{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:20:01Z","timestamp":1759940401106},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2015,8,29]],"date-time":"2015-08-29T00:00:00Z","timestamp":1440806400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s11128-015-1104-z","type":"journal-article","created":{"date-parts":[[2015,8,28]],"date-time":"2015-08-28T06:34:24Z","timestamp":1440743664000},"page":"4225-4235","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Multi-party quantum private comparison with an almost-dishonest third party"],"prefix":"10.1007","volume":"14","author":[{"given":"Sheng-Liang","family":"Huang","sequence":"first","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Prosanta","family":"Gope","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,29]]},"reference":[{"key":"1104_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, pp. 175\u2013179 (1984)"},{"key":"1104_CR2","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"1104_CR3","doi-asserted-by":"crossref","first-page":"2871","DOI":"10.1007\/s11128-013-0569-x","volume":"12","author":"C-W Yang","year":"2013","unstructured":"Yang, C.-W., Kao, S.-H., Hwang, T.: Comment on \u201cEfficient and feasible quantum private comparison of equality against the collective amplitude damping noise\u201d. Quantum Inf. Process. 12, 2871\u20132875 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1104_CR4","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1007\/s11128-012-0433-4","volume":"12","author":"Y-G Yang","year":"2013","unstructured":"Yang, Y.-G., Xia, J., Jia, X., Zhang, H.: Comment on quantum private comparison protocols with a semi-honest third party. Quantum Inf. Process. 12, 877\u2013885 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1104_CR5","doi-asserted-by":"crossref","first-page":"1981","DOI":"10.1007\/s11128-012-0507-3","volume":"12","author":"W-W Zhang","year":"2013","unstructured":"Zhang, W.-W., Zhang, K.-J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12, 1981\u20131990 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1104_CR6","doi-asserted-by":"crossref","first-page":"1350039","DOI":"10.1142\/S0219749913500391","volume":"11","author":"C Wang","year":"2013","unstructured":"Wang, C., Xu, G., Yang, Y.-X.: Cryptanalysis and improvements for the quantum private comparison protocol using EPR pairs. Int. J. Quantum Inf. 11, 1350039 (2013)","journal-title":"Int. J. Quantum Inf."},{"key":"1104_CR7","doi-asserted-by":"crossref","first-page":"065004","DOI":"10.1088\/0031-8949\/87\/06\/065004","volume":"87","author":"X-T Liu","year":"2013","unstructured":"Liu, X.-T., Zhao, J.-J., Wang, J., Tang, C.-J.: Cryptanalysis of the secure quantum private comparison protocol. Phys. Scr. 87, 065004 (2013)","journal-title":"Phys. Scr."},{"key":"1104_CR8","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s11128-012-0505-5","volume":"13","author":"X-B Chen","year":"2012","unstructured":"Chen, X.-B., Su, Y., Niu, X.-X., Yang, Y.-X.: Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf. Process. 13, 101\u2013112 (2012)","journal-title":"Quantum Inf. Process."},{"key":"1104_CR9","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1016\/j.optcom.2009.11.085","volume":"283","author":"X-B Chen","year":"2010","unstructured":"Chen, X.-B., Xu, G., Niu, X.-X., Wen, Q.-Y., Yang, Y.-X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561\u20131565 (2010)","journal-title":"Opt. Commun."},{"key":"1104_CR10","doi-asserted-by":"crossref","first-page":"3160","DOI":"10.1016\/j.optcom.2011.02.017","volume":"284","author":"W Liu","year":"2011","unstructured":"Liu, W., Wang, Y.-B., Jiang, Z.-T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284, 3160\u20133163 (2011)","journal-title":"Opt. Commun."},{"key":"1104_CR11","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1007\/s11128-012-0439-y","volume":"12","author":"B Liu","year":"2012","unstructured":"Liu, B., Gao, F., Jia, H.-Y., Huang, W., Zhang, W.-W., Wen, Q.-Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12, 887\u2013897 (2012)","journal-title":"Quantum Inf. Process."