{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T07:22:29Z","timestamp":1768548149907,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,11,9]],"date-time":"2013-11-09T00:00:00Z","timestamp":1383955200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s11128-013-0674-x","type":"journal-article","created":{"date-parts":[[2013,11,8]],"date-time":"2013-11-08T10:59:32Z","timestamp":1383908372000},"page":"573-585","source":"Crossref","is-referenced-by-count":3,"title":["Comment on \u201cefficient and feasible quantum private comparison of equality against the collective amplitude damping noise\u201d"],"prefix":"10.1007","volume":"13","author":[{"given":"Yi-Hua","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yu-Guang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,9]]},"reference":[{"key":"674_CR1","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/229459.229469","volume":"39","author":"R Fagin","year":"1996","unstructured":"Fagin, R., Naor, M., Winkler, P.: Comparing information without leaking it. Commun ACM 39, 77\u201385 (1996)","journal-title":"Commun ACM"},{"key":"674_CR2","doi-asserted-by":"crossref","unstructured":"Cachin C (1999) Efficient private bidding and auctions with an oblivious third party. In: Proceedings of the 6th ACM conference on computer and communications, security, pp 120\u2013127","DOI":"10.1145\/319709.319726"},{"key":"674_CR3","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/S0166-218X(00)00342-5","volume":"111","author":"B Fabrice","year":"2001","unstructured":"Fabrice, B., Berry, S., et al.: A fair and efficient solution to the socialist millionaires\u2019 problem. Discret Appl Math 111, 23\u201336 (2001)","journal-title":"Discret Appl Math"},{"key":"674_CR4","first-page":"421","volume":"15","author":"J Qin","year":"2004","unstructured":"Qin, J., Zhang, Z.F., Feng, D.G., Li, B.: A protocol of comparing information without leaking. J Softw 15, 421\u2013427 (2004)","journal-title":"J Softw"},{"key":"674_CR5","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau C, Gottesman D, Smith A (2002) Secure multi-party quantum computation. In: Proceedings of the 34th annual ACM symposium on theory of computing, pp 643\u2013652. ACM, New York","DOI":"10.1145\/509907.510000"},{"key":"674_CR6","doi-asserted-by":"crossref","unstructured":"Ben-Or M, Cr\u00e9peau C, Gottesman D, Hassidim A, Smith A. (2006) Secure multiparty quantum computation with (only) a strict honest majority. In: Proceedings of 47th annual IEEE symposium on the foundations of computer science. IEEE, Los Alamitos, pp 249\u2013260","DOI":"10.1109\/FOCS.2006.68"},{"key":"674_CR7","doi-asserted-by":"crossref","unstructured":"Yao AC (1982) Protocols, for secure computations. In Proceedings of 23rd IEEE symposium on foundations of computer science (FOCS\u2019 82). IEEE computer society, Washington","DOI":"10.1109\/SFCS.1982.38"},{"key":"674_CR8","doi-asserted-by":"crossref","unstructured":"Yao ACC (1986) How to generate and exchange secrets. In: IEEE 27th annual symposium on foundations of computer science (FOCS 1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"674_CR9","doi-asserted-by":"crossref","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J Phys A Math Theory 42, 055305 (2009)","journal-title":"J Phys A Math Theory"},{"key":"674_CR10","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1016\/j.optcom.2009.11.085","volume":"283","author":"XB Chen","year":"2010","unstructured":"Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt Commun 283, 1561\u20131565 (2010)","journal-title":"Opt Commun"},{"key":"674_CR11","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1016\/j.optcom.2010.11.072","volume":"284","author":"W Liu","year":"2011","unstructured":"Liu, W., Wang, Y.B., Tao, J.Z.: An efficient protocol for the quantum private comparison of equality with W state. Opt Commun 284, 1561\u20131565 (2011)","journal-title":"Opt Commun"},{"issue":"2","key":"674_CR12","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s11128-011-0251-0","volume":"11","author":"H-Y Tseng","year":"2012","unstructured":"Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf Process 11(2), 373\u2013384 (2012)","journal-title":"Quantum Inf Process"},{"key":"674_CR13","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s10773-011-0878-8","volume":"51","author":"W Liu","year":"2012","unstructured":"Liu, W., Wang, Y.B., Tao, J.Z., Cao, Y.Z.: