation of their secrets without any information leakage.To reduce the consumption of quantum devices,the qubit efficiency of our protocol is improved by introducing the semi-quantum conception via the existing semi-quantum private comparisons.Furthermore,it is unnecessary to prepare the secure classical authentication channel among participants in advance.It is shown that our protocol is not only correct and efficient,but also free from external and internal attacks. 展开更多
关键词 semi-quantum private comparison size relation dimensional GHZ state qubit efficiency
下载PDF
A Novel Semi-Quantum Private Comparison Scheme Using Bell Entangle States
3
作者 Yuhua Sun Lili Yan +2 位作者 Zhibin Sun Shibin Zhang Jiazhong Lu 《Computers, Materials & Continua》 SCIE EI 2021年第3期2385-2395,共11页
Private comparison is the basis of many encryption technologies,and several related Quantum Private Comparison(QPC)protocols have been published in recent years.In these existing protocols,secret information is encode... Private comparison is the basis of many encryption technologies,and several related Quantum Private Comparison(QPC)protocols have been published in recent years.In these existing protocols,secret information is encoded by using conjugate coding or orthogonal states,and all users are quantum participants.In this paper,a novel semi-quantum private comparison scheme is proposed,which employs Bell entangled states as quantum resources.Two semi-quantum participants compare the equivalence of their private information with the help of a semi-honest third party(TP).Compared with the previous classical protocols,these two semi-quantum users can only make some particular action,such as to measure,prepare and reflect quantum qubits only in the classical basis fj0i;j1ig,and TP needs to perform Bell basis measurement on reflecting qubits to obtain the results of the comparison.Further,analysis results show that this scheme can avoid outside and participant attacks and its’qubit efficiency is better than the other two protocols mentioned in the paper. 展开更多
关键词 CRYPTOGRAPHY Bell entangled states a semi-honest TP security analysis semi-quantum private comparison
下载PDF
Measure-Resend Semi-Quantum Private Comparison Scheme Using GHZ Class States 被引量:1
4
作者 Lili Yan Yan Chang +3 位作者 Shibin Zhang Qirun Wang Zhiwei Sheng Yuhua Sun 《Computers, Materials & Continua》 SCIE EI 2019年第8期877-887,共11页
Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to rema... Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed. 展开更多
关键词 Quantum private comparison semi-quantum protocol semi-honest third party GHZ class states
下载PDF
Efficient quantum private comparison protocol utilizing single photons and rotational encryption 被引量:1
5
作者 Tian-Yi Kou Bi-Chen Che +3 位作者 Zhao Dou Xiu-Bo Chen Yu-Ping Lai Jian Li 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第6期221-227,共7页
As a branch of quantum secure multiparty computation,quantum private comparison is applied frequently in many fields,such as secret elections,private voting,and identification.A quantum private comparison protocol wit... As a branch of quantum secure multiparty computation,quantum private comparison is applied frequently in many fields,such as secret elections,private voting,and identification.A quantum private comparison protocol with higher efficiency and easier implementation is proposed in this paper.The private secrets are encoded as single polarized photons and then encrypted with a homomorphic rotational encryption method.Relying on this method and the circular transmission mode,we implement the multiplexing of photons,raising the efficiency of our protocol to 100%.Our protocol is easy to realize since only single photons,unitary operation,and single-particle measurement are introduced.Meanwhile,the analysis shows that our protocol is also correct and secure. 展开更多
关键词 quantum private comparison rotational encryption polarized single photons EFFICIENCY
下载PDF
Efficient quantum private comparison protocol based on one direction discrete quantum walks on the circle 被引量:1
6
作者 Jv-Jie Wang Zhao Dou +2 位作者 Xiu-Bo Chen Yu-Ping Lai Jian Li 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第5期150-156,共7页
We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to... We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to set a flag to judge the comparing result,which improves the qubit efficiency and the maximum quantity of the participants’secret messages.Besides,our protocol can judge the size of the secret messages,not only equality.Furthermore,the quantum walks particle is disentangled in the initial state.It only requires a quantum walks operator to move,making our proposed protocol easy to implement and reducing the quantum resources.Through security analysis,we prove that our protocol can withstand well-known attacks and brute-force attacks.Analyses also reveal that our protocol is correct and practical. 展开更多
