Research of secure two-party quantum comparing protocol

被引:1
|
作者
Liu Wen [1 ]
Wang Yong-Bin [1 ]
机构
[1] Commun Univ China, Sch Comp, Beijing 100024, Peoples R China
关键词
secure two-party computation; secure two-party vector dominance statistic problem; quantum implicit module n+1 addition; KEY DISTRIBUTION; SCHEME;
D O I
10.7498/aps.60.030305
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Secure two-party comparing problem is used to compare two private integer without further leaking of information. But in case of the quantum computer the currently available solutions become useless. A secure two-party quantum comparing protocol in semi-honest model is presented based on the a quantum implicit module n + 1 addition. The security of the protocol is analyzed.
引用
收藏
页数:7
相关论文
共 22 条
  • [11] Lin HY, 2005, LECT NOTES COMPUT SC, V3531, P456
  • [12] Qin Bo, 2005, Journal of Xi'an University of Technology, V21, P149
  • [13] QUADE JM, 2000, QUANTPH0010112
  • [14] Quantum key distribution using different-frequency photons
    Shi, BS
    Jiang, YK
    Guo, GC
    [J]. APPLIED PHYSICS B-LASERS AND OPTICS, 2000, 70 (03): : 415 - 417
  • [15] Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations
    Shundong, Li
    Daoshun, Wang
    Yiqi, Dai
    Ping, Luo
    [J]. INFORMATION SCIENCES, 2008, 178 (01) : 244 - 255
  • [16] Threshold quantum cryptography
    Tokunaga, Y
    Okamoto, T
    Imoto, N
    [J]. PHYSICAL REVIEW A, 2005, 71 (01):
  • [17] Wang C, 2009, CHINESE PHYS B, V18, P3238, DOI 10.1088/1674-1056/18/8/024
  • [18] Conditional efficient multiuser quantum cryptography network
    Xue, P
    Li, CF
    Guo, GC
    [J]. PHYSICAL REVIEW A, 2002, 65 (02): : 7
  • [19] Yang Y, 2006, DIABETES, V55, pA404
  • [20] A theoretical scheme for multi-user quantum authentication and key distribution in a network
    Yang, YG
    Wen, QY
    Zhu, FC
    [J]. ACTA PHYSICA SINICA, 2005, 54 (09) : 3995 - 3999