Research of secure two-party quantum comparing protocol

被引:1
|
作者
Liu Wen [1 ]
Wang Yong-Bin [1 ]
机构
[1] Commun Univ China, Sch Comp, Beijing 100024, Peoples R China
关键词
secure two-party computation; secure two-party vector dominance statistic problem; quantum implicit module n+1 addition; KEY DISTRIBUTION; SCHEME;
D O I
10.7498/aps.60.030305
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Secure two-party comparing problem is used to compare two private integer without further leaking of information. But in case of the quantum computer the currently available solutions become useless. A secure two-party quantum comparing protocol in semi-honest model is presented based on the a quantum implicit module n + 1 addition. The security of the protocol is analyzed.
引用
收藏
页数:7
相关论文
共 22 条
  • [1] [Anonymous], 2004, FDN CRYPTOGRAPHY BAS, DOI DOI 10.1093/LOGCOM/EXI020
  • [2] Cachin C, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P120, DOI 10.1145/319709.319726
  • [3] Cai QY, 2004, CHINESE PHYS LETT, V21, P601, DOI 10.1088/0256-307X/21/4/003
  • [4] Chen P, 2006, CHINESE PHYS, V15, P2228, DOI 10.1088/1009-1963/15/10/007
  • [5] Crepeau Claude, 2002, P THIRY 4 ANN ACM S, P643, DOI DOI 10.1145/509907.510000
  • [6] Secure multiparty quantum summation
    Du Jian-Zhong
    Chen Xiu-Bo
    Wen Qiao-Yan
    Zhu Fu-Chen
    [J]. ACTA PHYSICA SINICA, 2007, 56 (11) : 6214 - 6219
  • [7] Gu B, 2009, CHINESE PHYS B, V18, P4690, DOI 10.1088/1674-1056/18/11/013
  • [8] IOANNIDIS I, 2003, P 36 ANN HAW INT C S, P2005
  • [9] Li Shun-dong, 2005, Acta Electronica Sinica, V33, P769
  • [10] Symmetric cryptographic protocols for extended millionaires' problem
    Li ShunDong
    Wang DaoShun
    Dai YiQi
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009, 52 (06): : 974 - 982