关键词 quantum private comparison protocol one direction quantum walks EFFICIENCY brute-force attack
下载PDF
Quantum private comparison of arbitrary single qubit states based on swap test
7
作者 Xi Huang Yan Chang +2 位作者 Wen Cheng Min Hou Shi-Bin Zhang 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第4期123-132,共10页
By using swap test,a quantum private comparison(QPC) protocol of arbitrary single qubit states with a semi-honest third party is proposed.The semi-honest third party(TP) is required to help two participants perform th... By using swap test,a quantum private comparison(QPC) protocol of arbitrary single qubit states with a semi-honest third party is proposed.The semi-honest third party(TP) is required to help two participants perform the comparison.She can record intermediate results and do some calculations in the whole process of the protocol execution,but she cannot conspire with any of participants.In the process of comparison,the TP cannot get two participants’ private information except the comparison results.According to the security analysis,the proposed protocol can resist both outsider attacks and participants’ attacks.Compared with the existing QPC protocols,the proposed one does not require any entanglement swapping technology,but it can compare two participants’ qubits by performing swap test,which is easier to implement with current technology.Meanwhile,the proposed protocol can compare secret integers.It encodes secret integers into the amplitude of quantum state rather than transfer them as binary representations,and the encoded quantum state is compared by performing the swap test.Additionally,the proposed QPC protocol is extended to the QPC of arbitrary single qubit states by using multi-qubit swap test. 展开更多
关键词 quantum private comparison arbitrary single qubit states swap test quantum cryptography
下载PDF
New Quantum Private Comparison Using Hyperentangled GHZ State
8
作者 Jerrel Gianni Zhiguo Qu 《Journal of Quantum Computing》 2021年第2期45-54,共10页
In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the ... In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the objective.This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom(DOF),which could have 64 combinations.The TP can decide which combination to use based on the shared key information provided from a quantum key distribution(QKD)protocol.By doing so,the security of the protocol can be improved further.Decoy photon technology is also used as another means of security and checks if the transmission in the quantum channel is secure or not before sending the quantum carrier.The proposed protocol is proved to be able to fend off various kinds of eavesdropping attacks.In addition,the new QPC protocol also can compare secret inputs securely and efficiently. 展开更多
关键词 GHZ state hyperentangled state information security quantum cryptography quantum private comparison
下载PDF
基于半量子安全直接通信的量子拍卖协议
9
作者 杨涵 冯雁 谢四江 《量子电子学报》 CAS CSCD 北大核心 2024年第1期125-134,共10页
针对现有量子密封拍卖协议中存在的报价隐私保护不够、恶意竞标者与第三方共谋等问题,提出了一种基于半量子安全直接通信的量子密封投标拍卖协议。该协议采用半量子安全直接通信,通信时拍卖方仅需拥有测量和反射粒子的能力;通过对投标... 针对现有量子密封拍卖协议中存在的报价隐私保护不够、恶意竞标者与第三方共谋等问题,提出了一种基于半量子安全直接通信的量子密封投标拍卖协议。该协议采用半量子安全直接通信,通信时拍卖方仅需拥有测量和反射粒子的能力;通过对投标方报价的保序加密,实现对报价的隐私保护;利用隐私比较,在无第三方参与的情况下,拍卖方也能比较保序加密后的报价信息。理论分析表明面对截获-重发、受控非门(CNOT)、相位反转、共谋等攻击时,所提出协议仍具有较高的安全性,且与同类型量子拍卖协议相比,新协议通信效率不受投标人数的影响。 展开更多
关键词 量子信息 量子拍卖 量子密封投标拍卖 半量子 保序加密 隐私比较
下载PDF
Cryptanalysis and Improvement of Quantum Private Comparison Protocol Based on Bell Entangled States 被引量:3
10
作者 刘文杰 刘超 +2 位作者 陈汉武 李志强 刘志昊 《Communications in Theoretical Physics》 SCIE CAS CSCD 2014年第8期210-214,共5页
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants... Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party(TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol,it not only reduces the Bell states consumption but also simplifies the protocol steps. 展开更多
关键词 quantum private comparison BELL states ENTANGLEMENT SWAPPING TP’s measurement attack IMPROVEMENT
原文传递
Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels 被引量:6
11
作者 HUANG Wei WEN QiaoYan +2 位作者 LIU Bin GAO Fei SUN Ying 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2013年第9期1670-1678,共9页
We present a protocol for quantum private comparison of equality(QPCE) with the help of a semi-honest third party(TP).Instead of employing the entanglement,we use single photons to achieve the comparison in this proto... We present a protocol for quantum private comparison of equality(QPCE) with the help of a semi-honest third party(TP).Instead of employing the entanglement,we use single photons to achieve the comparison in this protocol.By utilizing collective eavesdropping detection strategy,our protocol has the advantage of higher qubit efficiency and lower cost of implementation.In addition to this protocol,we further introduce three robust versions which can be immune to collective dephasing noise,collective-rotation noise and all types of unitary collective noise,respectively.Finally,we show that our protocols can be secure against the attacks from both the outside eavesdroppers and the inside participants by using the theorems on quantum operation discrimination. 展开更多
