Multiparty quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement swapping

An entanglement exchange, quantum technology, applied in the field of quantum cryptography, which can solve the problem that semi-loyal TP cannot obtain secrets

Active Publication Date: 2017-05-31
嘉兴市顺凯鹿科技有限公司
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The semi-loyal TP cannot get any information about th...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiparty quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement swapping
  • Multiparty quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement swapping
  • Multiparty quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement swapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0167] 1. Application example of MQPC method

[0168] here with x i The first bit of (ie ) as an example to illustrate the method of the present invention. P i By applying to |Ψ(0,0)> produce to encode (which is ). Then, P i The label in the cat state is The particle and her Bell state are labeled as The particle imposes a d-level Bell state measurement. In this way, the label in the cat state is The particle and her Bell state are labeled as The particles exchange entanglement. at P 1 , P 2 ,...,P n After completing the measurement of the d-level Bell state, the first cat state sent back to the TP has a label TP calculation and from Subtract from to get that is if So if So These two situations mean modn=0. otherwise, mod n ≠ 0. In this way, it is completed from P 1 , P 2 ,...,P n The equality comparison of the 1st bit of the secret.

[0169] 2. Discussion

[0170] Since the wiretapping detection process can be considered...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multiparty quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement swapping. A half-loyal third party is allowed to do on own will but cannot conspire with any party; in the invention, n parties encode their own secrets by use of a unitary operation, and the equality of the secrets of the n parties can be compared by only executing once. The external attack and the participant attack are resisted in the premise of not adopting a quantum key to produce a key to guarantee the security. One party cannot obtain the secrets of other parties except the circumstance that their secrets are completely same. The half-loyal third party cannot obtain any information about the secret of these parties except the comparison result.

Description

technical field [0001] The invention relates to the field of quantum cryptography. The invention designs a multi-party quantum privacy comparison method based on the entanglement exchange of the d-level cat state and the d-level Bell state to solve the equality comparison problem of multiple user secrets. Background technique [0002] Since Bennett and Brassard [1] first proposed the concept of quantum cryptography in 1984, many secure quantum cryptography methods have been designed, such as quantum key distribution (Quantum Key Distribution, QKD) [2-5], quantum secure direct communication ( Quantum Secure Direct Communication, QSDC)[6-8], quantum teleportation[9-11], etc. [0003] Secure multi-party computation (Secure multi-party computation, SMC) is a basic primitive problem of modern cryptography, dedicated to computing a function with secret inputs from different parties in a distributed network without revealing the true value of each secret input. content. It has a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0858
Inventor 纪兆旭叶天语
Owner 嘉兴市顺凯鹿科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products