[1] Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography [J]. Rev. Mod. Phys., 2002, 74: 145.[2] Yao A C. Protocols for secure computations. Foundations of Computer Science [C]. In: 23rd Annual Symposium on. IEEE, 1982, pp: 160-164.[3] Yang Y G, Wen Q Y. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement [J]. J. Phys. A: Math. Theor., 2009, 42: 055305.[4] Lin S, Sun Y, Liu X F, Yao Z Q. Quantum private comparison protocol with d-dimensional Bell states [J]. Quantum Inf. Process., 2013, 12: 559–568.[5] Xu L, Zhao Z. Quantum private comparison protocol based on the entanglement swapping between, chi+ state and W-Class state [J]. Quantum Inf. Process., 2017, 16: 302.[6] Lin P H, Hwang T, Tsai C W. Efficient semi-quantum private comparison using single photons [J]. Quantum Inf. Process., 2019, 18: 207.[7] Ji Z X, Fan P R, Zhang H G, et al. Several two-party protocols for quantum private comparison using entanglement and dense coding [J]. Opt. Comm., 2020, 459: 124911.[8] Jakobi M, Simon C, Gisin N, Bancal J D, Branciard C, Walenta N, Zbinden H. Practical private database queries based on a quantum-key-distribution protocol [J]. Phys. Rev. A, 2011, 83: 022301.[9] Liu B, Gao F, Huang W, Wen Q Y. QKD-Based quantum private query without a failure probability [J]. Sci. China-Phys. Mech. Astron., 2015, 58: 100301.[10] Gao F, Qin S J, Huang W, Wen Q Y. Quantum private query: a new kind of practical quantum cryptographic protocols [J]. Sci. China-Phys. Mech. Astron., 2019, 62: 070301.[11] Wei C Y, Cai X Q, Wang T Y, et al. Error Tolerance Bound in QKD-based Quantum Private Query [J]. IEEE J. Sel. Area. Comm., 2020, 38: 517-527.[12] Vaccaro J A, Spring J, Cheflfles A. Quantum protocols for anonymous voting and surveying [J]. Phys. Rev. A, 2007, 75: 012333.[13] Du J Z, Chen X B, Wen Q Y, et al. Secure multiparty quantum summation [J]. Acta Physica Sinica (物理学报), 2007, 11: 6214-6219 (in Chinese).[14] Liu W, Wang Y B, Fan W Q. An Novel Protocol for the Quantum Secure Multi-Party Summation Based on Two-Particle Bell States [J]. Int. J. Theor. Phys., 2017, 56: 1-9.[15] Yang H Y, Ye T Y. Secure multi-party quantum summation based on quantum Fourier transform [J]. Quantum Inf. Process., 2018, 17: 1-17.[16] Zhang C, Razavi M, Sun Z, et al. Multi-Party Quantum Summation Based on Quantum Teleportation [J]. Entrp., 2019, 21: 719.[17] Ji Z X, Zhang H G, Wang H Z, Wu F S, Jia J W, Wu W Q. Quantum protocols for secure multi-party summation [J]. Quantum Inf. Process., 2019, 18: 168.[18] Weng P F, Chen H, Cai X X. Quantum secure direct communication scheme based on d dimensional Bell entangled state [J]. Chinese Journal of Quantum Electronics (量子电子学报), 34: 603-607 (in Chinese).[19] Lou X P, Tang W S, Ma H. A dual weak blind signature based on quantum entanglement swapping [J]. Chinese Journal of Quantum Electronics (量子电子学报), 2019 36: 48-55 (in Chinese).[20] Deng F G, Li X H, Zhou H Y, Zhang Z J. Improving the security of multiparty quantum secret sharing against Trojan horse attack [J]. Phys. Rev. A, 2005, 72: 044302.[21] Li X H, Deng F G, Zhou H Y. Improving the security of secure direct communication based on the secret transmitting order of particles [J]. Phys. Rev. A, 2006, 74: 054302. |