-
Secure two-party comparing problem is used to compare two private integer without further leaking of information. But in case of the quantum computer the currently available solutions become useless. A secure two-party quantum comparing protocol in semi-honest model is presented based on the a quantum implicit module n+1 addition. The security of the protocol is analyzed.
-
Keywords:
- secure two-party computation /
- secure two-party vector dominance statistic problem /
- quantum implicit module n+1 addition
[1] Yao A C 1982 Proceeding of the 23th IEEE Symposium on Foundations of Computer Science Los Alamitos, CA, November 3—5, 1982 p160
[2] Cachin C 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security Kent Ridge Digital Labs, Singapore November 3—5, 1999 p120
[3] Lin H Y, Tzeng W G 2005 Proceedings of the 4th International Conference on Applied Cryptography and Networks Security Singapore, June 6—9, 2006 p456
[4] Qin B, Qin H, Zhou K F, Wang X F, Wang Y M 2005 Journal of Xi’an University of Technology 21 149 (in Chinese)[秦 波、秦 慧、周克复、王晓峰、王育民 2005 西安理工大学学报 21 149]
[5] Ioannidis I, Grama A 2003 Proceedings of the 36th Annual Hawaii International Conference on System Sciences Big Island, HI, USA, January 6—9, 2003 p2005
[6] Li S D, Dai Y Q, You Q Y 2005 Acta Electronica Sinica 33 769 (in Chinese)[李顺东、戴一奇、游启友 2005电子学报 33 769]
[7] Li S D, Wang D S, Dai Y Q, Luo P 2008 Information Sciences 178 244
[8] Li S D,Wang D S, Dai Y Q 2009 Science in China Series F: Information Sciences 52 974
[9] Shi B S, Jiang Y K, Guo G C 2000 Appl. Phys. B: Laser Opt. B 70 415
[10] Xue P, Li C F, Guo G C 2002 Phys. Rev. A 65 022317
[11] Zhang Y S, Li C F, Guo G C arXIV: quant-Ph/ 0008044
[12] Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 3995 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 54 3995]
[13] Chen P, Deng F G, Long G L 2006 Chin. Phys. 15 2228
[14] Yang Y G, Wen Q Y, Zhu F C 2006 Acta Phys. Sin. 55 3255 (in Chinese) [杨宇光、温巧燕、朱甫臣 2006 55 3255]
[15] Gu B, Li C Q, Xu F, Chen Y L 2009 Chin. Phys. B 18 4690
[16] Wang C, Zhang Y 2009 Chin. Physi. B 18 3238
[17] J.Mueller Quade, H.Imai 2000 quant-ph/0010112
[18] Crepeau C, Gottesman D, Smith A 2002 Proceedings of 34th Annual ACM Symposium on Theory of Computing Montréal, Québec, Canada, May 19—21, 2002 p643
[19] Tokunaga Y, Okamoto T, Imoto N 2005 Phys. Rev. A 71 012314
[20] Cai Q Y, Li B W 2004 Chin. Phys. Lett. 21 601
[21] Du J Z, Chen X B, Wen Q Y, Zhu F C 2007 Acta Phys. Sin. 56 6214 (in Chinese) [杜建忠、陈秀波、温巧燕、朱甫臣 2007 56 6214]
[22] Goldreich O 2004 Fountions of Cryptography: Basic Applications (London: Cambridge University Press) p599
-
[1] Yao A C 1982 Proceeding of the 23th IEEE Symposium on Foundations of Computer Science Los Alamitos, CA, November 3—5, 1982 p160
[2] Cachin C 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security Kent Ridge Digital Labs, Singapore November 3—5, 1999 p120
[3] Lin H Y, Tzeng W G 2005 Proceedings of the 4th International Conference on Applied Cryptography and Networks Security Singapore, June 6—9, 2006 p456
[4] Qin B, Qin H, Zhou K F, Wang X F, Wang Y M 2005 Journal of Xi’an University of Technology 21 149 (in Chinese)[秦 波、秦 慧、周克复、王晓峰、王育民 2005 西安理工大学学报 21 149]
[5] Ioannidis I, Grama A 2003 Proceedings of the 36th Annual Hawaii International Conference on System Sciences Big Island, HI, USA, January 6—9, 2003 p2005
[6] Li S D, Dai Y Q, You Q Y 2005 Acta Electronica Sinica 33 769 (in Chinese)[李顺东、戴一奇、游启友 2005电子学报 33 769]
[7] Li S D, Wang D S, Dai Y Q, Luo P 2008 Information Sciences 178 244
[8] Li S D,Wang D S, Dai Y Q 2009 Science in China Series F: Information Sciences 52 974
[9] Shi B S, Jiang Y K, Guo G C 2000 Appl. Phys. B: Laser Opt. B 70 415
[10] Xue P, Li C F, Guo G C 2002 Phys. Rev. A 65 022317
[11] Zhang Y S, Li C F, Guo G C arXIV: quant-Ph/ 0008044
[12] Yang Y G, Wen Q Y, Zhu F C 2005 Acta Phys. Sin. 54 3995 (in Chinese) [杨宇光、温巧燕、朱甫臣 2005 54 3995]
[13] Chen P, Deng F G, Long G L 2006 Chin. Phys. 15 2228
[14] Yang Y G, Wen Q Y, Zhu F C 2006 Acta Phys. Sin. 55 3255 (in Chinese) [杨宇光、温巧燕、朱甫臣 2006 55 3255]
[15] Gu B, Li C Q, Xu F, Chen Y L 2009 Chin. Phys. B 18 4690
[16] Wang C, Zhang Y 2009 Chin. Physi. B 18 3238
[17] J.Mueller Quade, H.Imai 2000 quant-ph/0010112
[18] Crepeau C, Gottesman D, Smith A 2002 Proceedings of 34th Annual ACM Symposium on Theory of Computing Montréal, Québec, Canada, May 19—21, 2002 p643
[19] Tokunaga Y, Okamoto T, Imoto N 2005 Phys. Rev. A 71 012314
[20] Cai Q Y, Li B W 2004 Chin. Phys. Lett. 21 601
[21] Du J Z, Chen X B, Wen Q Y, Zhu F C 2007 Acta Phys. Sin. 56 6214 (in Chinese) [杜建忠、陈秀波、温巧燕、朱甫臣 2007 56 6214]
[22] Goldreich O 2004 Fountions of Cryptography: Basic Applications (London: Cambridge University Press) p599
Catalog
Metrics
- Abstract views: 7864
- PDF Downloads: 981
- Cited By: 0