Articles with "malicious third" as a keyword



Photo from archive.org

Statistics attack on ‘quantum private comparison with a malicious third party’ and its improvement

Sign Up to like & get
recommendations!
Published in 2018 at "Quantum Information Processing"

DOI: 10.1007/s11128-017-1788-3

Abstract: Recently, Sun et al. (Quantum Inf Process:14:2125-2133, 2015) proposed a quantum private comparison protocol allowing two participants to compare the equality of their secrets via a malicious third party (TP). They designed an interesting trap… read more here.

Keywords: malicious third; quantum private; private comparison; third party ... See more keywords