References
[1] SHI R H, MU Y, ZHONG H, et al. Quantum private set intersection cardinality and its application to anonymous
authentication. Information Sciences, 2016, 370/371: 147 -158.
[2] SHI R H, ZHANG S. Quantum solution to a class of two-party private summation problems. Quantum Information Processing, 2017, 16(9): Article 225.
[3] VAIDYA J, SHAFIQ B, FAN W, et al. A random decision tree framework for privacy-preserving data mining. IEEE Transactions on Dependable and Secure Computing, 2014, 11(5): 399 -411.
[4] FREEDMAN M J, NISSIM K, PINKAS B. Efficient private matching and set intersection. Advances in Cryptology:
Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques
(EUROCRYPT'04), 2004, May 2 -6, Interlaken, Switzerland. LNCS 3027. Berlin, Germany: Springer, 2004: 1 -19.
[5] DE CRISTOFARO E, GASTI P, TSUDIK G. Fast and private computation of cardinality of set intersection and union. Cryptology and Network Security: Proceedings of the 11th International Conference on Cryptology and Network Security (CANS'12), 2012, Dec 12 -14, Darmstadt, Germany. LNSC 7712. Berlin, Germany: Springer, 2012: 218 -231.
[6] KISSNER L, SONG D. Privacy-preserving set operations. Advances in Cryptology: Proceedings of the 25th Annual
International Cryptology Conference (CRYPTO'05), 2005, Aug 14 -18, Santa Barbara, CA, USA. LNSC 3621. Berlin,
Germany: Springer, 2005: 241 -257.
[7] VAIDYA J, CLIFTON C. Secure set intersection cardinality with application to association rule mining. Journal of Computer Security, 2005, 13(4): 593 -622.
[8] DONG C Y, LOUKIDES G. Approximating private set union intersection cardinality with logarithmic complexity. IEEE
Transactions on Information Forensics and Security, 2017, 12(11): 2792 -2806.
[9] DEBNATH S K, STANICA P, KUNDU N, et al. Secure and efficient multiparty private set intersection cardinality. Advances in Mathematics of Communications, 2021, 15(2): 365 -386.
[10] SHOR P W. Algorithms for quantum computation: Discrete logarithms and factoring. Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, 1994, Nov 20 -22, Santa Fe, NM, USA. Piscataway, NJ, USA: IEEE, 1994: 124 -134.
[11] GROVER L K. A fast quantum mechanical algorithm for database search. Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC'96), 1996, May 22 -24, Philadelphia, PA, USA. New York, NY, USA: ACM, 1996: 212 -219.
[12] SHI R H. Quantum private computation of cardinality of set intersection and union. European Physical Journal D, 2019, 72(12): Article 221.
[13] SHI R H, ZHANG M W. A feasible quantum protocol for private set intersection cardinality. IEEE Access, 2019(7): 72105 -72112.
[14] ZHANG C, LONG Y X, SUN Z W, et al. Three-party quantum private computation of cardinalities of set intersection and union based on GHZ states. Scientific Reports, 2020, 10(1): Article 22246.
[15] WANG Y L, HU P C, XU Q L. Quantum protocols for private set intersection cardinality and union cardinality based on entanglement swapping. International Journal of Theoretical Physics, 2021, 60(9): 3514 -3528.
[16] LIU B, ZHANG M W, SHI R H. Quantum secure multi-party private set intersection cardinality. International Journal of Theoretical Physics, 2020, 59(7): 1992 -2007.
[17] LIU B, RUAN O, SHI R H, et al. Quantum private set intersection cardinality based on bloom filter. Scientific Reports, 2021, 11(1): Article 17332.
[18] SHI R H, LI Y F. Quantum private set intersection cardinality protocol with application to privacy-preserving condition query. IEEE Transactions on Circuits and Systems I: Regular Papers, 2022, 69(6): 2399 -2411.
[19] BOYER M, KENIGSBERG D, MOR T. Quantum key distribution with classical Bob. Physical Review Letters, 2007,
99(14): Article 140501.
[20] BOYER M, GELLES R, KENIGSBERG D, et al. Semi-quantum key distribution. Physical Review A, 2009, 79(3): Article
32341.
[21] ZHOU R G, ZHANG X X, LI F X. Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states. Quantum Information Processing, 2021, 20(4): Article 153.
[22] XU L C, CHEN H Y, ZHOU N R, et al. Multi-party semi-quantum secure direct communication protocol with cluster states. International Journal of Theoretical Physics, 2020, 59(7): 2175 -2186.
[23] YU K F, GU J, HWANG T, et al. Multi-party semi-quantum key distribution-convertible multiparty semi-quantum secret sharing. Quantum Information Processing, 2017, 16(8): Article 194.
[24] CABELLO A. Quantum key distribution in the Holevo limit. Physical Review Letters, 2000, 85(26): 5635 -5638.
|