Abstract
To evade the well-known impossibility of unconditionally secure quantum two-party computations, previous quantum private comparison protocols have to ......
小提示:本篇文献需要登录阅读全文,点击跳转登录