Quantum resource limited semi-quantum secret sharing method

A quantum secret and resource-constrained technology, applied in the field of semi-quantum secret sharing, can solve problems such as threats to people's privacy

Active Publication Date: 2018-06-15
XIANGTAN UNIV
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of science and technology, information security on the network has become an indispensable part of today's society, and people are paying more and more attention to the protection of personal privacy, but now there are various eavesdropping behaviors, which pose a huge threat to people's privacy
Although there are many classic ways to resist eavesdropping, it is impossible to prevent and detect eavesdropping in all cases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum resource limited semi-quantum secret sharing method
  • Quantum resource limited semi-quantum secret sharing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] 1. Preparation stage:

[0022] (1a) Alice randomly generates a string of binary numbers S, performs a specific operation on S and the secret string K she wants to share (for example, XORing the two strings), and obtains a string R;

[0023] (1b) Alice prepares 2N state, send N to Bob and the other N to Charlie.

[0024] 2. Sharing stage:

[0025] (2a) Bob receives the message sent by Alice After the state, randomly choose to execute the REFLECT operation or execute

[0026] SIFT operation. Charlie's operation is similar to Bob;

[0027] (2b) After receiving the qubits sent back by Bob and Charlie, Alice randomly chooses to use X-based or Z-based

[0028] Take measurements and record the results of the measurements and the measurement basis used for the corresponding location;

[0029] (2c) After Alice has measured all 2N qubits, she discloses the

[0030] base of measurement. Bob and Charlie disclose what they do to each qubit.

[0031] 3. Detection stage:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum resource limited semi-quantum secret sharing method. Semi-quantum secret sharing usually includes that a quantum side Alice divides a secret into two parts and sendsthem to quantum resource limited Bob and Charlie respectively, and only when the Bob and the Charlie cooperate, the complete secret be recovered. At present, the typical semi-quantum secret sharing method guarantees the security, but requires the semi-quantum sides Bob and Charlie to perform quantum measurement operations. The measurement device may be unsafe, which increases the hidden danger ofsecret sharing. The present invention enables the resource limited Bob and Charlie to perform secret sharing without a quantum measurement device, and the quantum side Alice does not require quantum memory. In this way, the present invention can greatly reduce the quantum resources required by the three participants, thereby saving the communication cost.

Description

technical field [0001] The invention relates to a semi-quantum secret sharing method, which belongs to the field of quantum cryptography. Background technique [0002] With the development of science and technology, information security on the network has become an indispensable part of today's society, and people are paying more and more attention to the protection of personal privacy, but now there are various eavesdropping behaviors, which pose a huge threat to people's privacy . Although there are many classic ways to resist eavesdropping, it is impossible to prevent and discover eavesdropping in all cases. Quantum cryptography combines the characteristics of quantum mechanics and can be theoretically absolutely secure. As a branch of quantum cryptography, quantum secret sharing plays an important role in distributing keys, and semi-quantum secret sharing with limited quantum resources simplifies the quantum capabilities required by participants, thereby reducing commu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/085H04L9/0852
Inventor 李琴李竹林朱雅清陈灵丽
Owner XIANGTAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products