Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multiparty quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement swapping

An entanglement exchange, quantum technology, applied in the field of quantum cryptography, which can solve the problem that semi-loyal TP cannot obtain secrets

Active Publication Date: 2017-05-31
嘉兴市顺凯鹿科技有限公司
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The semi-loyal TP cannot get any information about the secrets of these parties other than comparing the results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiparty quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement swapping
  • Multiparty quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement swapping
  • Multiparty quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement swapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0167] 1. Application example of MQPC method

[0168] here with x i The first bit of (ie ) as an example to illustrate the method of the present invention. P i By applying to |Ψ(0,0)> produce to encode (which is ). Then, P i The label in the cat state is The particle and her Bell state are labeled as The particle imposes a d-level Bell state measurement. In this way, the label in the cat state is The particle and her Bell state are labeled as The particles exchange entanglement. at P 1 , P 2 ,...,P n After completing the measurement of the d-level Bell state, the first cat state sent back to the TP has a label TP calculation and from Subtract from to get that is if So if So These two situations mean modn=0. otherwise, mod n ≠ 0. In this way, it is completed from P 1 , P 2 ,...,P n The equality comparison of the 1st bit of the secret.

[0169] 2. Discussion

[0170] Since the wiretapping detection process can be considered...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multiparty quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement swapping. A half-loyal third party is allowed to do on own will but cannot conspire with any party; in the invention, n parties encode their own secrets by use of a unitary operation, and the equality of the secrets of the n parties can be compared by only executing once. The external attack and the participant attack are resisted in the premise of not adopting a quantum key to produce a key to guarantee the security. One party cannot obtain the secrets of other parties except the circumstance that their secrets are completely same. The half-loyal third party cannot obtain any information about the secret of these parties except the comparison result.

Description

technical field [0001] The invention relates to the field of quantum cryptography. The invention designs a multi-party quantum privacy comparison method based on the entanglement exchange of the d-level cat state and the d-level Bell state to solve the equality comparison problem of multiple user secrets. Background technique [0002] Since Bennett and Brassard [1] first proposed the concept of quantum cryptography in 1984, many secure quantum cryptography methods have been designed, such as quantum key distribution (Quantum Key Distribution, QKD) [2-5], quantum secure direct communication ( Quantum Secure Direct Communication, QSDC)[6-8], quantum teleportation[9-11], etc. [0003] Secure multi-party computation (Secure multi-party computation, SMC) is a basic primitive problem of modern cryptography, dedicated to computing a function with secret inputs from different parties in a distributed network without revealing the true value of each secret input. content. It has a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0858
Inventor 纪兆旭叶天语
Owner 嘉兴市顺凯鹿科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products