Publisher
Springer Science and Business Media LLC
Subject
Physics and Astronomy (miscellaneous),General Mathematics
Reference51 articles.
1. Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp. 160–164 (1982). IEEE
2. Yang, Y.-G., Wen, Q.-Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. Journal of Physics A: Mathematical and Theoretical 42(5), 055305 (2009)
3. Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using epr pairs. Quantum Information Processing 11(2), 373–384 (2012)
4. Chou, W.-H., Hwang, T., Gu, J.: Semi-quantum private comparison protocol under an almost-dishonest third party. (2016) .arXiv preprint arXiv:1607.07961
5. Yan, L., Zhang, S., Chang, Y., Sheng, Z., Sun, Y.: Semi-quantum key agreement and private comparison protocols using bell states. International Journal of Theoretical Physics 58(11), 3852–3862 (2019)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献