},{"key":"1104_CR12","doi-asserted-by":"crossref","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"Y-G Yang","year":"2009","unstructured":"Yang, Y.-G., Wen, Q.-Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42, 055305 (2009)","journal-title":"J. Phys. A Math. Theor."},{"key":"1104_CR13","doi-asserted-by":"crossref","first-page":"2818","DOI":"10.1007\/s10773-013-1573-8","volume":"52","author":"Y-B Li","year":"2013","unstructured":"Li, Y.-B., Wang, T.-Y., Chen, H.-Y., Li, M.-D., Yang, Y.-T.: Fault-tolerate quantum private comparison based on GHZ states and ECC. Int. J. Theor. Phys. 52, 2818\u20132825 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"1104_CR14","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1140\/epjd\/e2012-30065-9","volume":"66","author":"YB Li","year":"2012","unstructured":"Li, Y.B., Wen, Q.Y., Gao, F., Jia, H.Y., Sun, Y.: Information leak in Liu et al\u2019.s quantum private comparison and a new protocol. Eur. Phys. J. D 66, 110 (2012)","journal-title":"Eur. Phys. J. D"},{"key":"1104_CR15","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s11128-011-0251-0","volume":"11","author":"H-Y Tseng","year":"2011","unstructured":"Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11, 373\u2013384 (2011)","journal-title":"Quantum Inf. Process."},{"key":"1104_CR16","doi-asserted-by":"crossref","first-page":"1250065","DOI":"10.1142\/S0219749912500657","volume":"10","author":"Y-G Yang","year":"2012","unstructured":"Yang, Y.-G., Xia, J., Jia, X.I.N., Shi, L.E.I., Zhang, H.U.A.: New quantum private comparison protocol without entanglement. Int. J. Quantum Inf. 10, 1250065 (2012)","journal-title":"Int. J. Quantum Inf."},{"key":"1104_CR17","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s10773-011-0878-8","volume":"51","author":"W Liu","year":"2011","unstructured":"Liu, W., Wang, Y.-B., Jiang, Z.-T., Cao, Y.-Z.: A protocol for the quantum private comparison of equality with $$\\upchi $$ \u03c7 -type state. Int. J. Theor. Phys. 51, 69\u201377 (2011)","journal-title":"Int. J. Theor. Phys."},{"key":"1104_CR18","first-page":"2191","volume":"12","author":"Y-B Li","year":"2012","unstructured":"Li, Y.-B., Qin, S.-J., Yuan, Z., Huang, W., Sun, Y.: Quantum private comparison against decoherence noise. Quantum Inf. Process. 12, 2191\u20132205 (2012)","journal-title":"Quantum Inf. Process."},{"key":"1104_CR19","doi-asserted-by":"crossref","first-page":"3596","DOI":"10.1007\/s10773-012-1246-z","volume":"51","author":"W Liu","year":"2012","unstructured":"Liu, W., Wang, Y.-B.: Quantum private comparison based on GHZ entangled states. Int. J. Theor. Phys. 51, 3596\u20133604 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"1104_CR20","doi-asserted-by":"crossref","first-page":"3212","DOI":"10.1007\/s10773-013-1616-1","volume":"52","author":"W Zi","year":"2013","unstructured":"Zi, W., Guo, F., Luo, Y., Cao, S., Wen, Q.: Quantum private comparison protocol with the random rotation. Int. J. Theor. Phys. 52, 3212\u20133219 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"1104_CR21","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1016\/j.optcom.2010.09.005","volume":"284","author":"H-Y Jia","year":"2011","unstructured":"Jia, H.-Y., Wen, Q.-Y., Song, T.-T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284, 545\u2013549 (2011)","journal-title":"Opt. Commun."},{"key":"1104_CR22","doi-asserted-by":"crossref","unstructured":"Yao, A.C.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, 1982. SFCS \u201908, pp. 160\u2013164 (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"1104_CR23","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1007\/s11128-012-0454-z","volume":"12","author":"YJ Chang","year":"2013","unstructured":"Chang, Y.J., Tsai, C.W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 12, 1077\u20131088 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1104_CR24","doi-asserted-by":"crossref","first-page":"2241","DOI":"10.1007\/s11128-012-0520-6","volume":"12","author":"W-W Zhang","year":"2012","unstructured":"Zhang, W.