A protocol for the quantum private comparison of equality with $$\\chi $$ \u03c7 -type state. Int J Theory Phys 51, 69\u201377 (2012)","journal-title":"Int J Theory Phys"},{"issue":"1\u20132","key":"674_CR14","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/S0166-218X(00)00342-5","volume":"111","author":"F Boudot","year":"2001","unstructured":"Boudot, F., Schoenmakers, B., Traor\u2019e, J.: A fair and efficient solution to the socialist millionaires\u2019problem. Discret Appl Math (Special Issue on Coding and Cryptology) 111(1\u20132), 23\u201336 (2001)","journal-title":"Discret Appl Math (Special Issue on Coding and Cryptology)"},{"issue":"2","key":"674_CR15","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1103\/PhysRevA.56.1154","volume":"56","author":"HK Lo","year":"1997","unstructured":"Lo, H.K.: Insecurity of quantum secure computations. Phys Rev A 56(2), 1154\u20131162 (1997)","journal-title":"Phys Rev A"},{"issue":"6","key":"674_CR16","doi-asserted-by":"crossref","first-page":"065002","DOI":"10.1088\/0031-8949\/80\/06\/065002","volume":"80","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Cao, W.F., Wen, Q.Y.: Secure quantum private comparison. Phys Scr 80(6), 065002 (2009)","journal-title":"Phys Scr"},{"issue":"6","key":"674_CR17","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.1007\/s10773-011-1073-7","volume":"51","author":"W Liu","year":"2012","unstructured":"Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z., Cui, W.: New quantum private comparison protocol using $$\\chi $$ \u03c7 -type state. Int J Theory Phys 51(6), 1953\u20131960 (2012)","journal-title":"Int J Theory Phys"},{"issue":"4","key":"674_CR18","doi-asserted-by":"crossref","first-page":"1187","DOI":"10.1007\/s10773-011-0994-5","volume":"51","author":"HY Jia","year":"2012","unstructured":"Jia, H.Y., Wen, Q.Y., Li, Y.B., Gao, F.: Quantum private comparison using genuine four-particle entangled states. Int J Theory Phys 51(4), 1187\u20131194 (2012)","journal-title":"Int J Theory Phys"},{"key":"674_CR19","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1016\/j.optcom.2010.09.005","volume":"284","author":"HY Jia","year":"2011","unstructured":"Jia, H.Y., Wen, Q.Y., Song, T.T., Gao, F.: Quantum protocol for millionaire problem. Opt Commun 284, 545\u2013549 (2011)","journal-title":"Opt Commun"},{"key":"674_CR20","doi-asserted-by":"crossref","unstructured":"Sun, Z.W., Long, D.Y.: Quantum private comparison protocol based on cluster states. Int J Theor Phys 52(1), 212\u2013218 (2013). doi: 10.1007\/s10773-012-1321-5","DOI":"10.1007\/s10773-012-1321-5"},{"key":"674_CR21","doi-asserted-by":"crossref","unstructured":"Chang, Y.J., Tsai, C.W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf Process 12(2), 1077\u20131088 (2013). doi: 10.1007\/s11128-012-0454-z","DOI":"10.1007\/s11128-012-0454-z"},{"key":"674_CR22","doi-asserted-by":"crossref","unstructured":"Yang, Y.G., Xia, J., Jia, X., et al.: New quantum private comparison protocol without entanglement. Int J Quantum Inf 6(10), 1250065 (2012)","DOI":"10.1142\/S0219749912500657"},{"key":"674_CR23","doi-asserted-by":"crossref","unstructured":"Chen XB, Su Y, Niu X-X, Yang Y-X (2012) Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf Process. doi: 10.1007\/s11128-012-0505-5","DOI":"10.1007\/s11128-012-0505-5"},{"key":"674_CR24","doi-asserted-by":"crossref","first-page":"032337","DOI":"10.1103\/PhysRevA.77.032337","volume":"77","author":"L Li","year":"2008","unstructured":"Li, L., Qiu, D.: Local entanglement is not necessary for perfect discrimination between unitary operations acting on two qudits by local operations and classical communication. Phys Rev A 77, 032337 (2008)","journal-title":"Phys Rev A"},{"key":"674_CR25","doi-asserted-by":"crossref","first-page":"042325","DOI":"10.1103\/PhysRevA.82.042325","volume":"82","author":"X Zou","year":"2010","unstructured":"Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys Rev A 82, 042325 (2010)","journal-title":"Phys Rev A"},{"key":"674_CR26","doi-asserted-by":"crossref","first-page":"3382","DOI":"10.1016\/j.optcom.2009.05.036","volume":"282","author":"TY Wang","year":"2009","unstructured":"Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with decoherence-free states. Opt Commun 282, 3382\u20133385 (2009)","journal-title":"Opt Commun"},{"issue":"9","key":"674_CR27","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1007\/s11433-011-4432-8","volume":"54","author":"YG