[1] Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography [J]. Reviews of Modern Physics, 2002, 74(1): 145-195.
[2] Wang S, He D Y, Yin Z Q, et al. Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system [J]. Physical Review X, 2019, 9: 021046.
[3] Qian Y J, He D Y, Wang S, et al. Robust countermeasure against detector control attack in a practical quantum key distribution system [J]. Optica, 2019, (9): 1178-1184.
[4] Wang S, Yin Z Q, Chen W, et al. Experimental demonstration of a quantum key distribution without signal disturbance monitoring [J]. Nature Photonics, 2015, 9(12): 832-836.
[5] Wang S, Chen W, Yin Z Q, et al. Practical gigahertz quantum key distribution robust against channel disturbance [J]. Optics Letters, 2018, 43(9): 2030-2033.
[6] An X B, Zhang H, Zhang C M, et al. Practical quantum digital signature with a gigahertz BB84 quantum key distribution system [J]. Optics Letters, 2019, 44: 139.
[7] Owari M, Kato G, Hayashi M. Single-shot secure quantum network coding on butterfly network with free public communication [J]. Quantum Science and Technology, 2018, 3(1): 014001.
[8] Yao A C. Protocols for secure computations [C]. rd Annual Symposium on Foundations of Computer Science, 1982: 160-164.
[9] Yang Y G, Wen Q Y. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement [J]. Journal of Physics A: Mathematical and Theoretical, 2009, 42(5): 055305.
[10] Lin S, Sun Y, Liu X F, et al. Quantum private comparison protocol with d-dimensional Bell states [J]. Quantum Information Processing, 2013, 12(1): 559-568.
[11] Xu L, Zhao Z W. Quantum private comparison protocol based on the entanglement swapping between χ+ state and W-Class state [J]. Quantum Information Processing, 2017, 1(12): 302.
[12] Lin P H, Hwang T, Tsai C W. Efficient semi-quantum private comparison using single photons [J]. Quantum Information Processing, 2019, 18(7): 207.
[13] Ji Z X, Fan P R, Zhang H G, et al. Several two-party protocols for quantum private comparison using entanglement and dense coding [J]. Optics Communications, 2020, 459: 124911.
[14] Jakobi M, Simon C, Gisin N, et al. Practical private database queries based on a quantum-key-distribution protocol [J]. Physical Review A, 2011, 83(2): 022301.
[15] Liu B, Gao F, Huang W, et al. QKD-based quantum private query without a failure probability [J]. Science China Physics, Mechanics & Astronomy, 2015, 58(10): 100301.
[16] Gao F, Qin S J, Huang W, Wen Q Y. Quantum private query: A new kind of practical quantum cryptographic protocol [J]. Science China Physics, Mechanics & Astronomy, 2019, 62(7): 070301.
[17] Wei C Y, Cai X Q, Wang T Y, et al. Error tolerance bound in QKD-based quantum private query [J]. IEEE Journal on Selected Areas in Communications, 2020, 38(3): 517-527.
[18] Vaccaro J A, Spring J, Chefles A. Quantum protocols for anonymous voting and surveying [J]. Physical Review A, 2007, 75: 012333.
[19] Du J Z, Chen X B, Wen Q Y, et al. Secure multiparty quantum summation [J]. Acta Physica Sinica, 2007, 5(11): 6214-6219.
[20] Liu W, Wang Y B, Fan W Q. An novel protocol for the quantum secure multi-party summation based on two-particle Bell states [J]. International Journal of Theoretical Physics, 2017, 5(9): 2783-2791.
[21] Yang H Y, Ye T Y. Secure multi-party quantum summation based on quantum Fourier transform [J]. Quantum Information Processing, 2018, 17(6): 129.
[22] Zhang C, Razavi M, Sun Z W, et al. Multi-party quantum summation based on quantum teleportation [J]. Entropy, 2019, 21(7): 719.
[23] Ji Z X, Zhang H G, Wang H Z, et al. Quantum protocols for secure multi-party summation [J]. Quantum Information Processing, 2019, 18(6): 168.
[24] Weng P F, Chen H, Cai X X. Quantum secure direct communication scheme based on d dimensional Bell entangled state [J]. Chinese Journal of Quantum Electronics, 2017, 34(5): 603-607.
[26] Deng F G, Li X H, Zhou H Y, et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack [J]. Physical Review A, 2005, 72: 044302.
[27] Li X H, Deng F G, Zhou H Y. Improving the security of secure direct communication based on the secret transmitting order of particles [J]. Physical Review A, 2006, 74(5): 054302.