We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to...We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to set a flag to judge the comparing result,which improves the qubit efficiency and the maximum quantity of the participants’secret messages.Besides,our protocol can judge the size of the secret messages,not only equality.Furthermore,the quantum walks particle is disentangled in the initial state.It only requires a quantum walks operator to move,making our proposed protocol easy to implement and reducing the quantum resources.Through security analysis,we prove that our protocol can withstand well-known attacks and brute-force attacks.Analyses also reveal that our protocol is correct and practical.展开更多
基金Project supported by the National Key R&D Program of China(Grant No.2020YFB1805405)the 111 Project(Grant No.B21049)+1 种基金the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2019BDKFJJ014)the Fundamental Research Funds for the Central Universities,China(Grant No.2020RC38)。
文摘We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks.With the help of one direction quantum walk,we develop a novel method that allows the semi-honest third party to set a flag to judge the comparing result,which improves the qubit efficiency and the maximum quantity of the participants’secret messages.Besides,our protocol can judge the size of the secret messages,not only equality.Furthermore,the quantum walks particle is disentangled in the initial state.It only requires a quantum walks operator to move,making our proposed protocol easy to implement and reducing the quantum resources.Through security analysis,we prove that our protocol can withstand well-known attacks and brute-force attacks.Analyses also reveal that our protocol is correct and practical.