Author:
Cheng Qi,Situ Haozhen,Huang Qiong,Zhang Cai
Funder
Guangdong Basic and Applied Basic Research Foundation
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Reference36 articles.
1. Yao, A.C.: Protocols for secure computations. Foundations of Computer Science, 1982. SFCS’08. 23rd Annual Symposium on Foundations of Computer Science. pp. 160–164. IEEE (1982)
2. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: security analysis. IEEE Trans. Inf. Theory 56(7), 3465–3477 (2010)
3. Gao, F., Qin, S., Huang, W., et al.: Quantum private query: A new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 62, 1–12 (2019)
4. Ye, C.Q., Li, J., Cao, Z.W.: A class of protocols for multi-party quantum private comparison based on traveling mode. Quantum Inf. Process. 20(2), 1–18 (2021)
5. Lian, J.Y., Li, X., Ye, T.Y.: Multi-party quantum private comparison of size relationship with two third parties based on d-dimensional Bell states. Phys. Scr. 98(3), 035011 (2023)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献