Two-party quantum private comparison method based on five-quantum bit entangled state

An entangled state, five quantum technology, applied in the field of quantum cryptography, to achieve the effect of security performance guarantee

Active Publication Date: 2016-08-17
浙江康奥思信息技术有限公司
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0069] The purpose of the present invention is to design a two-party quantum privacy comparison method based on five-qubit entangled states to solve the equality comparison problem of two user secrets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-party quantum private comparison method based on five-quantum bit entangled state
  • Two-party quantum private comparison method based on five-quantum bit entangled state
  • Two-party quantum private comparison method based on five-quantum bit entangled state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0125] 1. Application examples of two-party quantum privacy comparison methods

[0126] here to with The method of the present invention is illustrated by way of example. Without loss of generality, suppose The ith five-qubit entangled state |Θ> prepared by TP is denoted as TP will particle with Send to Alice, particle with Send it to Bob. Then, Alice (Bob) on the particle with ( with ) to apply the Z base (Bell base) measurement to obtain the measurement result Without loss of generality, suppose for |00>(|Φ + >), then is 00. Then, Alice(Bob) calculates get Finally, Alice (Bob) announces to TP After hearing the announcement from Alice and Bob, TP reacts to the particle Apply Z base measurement to get the measurement result because at this time is |0>, then is 00. Then, TP calculates get and announce R to Alice and Bob i . Upon receipt of R from TP i After that, both Alice and Bob calculate get Once they found R i′ ≠0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-party quantum private comparison method based on a five-quantum bit entangled state. The two-party quantum private comparison method is used for comparing whether secrets of two users are equal or not in size. The two-party quantum private comparison method has the advantages that the method needs help of a semi-loyal third party (Third Party, TP), the TP is allowed to mistakenly act according to the wish of the TP, but is not allowed to conspire with any one of the two users; one five-quantum bit entangled state can be used for achieving two-bit equality comparison in all comparison; unitary operation and the quantum entanglement swapping technology are not required in the method, it is avoided that expensive quantum devices related by unitary operation and the quantum entanglement swapping technology are consumed; Bell measurement and single-particle measurement are only adopted in the method, and the quantum measurement can be achieved with the existing quantum technology; safety performance according to outside attack and participant attack is guaranteed; secret information and the comparative result of the two users are not revealed to the TP.

Description

technical field [0001] The invention relates to the field of quantum cryptography. The invention designs a two-party quantum privacy comparison method based on a five-qubit entanglement state to solve the equality comparison problem of two user secrets. Background technique [0002] Quantum cryptography originated from the Quantum Key Distribution (QKD) method proposed by Bennett and Brassard [1] in 1984. This method was later called the BB84 method. Until now, quantum cryptography has won considerable development so that it has established many branches, such as QKD [1-8], Quantum Secret Sharing (Quantum Secret Sharing, QSS) [9-13], Quantum Secure Direct Communication (Quantum Secure Direct Communication, QSDC) [14-28] and so on. [0003] Quantum Private Comparison (QPC) is a new branch of quantum cryptography, which was first proposed by Yang et al. [29] using Einstein-Podolsky-Rosen (EPR) pairs in 2009. The method of Yang et al. [29] aims to utilize the principle of q...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0852H04L9/3226H04L63/083H04L63/145
Inventor 叶天语纪兆旭
Owner 浙江康奥思信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products