Multi-party semi-quantum private comparison protocol of size relation based on d-dimensional single-particle states
Li‐Hua Gong,
No information about this author
Yanyan Liu,
No information about this author
Jie‐Hui Huang
No information about this author
et al.
Chinese Journal of Physics,
Journal Year:
2025,
Volume and Issue:
unknown
Published: Feb. 1, 2025
Semi-Quantum Dialogue with d-Dimensional Single Particles
International Journal of Theoretical Physics,
Journal Year:
2025,
Volume and Issue:
64(5)
Published: May 6, 2025
Language: Английский
Reflecting attack and improvement of a semi-quantum private comparison protocol with three-particle GHZ-like states
Modern Physics Letters A,
Journal Year:
2024,
Volume and Issue:
unknown
Published: Nov. 23, 2024
This
study
focuses
on
semi-quantum
private
comparison
(SQPC)
protocols,
where
participants
with
limited
quantum
capabilities
compare
information
the
help
of
a
third
party
(TP).
Yan
et
al.
introduced
an
SQPC
protocol
in
2021,
but
Li
later
found
it
vulnerable
to
double
controlled
NOT
(CNOT)
operation
attacks
and
proposed
improvements.
However,
this
identifies
different
vulnerability
al.’s
—
reflecting
attack
that
allows
leakage.
Bob
can
intercept
reflect
states,
avoiding
detection
then
use
Alice’s
measurement
outcomes
pre-shared
key
access
her
confidential
information.
The
also
proposes
enhanced
method
secure
protocol.
Language: Английский
Semi‐Quantum Signature Protocol Using EPR Steering and Single Photons
Annalen der Physik,
Journal Year:
2024,
Volume and Issue:
unknown
Published: Oct. 29, 2024
Abstract
This
study
tackles
critical
issues
in
semi‐quantum
signature
(SQS)
protocols
to
enhance
security
and
efficiency.
It
revisits
Xia
et
al.’s
SQS
protocol,
which
uses
EPR
steering
for
but
introduces
inconsistencies
a
environment.
al.
assume
that
both
the
signatory
arbitrator
have
full
quantum
capabilities,
while
verifier
only
has
partial
making
them
classical
participant.
However,
their
protocol
requires
perform
eavesdropping
checks,
necessitating
storage,
is
not
aligned
with
The
proposes
novel
using
single
photons,
pre‐shared
keys
determine
photon
arrangements
address
this.
ensures
communicating
parties
know
inspection
message
transmission
locations,
solving
storage
issue
enabling
efficient
eavesdropper
detection
identity
authentication.
new
adheres
principles
sets
foundation
future
advancements
cryptography
secure
communication.
Language: Английский