Physica A Statistical Mechanics and its Applications, Journal Year: 2023, Volume and Issue: 625, P. 129023 - 129023
Published: July 10, 2023
Language: Английский
Physica A Statistical Mechanics and its Applications, Journal Year: 2023, Volume and Issue: 625, P. 129023 - 129023
Published: July 10, 2023
Language: Английский
Laser Physics Letters, Journal Year: 2024, Volume and Issue: 21(3), P. 035207 - 035207
Published: Feb. 2, 2024
Abstract Semi-quantum private comparison is a method for with fewer quantum resources, enabling classical participants to collaborate semi-honest third party possessing complete capabilities. A one-way protocol devised only by unitary operations. The facilitates transmission between (TP) and in communication, where the need perform operations measurement on transmitted qubits. In addition, do not require pre-shared keys. It shown that qubit efficiency of this 12.5%. Finally, security analysis simulation results IBM Quantum Experience demonstrate feasibility protocol.
Language: Английский
Citations
21Chinese Journal of Physics, Journal Year: 2025, Volume and Issue: unknown
Published: Feb. 1, 2025
Citations
2Advanced Quantum Technologies, Journal Year: 2023, Volume and Issue: 6(8)
Published: June 7, 2023
Abstract Based on the decoherence‐free states, two multi‐party semi‐quantum private comparison protocols are proposed to counteract collective noises. One can resist collective‐dephasing noise well, and other collective‐rotation noise. With assistance of a semi‐honest third party (TP), multiple classical participants with restricted quantum abilities compare their secret information by performing once. It is manifested that both external attacks internal attacks. Additionally, operations in simulated IBM Quantum Experience.
Language: Английский
Citations
30EPJ Quantum Technology, Journal Year: 2023, Volume and Issue: 10(1)
Published: April 19, 2023
Abstract In this paper, we utilize d -dimensional Bell states to construct a multi-party semiquantum private comparison (MSQPC) protocol with two supervisors, which can determine the size relationship of more than classical users’ inputs under control supervisors within one round implementation. The i.e., quantum third party (TP) and TP, are both semi-honest, means that they misbehave at their own wishes but not permitted conspire anyone else. Neither entanglement swapping nor unitary operations required in proposed MSQPC protocol. security analysis certifies overcome outside attacks participant attacks.
Language: Английский
Citations
24Physica A Statistical Mechanics and its Applications, Journal Year: 2024, Volume and Issue: 637, P. 129614 - 129614
Published: Feb. 17, 2024
Language: Английский
Citations
12EPJ Quantum Technology, Journal Year: 2024, Volume and Issue: 11(1)
Published: March 13, 2024
Abstract In this paper, by utilizing d -dimensional single-particle states, three semiquantum cryptography protocols, i.e., the multi-party private comparison (MSQPC) protocol, multiplication (MSQM) protocol and summation (MSQS) can be achieved simultaneously under assistance of two semi-honest quantum third parties (TPs). Here, proposed MSQPC scheme is only which devoted to judging size relationship secret integers from more than participants without a pre-shared key. And MSQM absorbs innovative concept semiquantumness into for first time, calculate modulo inputs users. As MSQS it aims accomplish addition users’ integers. Neither entanglement swapping nor unitary operations are necessary in protocols. The security analysis verifies detail that both external attacks internal resisted
Language: Английский
Citations
12Axioms, Journal Year: 2025, Volume and Issue: 14(2), P. 120 - 120
Published: Feb. 7, 2025
In this paper, we introduce a quantum private set intersection (QPSI) scheme that leverages Bell states as information carriers. Our approach involves encoding sets into using unitary operations, enabling the computation of between two from different users while keeping their individual undisclosed to anyone except for result. our scheme, semi-honest third party (TP) distributes first and second qubits users. Each user encodes by applying operations on received according predefined rules. The modified sequence is encrypted then sent back TP, who can compute without learning any about users’ inputs. simulation outcomes IBM platform substantiate viability scheme. We analyze security privacy aspects sets, showing both external attacks internal threats do not compromise Furthermore, exhibits better practicality utilizing easily implementable rather than relying multiple encoded calculations.
Language: Английский
Citations
1Physica A Statistical Mechanics and its Applications, Journal Year: 2022, Volume and Issue: 611, P. 128424 - 128424
Published: Dec. 30, 2022
Language: Английский
Citations
26Quantum Information Processing, Journal Year: 2022, Volume and Issue: 21(3)
Published: March 1, 2022
Language: Английский
Citations
24Quantum Information Processing, Journal Year: 2023, Volume and Issue: 22(6)
Published: June 24, 2023
Language: Английский
Citations
14