A Secure Multiparty Quantum Sum Method Based on Quantum Fourier Transform

A Fourier transform and quantum technology, applied in the field of quantum cryptography, can solve problems such as application limitations and lack of communication efficiency

Active Publication Date: 2020-05-05
嘉兴市顺凯鹿科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2016, Shi et al. [14] believed that the methods of literature [7,11] had two shortcomings: on the one hand, the modules of these two methods were too small, which limited their wider application; on the other hand, due to their Bit-to-bit calculation and communication methods, these two methods do not have high enough communication efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Secure Multiparty Quantum Sum Method Based on Quantum Fourier Transform
  • A Secure Multiparty Quantum Sum Method Based on Quantum Fourier Transform
  • A Secure Multiparty Quantum Sum Method Based on Quantum Fourier Transform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0151] 1. Application example of secure multi-party quantum summation method

[0152] Without loss of generality, after ignoring the eavesdropping detection process, the first integer of each secret integer sequence (ie v=1,2,...,n) as an example to illustrate the output correctness of the method of the present invention.

[0153] P 1 Preparation of a d-level n-particle entangled state in a quantum state Then, P 1 the particles keep it in your hands and keep the particles send to Ρ j . Here, j=2, 3, . . . , n. receiving particles After that, P j pair of particles apply to encode the secret integer At the same time, P 1 also by particle apply to encode her secret integer Then, P j with V 1 base measure encoded particles and tell Ρ 1 measurement result P 1 Also use V 1 base measure encoded particles to get the measurement result here, And v=1,2,...,n. Finally, according to formula (6), P 1 via calculations get

[0154]

[0155]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety multiparty quantum summation method based on quantum Fourier transform, wherein a transmission particle is transmitted in a tree form. A participant responsible for preparing initial quantum state is assumed to be semi-loyal, so that the participant can wrongly act by following own will but cannot conspire with the others. The method provided by the invention is capable of resisting against the external attack and the participant attack. Especially, one participant cannot acquire the secrete integer sequences of the other participants. The method provided by the invention is safe for the conspired attack applied by at most n-2 participants, wherein n is the number of the participants. Besides, according to the method provided by the invention, the module d is calculated and the summation is calculated in the manner of integer adding integer rather than the manner of bit adding bit.

Description

technical field [0001] The invention relates to the field of quantum cryptography. The invention designs a secure multi-party quantum summation method based on quantum Fourier transform, and realizes the modulo d sum calculation of the secret integer sequence of n participants. Background technique [0002] Secure multi-party computation, first proposed by Yao[1] and extended by Goldreic et al.[2], is an important subfield of classical cryptography. Naturally, whether the physical principles of quantum mechanics can be applied to secure multi-party computation has become an important and interesting question. So far, many researchers have carried out research on secure multi-party computation in quantum situations [3-6]. Lo[3] argues that an equality function cannot be safely weighed in the two-party case. Therefore, some additional assumptions, such as a third party (TP), should be considered. Ben-Or et al. [4] studied the following question: How many participants must ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/002H04L9/0858
Inventor 杨慧宜叶天语
Owner 嘉兴市顺凯鹿科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products