Method for attacking Fourier transform quantum secret sharing systems

A Fourier transform and quantum secret technology, which is used in the field of attacks on Fourier transform quantum secret sharing systems, and can solve problems such as lack of security testing methods

Inactive Publication Date: 2010-12-29
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the Fourier transform QSS scheme was just proposed in 2009, there is still a lack of security testing methods for this system, and further research and analysis are needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for attacking Fourier transform quantum secret sharing systems
  • Method for attacking Fourier transform quantum secret sharing systems
  • Method for attacking Fourier transform quantum secret sharing systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] In order to express the purpose and technical solution of the present invention more clearly, further detailed description will be given below in conjunction with the accompanying drawings and specific implementation methods.

[0071] The invention provides an attack method on the Fourier transform quantum secret sharing system. This method allows agent Alice to obtain m bits of a 3m-bit secret message by single-event measurement alone, or enables agent Alice and Bob to cooperate to obtain 2m bits of a secret message. In this way, a dishonest agent can obtain part of the secret message, and will not introduce any disturbance to the quantum state, which will not be discovered by the distributor. This attack method is simple and effective, and it can be used as a security testing method for this kind of QSS system.

[0072] Still taking the (3,3) Fourier transform QSS system as an example, the attack method of the present invention will be introduced respectively in two ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for attacking Fourier transform quantum secret sharing systems, and relates to quantum secret communication technology. In the method, a specific measurement base is utilized to perform single particle measurement on the information carrier quantum bit, and partial secret messages are acquired according to a measurement result. According to the quantum-mechanical nature, due to the selection of the measurement base, the state of the measured quantum bit is just the eigen state of the measurement base, and the quantum state after measurement cannot be changed at all. The method can make a dishonest agent independently obtain partial key information, also can make several cooperated agents obtain more key information, and cannot introduce any error for normal communication so as not to be discovered by other users. The invention provides a method for effectively attacking the Fourier transform quantum secret sharing systems, which is simultaneously an effective method for testing the safety of the Fourier transform quantum secret sharing systems.

Description

technical field [0001] The invention relates to a quantum secret communication technology, in particular to an attack method on a Fourier transform quantum secret sharing system. Background technique [0002] With the advent of the information age, people's communication is becoming more and more convenient, and the information that needs to be exchanged is also increasing day by day. At the same time, for some sensitive information, people often need to encrypt it before transmission to prevent it from being read by illegal users. In recent years, cryptography research has been developing and growing, and its basic purpose is to ensure that messages between users can be reliably transmitted in open channels. [0003] We know that the security of most classical cryptographic protocols is based on computational complexity. That is to say, if an eavesdropper wants to decipher a cryptographic system, he needs to solve a certain computational problem within a limited time (tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04K1/00
Inventor 高飞张华宋婷婷秦素娟温巧燕
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products