-W., Li, D., Zhang, K.-J., Zuo, H.-J.: A quantum protocol for millionaire problem with Bell states. Quantum Inf. Process. 12, 2241\u20132249 (2012)","journal-title":"Quantum Inf. Process."},{"key":"1104_CR25","doi-asserted-by":"crossref","first-page":"065013","DOI":"10.1088\/0031-8949\/88\/06\/065013","volume":"88","author":"C-H Yu","year":"2013","unstructured":"Yu, C.-H., Guo, G.-D., Lin, S.: Quantum private comparison with $$d$$ d -level single-particle states. Phys. Scr. 88, 065013 (2013)","journal-title":"Phys. Scr."},{"key":"1104_CR26","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1007\/s11128-012-0395-6","volume":"12","author":"S Lin","year":"2012","unstructured":"Lin, S., Sun, Y., Liu, X.-F., Yao, Z.-Q.: Quantum private comparison protocol with $$d$$ d -dimensional Bell states. Quantum Inf. Process. 12, 559\u2013568 (2012)","journal-title":"Quantum Inf. Process."},{"key":"1104_CR27","doi-asserted-by":"crossref","first-page":"2793","DOI":"10.1007\/s11128-013-0536-6","volume":"12","author":"F Guo","year":"2013","unstructured":"Guo, F., Gao, F., Qin, S., Zhang, J., Wen, Q.: Quantum private comparison protocol based on entanglement swapping of $$d$$ d -level Bell states. Quantum Inf. Process. 12, 2793\u20132802 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1104_CR28","first-page":"2370","volume":"13","author":"QL Wang","year":"2014","unstructured":"Wang, Q.L., Sun, H.X., Huang, W.: Multi-party quantum private comparison protocol with n-level entangled states. Quantum Inf. Process. 13, 2370\u20132389 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1104_CR29","doi-asserted-by":"crossref","first-page":"2343","DOI":"10.1007\/s11128-014-0805-z","volume":"13","author":"QB Luo","year":"2014","unstructured":"Luo, Q.B., Yang, G.W., She, K., Niu, W.N., Wang, Y.Q.: Multi-party quantum private comparison protocol based on $$d$$ d -dimensional entangled states. Quantum Inf. Process. 13, 2343\u20132352 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1104_CR30","doi-asserted-by":"crossref","first-page":"208901","DOI":"10.1103\/PhysRevLett.101.208901","volume":"101","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.-Z., Wen, Q.-Y., Zhu, F.-C.: Comment on \u201cExperimental demonstration of a quantum protocol for byzantine agreement and liar detection\u201d. Phys. Rev. Lett. 101, 208901 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"1104_CR31","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1088\/0256-307X\/25\/5\/011","volume":"25","author":"F Gao","year":"2008","unstructured":"Gao, F., Lin, S., Wen, Q.-Y., Zhu, F.-C.: A special eavesdropping on one-sender versus N-receiver QSDC protocol. Chin. Phys. Lett. 25, 1561 (2008)","journal-title":"Chin. Phys. Lett."},{"key":"1104_CR32","first-page":"329","volume":"7","author":"F Gao","year":"2007","unstructured":"Gao, F., Qin, S.-J., Wen, Q.-Y., Zhu, F.-C.: A simple participant attack on the Bradler\u2013Dusek protocol. Quantum Info. Comput. 7, 329\u2013334 (2007)","journal-title":"Quantum Info. Comput."},{"key":"1104_CR33","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"Q-Y Cai","year":"2006","unstructured":"Cai, Q.-Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"key":"1104_CR34","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/s11128-012-0413-8","volume":"12","author":"J Lin","year":"2013","unstructured":"Lin, J., Hwang, T.: New circular quantum secret sharing for remote agents. Quantum Inf. Process. 12, 685\u2013697 (2013)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1104-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-015-1104-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1104-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:39:23Z","timestamp":1559374763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-015-1104-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,29]]},"references-count":34,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["1104"],"URL":"https:\/\/doi.org\/10.1007\/s11128-015-1104-z","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,29]]}}}