Yang","year":"2011","unstructured":"Yang, Y.G., Chai, H.P., Wang, Y., et al.: Fault tolerant quantum secret sharing against collective-amplitude-dampling noise. Sci China Phys Mech Astron 54(9), 1619\u20131624 (2011)","journal-title":"Sci China Phys Mech Astron"},{"key":"674_CR28","unstructured":"Bennett CH, Brassard G (1984) Quantum cryptography: public-key distribution and coin tossing. In: IEEE international conference on computers, systems and signal processing. New York, Bangalore, India, pp 175\u2013179"},{"key":"674_CR29","doi-asserted-by":"crossref","first-page":"10504","DOI":"10.1103\/PhysRevLett.98.010504","volume":"98","author":"T Schmitt-Manderbach","year":"2007","unstructured":"Schmitt-Manderbach, T., Weier, H., F\u00fcrst, M., Ursin, R., Tiefenbacher, F., Scheidl, T., Perdigues, J., Sodnik, Z., Kurtsiefer, C., Rarity, J.G.: Experimental demonstration of free-space decoy-state quantum key distribution over 144 km. Phys Rev Lett 98, 10504 (2007)","journal-title":"Phys Rev Lett"},{"key":"674_CR30","doi-asserted-by":"crossref","unstructured":"Yang YG, Xia J, Jia X, Zhang H (2012) Comment on quantum private comparison protocols with a semi-honest third party. Quantum Inf Process. doi: 10.1007\/s11128-012-0433-4","DOI":"10.1007\/s11128-012-0433-4"},{"key":"674_CR31","first-page":"329","volume":"7","author":"F Gao","year":"2007","unstructured":"Gao, F., Qin, S., Wen, Q., Zhu, F.: A simple participant attack on the Bradler-Dusek protocol. Quantum Inf Comput 7, 329\u2013334 (2007)","journal-title":"Quantum Inf Comput"},{"key":"674_CR32","first-page":"0323021","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys Rev A 65, 0323021 (2002)","journal-title":"Phys Rev A"},{"issue":"2","key":"674_CR33","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1088\/1464-4266\/5\/2\/306","volume":"5","author":"C Li","year":"2003","unstructured":"Li, C., Song, H.S., Zhou, L., Wu, C.F.: A random quantum key distribution achieved by using Bell states.J Opt B Quantum Semiclass Opt 5(2), 155\u2013157 (2003)","journal-title":".J Opt B Quantum Semiclass Opt"},{"issue":"3","key":"674_CR34","doi-asserted-by":"crossref","first-page":"034301","DOI":"10.1103\/PhysRevA.69.034301","volume":"69","author":"D Song","year":"2004","unstructured":"Song, D.: Secure key distribution by swapping quantum entanglement. Phys Rev A 69(3), 034301 (2004)","journal-title":"Phys Rev A"},{"key":"674_CR35","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.74.032302","volume":"74","author":"R Namiki","year":"2006","unstructured":"Namiki, R., Hirono, T.: Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection. Phys Rev A 74, 032302 (2006)","journal-title":"Phys Rev A"},{"key":"674_CR36","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1049\/iet-ifs:20060124","volume":"1","author":"T Hwang","year":"2007","unstructured":"Hwang, T., Lee, K.C.: EPR quantum key distribution protocols with potential 100\u00a0% qubit efficiency. IET Proc Inf Secur 1, 43\u201345 (2007)","journal-title":"IET Proc Inf Secur"},{"issue":"5","key":"674_CR37","doi-asserted-by":"crossref","first-page":"820","DOI":"10.1088\/0253-6102\/51\/5\/12","volume":"51","author":"G Gan","year":"2009","unstructured":"Gan, G.: Quantum key distribution scheme with high efficiency. Commun Theory Phys 51(5), 820\u2013822 (2009)","journal-title":"Commun Theory Phys"},{"key":"674_CR38","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1142\/S0219749908004195","volume":"6","author":"XB Chen","year":"2008","unstructured":"Chen, X.B., Wen, Q.Y., Guo, F.Z., Sun, Y., Xu, G., Zhu, F.C.: Controlled quantum secure direct communication with w state. Int J Quantum Inf 6, 899\u2013906 (2008)","journal-title":"Int J Quantum Inf"},{"key":"674_CR39","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)","journal-title":"Science"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0674-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-013-0674-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0674-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T05:53:29Z","timestamp":1564638809000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-013-0674-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,9]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["674"],"URL":"https:\/\/doi.org\/10.1007\/s11128-013-0674-x","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,9]]}}}