Quantum private comparison with a malicious third party

@article{Sun2015QuantumPC,
  title={Quantum private comparison with a malicious third party},
  author={Zhiwei Sun and Jianping Yu and Ping Wang and Lingling Xu and Chun-Hui Wu},
  journal={Quantum Information Processing},
  year={2015},
  volume={14},
  pages={2125-2133}
}
In this paper, we will show that quantum private comparison protocol is secure when a malicious third party is presented. The security of the protocol is considered in a cheat-sensitive model, in which the TP is kept honest by the possibility of being caught cheating. Besides, we enhance the privacy of the quantum private comparison protocol, where the… CONTINUE READING

1 Figure or Table

Topics