Quantum blind signature message authenticity protection method
An authenticity and message technology, applied in the field of information security, can solve the problems of blind signature authenticity threat, blind signature message authenticity cannot be effectively protected, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific embodiments.
[0041] The invention discloses a method for protecting message authenticity in quantum blind signing.
[0042] Specific steps are as follows:
[0043] Step 1. Preparation stage: the customer uses the quantum key distribution protocol, and the customer and the merchant share the key K ab , the customer shares the key K with the bank ac , the corresponding merchant and bank shared key K bc , the protocol obtained using the quantum key distribution protocol is unconditionally secure.
[0044] The bank according to the key K bcGenerate n pairs of EPR entangled particle pairs |Ψ aibi >, the generated method is expressed by the following formula:
[0045]
[0046] In formula (1), a i ,b i is the i-th subscript of the entangled particle pair g...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com