Comment on “flexible protocol for quantum private query based on B92 protocol”

2017 ◽  
Vol 16 (3) ◽  
Author(s):  
Yan Chang ◽  
Shi-Bin Zhang ◽  
Jing-Min Zhu
2013 ◽  
Vol 13 (3) ◽  
pp. 805-813 ◽  
Author(s):  
Yu-Guang Yang ◽  
Si-Jia Sun ◽  
Peng Xu ◽  
Ju Tian

2018 ◽  
Vol 69 (1) ◽  
pp. 31
Author(s):  
Yi-Hua Zhou ◽  
Xue-Wei Bai ◽  
Lei-Lei Li ◽  
Wei-Min Shi ◽  
Yu-Guang Yang

2018 ◽  
Vol 18 (13&14) ◽  
pp. 1125-1142
Author(s):  
Arpita Maitra ◽  
Bibhas Adhikari ◽  
Satyabrata Adhikari

Recently, dimensionality testing of a quantum state has received extensive attention (Ac{\'i}n et al. Phys. Rev. Letts. 2006, Scarani et al. Phys. Rev. Letts. 2006). Security proofs of existing quantum information processing protocols rely on the assumption about the dimension of quantum states in which logical bits are encoded. However, removing such assumption may cause security loophole. In the present paper, we show that this is indeed the case. We choose two players' quantum private query protocol by Yang et al. (Quant. Inf. Process. 2014) as an example and show how one player can gain an unfair advantage by changing the dimension of subsystem of a shared quantum system. To resist such attack we propose dimensionality testing in a different way. Our proposal is based on CHSH like game. As we exploit CHSH like game, it can be used to test if the states are product states for which the protocol becomes completely vulnerable.


2019 ◽  
Vol 58 (6) ◽  
pp. 1828-1835
Author(s):  
Ying Wang ◽  
Fen-Zhuo Guo ◽  
Li Liu ◽  
Wei Huang ◽  
Qiao-Yan Wen

2020 ◽  
Vol 807 ◽  
pp. 330-340 ◽  
Author(s):  
Fang Yu ◽  
Daowen Qiu ◽  
Xiaoming Wang ◽  
Qin Li ◽  
Lvzhou Li ◽  
...  

2020 ◽  
Author(s):  
N. Ali ◽  
N. A. N. Mat Radzi ◽  
S. A. Aljunid ◽  
R. Endut

2019 ◽  
Vol 58 (7) ◽  
pp. 2069-2080 ◽  
Author(s):  
Yan Chang ◽  
Shi-Bin Zhang ◽  
Guo-gen Wan ◽  
Li-Li Yan ◽  
Yan Zhang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document