Skip to main content
. 2020 Jun 4;10:9097. doi: 10.1038/s41598-020-65871-8

Table 2.

Comparison in terms of Cost, Universality, and Attack.

Protocols Du4 Chen5 Zhang6 Zhang7 Shi8 Shi9 Zhang10 Liu11 Yang12 Jiao13 Proposed
Operation Summ. Summ. Summ. Summ. Summ. Multi. Summ. Summ. Summ. Summ. Summ. Multi. Summ. Multi.
Performance Parameters Costs Comt. QFT 1 1 n 1 1
QFT−1 1 1
Unitary Operation 1 1 n − 1 n − 1 n n t − 1 n − 1
Measure Operation 2 2 n n n n n t t
Com. Message Particle t − 1 t − 1
Decoy Particle n n n n − 1 n n
Univ. Model (n, n) (n, n) (n, n) (n, n) (n, n) (n, n) (n, n) (n, n) (n, n) (n, n) (n, n) (n, n) (t, n) (t, n)
Modulo n + 1 2 2 2 N N 2 2 d N N d d
Qubits log2dn log2dn 2log2dn 2
Type of Computation b-by-b b-by-b b-by-b b-by-b s-by-s s-by-s b-by-b b-by-b b-by-b s-by-s b-by-b b-by-b s-by-s s-by-s
Attacks IR Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Collusion Yes No No Yes Yes Yes Yes
EM Yes Yes Yes Yes Yes Yes Yes Yes Yes
Collective Yes Yes
Coherent Yes Yes