关键词 quantum private comparison of equality collective detection collective noise
原文传递
Twice-Hadamard-CNOT attack on Li et al.'s fault-tolerant quantum private comparison and the improved scheme 被引量:2
12
作者 季赛 王芳 +1 位作者 刘文杰 袁晓敏 《Frontiers of physics》 SCIE CSCD 2015年第2期73-78,共6页
Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is... Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is fault-tolerant and could be performed in a non-ideal scenario. However, there ex- ists a fatal loophole in their private comparison scheme under a special attack, namely the twice- Hadamard-CNOT attack. Specifically, a malicious party may intercept the other party's particles and execute Hadamard operations on the intercepted particles as well as on his or her own particles. Then, the malicious party could sequentially perform a controlled-NOT (CNOT) operation between intercepted particles and the auxiliary particles, as well as between his or her own particles and the auxiliary particles prepared in advance. By measuring the auxiliary particles, the secret input will be revealed to the malicious party without being detected. For resisting this special attack, a feasible improved scheme is proposed by introducing a permutation operator before the third party (TP) sends the particle sequences to each participant. 展开更多
关键词 quantum private comparison GHZ state twice-Hadamard-CNOT attack improvedscheme
原文传递
Quantum Private Comparison Protocol Based on Bell Entangled States 被引量:3
13
作者 刘文 王永滨 崔巍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2012年第4期583-588,共6页
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The c... In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information. 展开更多
关键词 quantum private comparison protocol Bell entangled state private
原文传递
Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states 被引量:2
14
作者 TianYu Ye ZhaoXu Ji 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2017年第9期7-16,共10页
Quantum private comparison(QPC) aims to accomplish the equality comparison of the secrets from different users without disclosing their genuine contents by using the principles of quantum mechanics. In this paper, we ... Quantum private comparison(QPC) aims to accomplish the equality comparison of the secrets from different users without disclosing their genuine contents by using the principles of quantum mechanics. In this paper, we summarize eight modes of quantum state preparation and transmission existing in current QPC protocols first. Then, by using the mode of scattered preparation and one-way convergent transmission, we construct a new multi-user quantum private comparison(MQPC) protocol with two-particle maximally entangled states, which can accomplish arbitrary pair's comparison of equality amongK users within one execution. Analysis turns out that its output correctness and its security against both the outside attack and the participant attack are guaranteed. The proposed MQPC protocol can be implemented with current technologies. It can be concluded that the mode of scattered preparation and one-way convergent transmission of quantum states is beneficial to designing the MQPC protocol which can accomplish arbitrary pair's comparison of equality among K users within one execution. 展开更多
关键词 multi-user quantum private comparison (MQPC) scattered preparation one-way convergent transmission
原文传递
Quantum Private Comparison of Equal Information Based on Highly Entangled Six-Qubit Genuine State 被引量:4
15
作者 纪兆旭 叶天语 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第6期711-715,共5页
Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the ... Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the assistance of a semi-honest third party(TP). The proposed protocol needs neither unitary operations nor quantum entanglement swapping technology, both of which may consume expensive quantum devices. Single particle measurements and Bell-basis measurements, which are easy to implement with current technologies, are employed by two users and TP in the proposed protocol, respectively. The proposed protocol can withstand all kinds of outside attacks and participant attacks. Moreover, none of information about the two users' private secrets and the comparison result is leaked out to TP. 展开更多
关键词 quantum private comparison highly entangled six-qubit genuine state security
原文传递
