A multi-party quantum privacy comparison method for strangers based on d-level single photons
A single-photon, stranger technique with applications in quantum cryptography
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0134] 1 Application example of multi-party quantum privacy comparison method
[0135] P 1 ,P 2 and P 3 The method of the present invention is illustrated by way of example. Without loss of generality, suppose K=10, k 1 = 1,k 2 = 3,k 3 = 4; and, P 1 ,P 2 and P 3 The secret integers are respectively s 1 = 2, s 2 = 6 and s 3 =4. TP 1 Particle|k i > (i=1,2,3) send to P i , then P i right|k i > perform a unitary operation P i Particles that will encode their own information |k i +s i > send to TP 2 . TP 2 Particles obtained by measurement|k i +s i > status. at TP 1 To TP 2 publish k' 1 , k' 2 and k' 3 after TP 2 to k i +s i and k' i Perform summation to get M i , namely M 1 =12, M 2 = 16 and M 3 =14. Therefore, M 1 3 2 . m i The size relationship with s i The size relationship is equivalent. TP 2 Publish M i The comparison results of the size relationship of P i Just know the size relationship of their respective secret information....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


