To evade the well-known impossibility of unconditionally secure quantum two-party computations, previous quantum private comparison protocols have to adopt a third party. Here, we study how far we can go with two parties only. We propose a very feasible and efficient protocol. Intriguingly, although the average amount of information leaked cannot be made arbitrarily small, we find that this average will not exceed 14 bits for any length of the bit-string being compared.
机构:
Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Peoples R China
Grad Univ Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100049, Peoples R ChinaBeijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
Yang, Yu-Guang
;
Wen, Qiao-Yan
论文数: 0引用数: 0
h-index: 0
机构:
Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R ChinaBeijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
机构:
Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Peoples R China
Grad Univ Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100049, Peoples R ChinaBeijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
Yang, Yu-Guang
;
Wen, Qiao-Yan
论文数: 0引用数: 0
h-index: 0
机构:
Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R ChinaBeijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China