A secure multi-party quantum sum negotiation method based on quantum Fourier transform

A Fourier transform and quantum technology, applied in the field of quantum cryptography, which can solve problems such as application limitations and lack of communication efficiency

Active Publication Date: 2020-05-05
嘉兴市顺凯鹿科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2016, Shi et al. [14] believed that the methods of literature [7,11] had two shortcomings: on the one hand, the modules of these two methods were too small, which limited their wider application; on the other hand, due to their Bit-to-bit calculation and communication methods, these two methods do not have high enough communication efficiency
In particular, non-minimal subset participants cannot successfully independently decide on shared summation results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure multi-party quantum sum negotiation method based on quantum Fourier transform
  • A secure multi-party quantum sum negotiation method based on quantum Fourier transform
  • A secure multi-party quantum sum negotiation method based on quantum Fourier transform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0146] 1. Application example of secure multi-party quantum sum negotiation method

[0147] In this subsection, it is verified that the output of the method of the present invention is correct. There are n participants in total, Ρ 1 ,P 2 ,...,Ρ n , where P i (i=1,2,...,n) has a secret integer sequence K of length N i . Without loss of generality, after ignoring the eavesdropping detection process, the first integer of each secret integer sequence (ie ) as an example to illustrate the correctness of the output.

[0148] P i (i=1,2,...,n) Prepare a d-level n-particle entanglement state in a quantum state Then, P i the particles keep it in hand and keep the particles send to P j . Here, j=1,2,...,i-1,i+1,...,n-1,n. receiving particles After, P j pair of particles apply to encode the secret bits At the same time, P i also by particle apply to encode her secret bits Then, P j The encoded particles send to P i . at P i After receiving all part...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security multi-party quantum summation consultation method based on quantum Fourier transform, wherein transmitted particles are transmitted in a complete graph mode. The method disclosed by the invention can resist to an external attack and a participant attack. Particularly, a participant in a non-minimum subset cannot successfully and separately decide a shared summation calculation result. In addition, according to the method disclosed by the invention, a module d is calculated, and both calculation and summation are carried out in a mode of adding integers and integers instead of a mode of adding bits and bits.

Description

technical field [0001] The invention relates to the field of quantum cryptography. The invention designs a secure multi-party quantum summation negotiation method based on quantum Fourier transform, and realizes the secret sharing of the modulus d of the secret integer sequence of n participants and the calculation result. Background technique [0002] Secure multi-party computation, first proposed by Yao[1] and extended by Goldreic et al.[2], is an important subfield of classical cryptography. Naturally, whether the physical principles of quantum mechanics can be applied to secure multi-party computation has become an important and interesting question. So far, many researchers have carried out research on secure multi-party computation in quantum situations [3-6]. Lo[3] argues that an equality function cannot be safely weighed in the two-party case. Therefore, some additional assumptions, such as a third party (TP), should be considered. Ben-Or et al. [4] studied the f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04B10/70
CPCH04B10/70H04L9/0852H04L9/0858
Inventor 杨慧宜叶天语
Owner 嘉兴市顺凯鹿科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products