Cryptanalysis and improvement of several quantum private comparison protocols 被引量:1
16
作者 Zhao-Xu Ji Pei-Ru Fan +1 位作者 Huan-Guo Zhang Hou-Zhen Wang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2020年第8期57-62,共6页
Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant... Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant can steal another’s secret data without being detected through an active attack means. In this paper, we show that Wu et al’s active attack is also effective for several other existing protocols, including the ones proposed by Ji et al and Zha et al(2016 Commun. Theor. Phys. 65 711;2018 Int. J. Theor. Phys. 57 3874). In addition,we propose what a passive attack means, which is different from Wu et al’s active attack in that the malicious participant can easily steal another’s secret data only by using his own secret data after finishing the protocol, instead of stealing the data by forging identities when executing the protocol. Furthermore, we find that several other existing quantum private comparison protocols also have such an information leakage problem. In response to the problem, we propose a simple solution, which is more efficient than the ones proposed by Wu et al, because it does not consume additional classical and quantum resources. 展开更多
关键词 quantum information security quantum cryptography quantum private comparison information leakage problem passive attack
原文传递
Quantum Private Comparison via Cavity QED 被引量:2
17
作者 Tian-Yu Ye 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第2期147-156,共10页
The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed... The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed to misbehave on his own but cannot conspire with either of the two users. The proposed protocol adopts two-atom product states rather than entangled states as the initial quantum resource, and only needs single-atom measurements for two users. Both the unitary operations and the quantum entanglement swapping operation are not necessary for the proposed protocol. The proposed protocol can compare the equality of one bit from each user in each round comparison with one two-atom product state. The proposed protocol can resist both the outside attack and the participant attack.Particularly, it can prevent TP from knowing two users' secrets. Furthermore, the qubit efficiency of the proposed protocol is as high as 50%. 展开更多
关键词 quantum private comparison(QPC) third party(TP) cavity quantum electrodynamics(QED) product state participant attack
原文传递
基于半量子秘密比较的量子拍卖协议
18
作者 杨涵 冯雁 谢四江 《计算机科学》 CSCD 北大核心 2023年第6期291-296,共6页
针对量子密封拍卖协议中报价隐私保护不足、第三方不可信、对参与双方量子能力要求较高等情况,提出了一种将高能级单粒子作为信息载体的基于半量子秘密比较的量子密封投标拍卖协议。协议过程无需第三方参与,且采用半量子方式,仅要求拍... 针对量子密封拍卖协议中报价隐私保护不足、第三方不可信、对参与双方量子能力要求较高等情况,提出了一种将高能级单粒子作为信息载体的基于半量子秘密比较的量子密封投标拍卖协议。协议过程无需第三方参与,且采用半量子方式,仅要求拍卖方为强量子能力方,投标方仅需拥有反射粒子及制备单粒子的能力。协议利用半量子秘密比较,实现对投标方报价的隐私保护,拍卖方仅能获得报价之间的大小关系,而无法获取具体报价。文中通过理论分析证明了所提协议具有较高的安全性,能够抵御测量-重发攻击、截获-重发攻击、纠缠攻击、共谋攻击等多种攻击,且协议通信效率较稳定,不受投标人数的影响。 展开更多
关键词 量子拍卖 量子密封投标拍卖 半量子 半量子秘密比较 高能级
下载PDF
Comparison of Entrepreneurship Environment for Executives between State-owned and Private Enterprises in China
19
作者 Min Zhu Robert C. Camp +1 位作者 Maali Ashamalla Raj Garg 《China & World Economy》 SCIE 2007年第6期104-120,共17页
This research aims at exploring the differences in the effects of environment on entrepreneurship growth between state-owned enterprises and private businesses. Through executive investigation, reasons are provided fo... This research aims at exploring the differences in the effects of environment on entrepreneurship growth between state-owned enterprises and private businesses. Through executive investigation, reasons are provided for better performance of private businesses. Environmental factors, including economic, legal, technological, cultural and social factors, which influence entrepreneurship growth, are examined to determine differences between state-owned enterprise and private business executives. It is found that the methods of executive assignment to managerial posts determine executives' effort towards entrepreneurship. 展开更多
关键词 comparison of state-owned and private enterprises entrepreneurship growth environment methods of executive assignment
原文传递
基于四粒子GHZ态的半量子私有比较协议
20
作者 黄灌 娄小平 《量子电子学报》 CAS CSCD 北大核心 2023年第5期726-737,共12页
半量子通信协议允许只具有有限量子能力的参与者进行量子通信,与全量子通信协议相比,减少了量子资源损耗,节约了量子硬件成本。基于半量子模型,以四粒子Greenberger-Horne-Zeilinger(GHZ)态作为量子资源态,提出了一种新型半量子私有比... 半量子通信协议允许只具有有限量子能力的参与者进行量子通信,与全量子通信协议相比,减少了量子资源损耗,节约了量子硬件成本。基于半量子模型,以四粒子Greenberger-Horne-Zeilinger(GHZ)态作为量子资源态,提出了一种新型半量子私有比较协议。该协议可以在半诚实第三方的帮助下比较两个经典用户Alice和Bob的信息是否相等,且不泄露他们的秘密信息。安全性分析表明该协议可以抵御内部攻击和外部攻击,与现有的半量子私有比较协议相比,经典用户所需的量子能力更少,只需执行Z基测量和反射接收的粒子,且具有较高的量子比特效率。此外,通过IBM量子云平台进行了仿真实验,验证了所提协议的正确性。 展开更多
关键词 量子信息 量子密码学 半量子私有比较 四粒子GHZ态 IBM量子云平台 半诚实第三方
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部