Two-party quantum information comparison method based on bell base

A quantum information and secret information technology, which is applied in the field of quantum information comparison between two parties based on the Bell basis, can solve problems such as reducing efficiency and difficulty in implementing protocols

Inactive Publication Date: 2018-09-28
HEBEI UNIVERSITY
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are some flaws in the existing third-party protocols based on semi-honesty. First, in actual situations, TP will try to eavesdrop on the participants' secrets through various attack methods.
Secondly, the existence of TP adds difficulties to the implementation of the protocol and reduces the efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-party quantum information comparison method based on bell base
  • Two-party quantum information comparison method based on bell base
  • Two-party quantum information comparison method based on bell base

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The two-party quantum information comparison method based on the bell base provided by the present invention, its specific implementation method is as follows:

[0023] Suppose Alice has a secret message x and Bob has a secret message y. Alice and Bob compare the secret information according to the following steps:

[0024] Step 1: Alice and Bob agree on one - the mapped hash function H: {0,1} n →{0,1} n ; Alice calculates the hash value of her secret information x, and obtains Bob calculates the hash value of his secret information y, and obtains

[0025]

[0026] Step 2: Alice divides the hash value H(x) of her secret information x into group, before There are m elements in each group, k elements in the last group, m≤n, k≤m; the hash value grouping of Alice's secret information x is as follows:

[0027]

[0028] Bob also divides the hash value H(y) of his secret information y into group, before There are m elements in each group, k elements in the l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a two-party quantum information comparison method based on a bell base. The two-party quantum information comparison method is characterized in that: when secret information ofAlice and secret information of Bob are compared, a hash function is shared by the Alice and the Bob firstly, and hash values of the secret information of the Alice and the Bob are calculated respectively; the hash values of the secret information are grouped respectively; the secret information of the Alice and the secret information of the Bob are compared according to the hash values in each group; if the secret information of the Alice is not equal to the secret information of the Bob in a comparison according to the hash value in any group, it is considered that the secret information ofthe Alice and the secret information of the Bob are not equal; and if the secret information of the Alice is equal to the secret information of the Bob in companions according to the hash values in all groups, it is considered that the secret information of the Alice and the secret information of the Bob are equal. The two-party quantum information comparison method of the invention has the beneficial effects that: a decoy state is inserted in the comparison process, and whether there is an attacker can be detected, so that the comparison process is safe and reliable; in addition, the two-party quantum information comparison method is a high-efficiency quantum secret information comparison method, the operation of the method mainly comprises measurement and rotation operation of optical particles, so that a computing efficiency is high.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for comparing quantum information between two parties based on a bell basis. Background technique [0002] Secure multi-party computation is the theoretical basis of distributed cryptography, and it is also a basic problem in distributed computing research. Since Academician Yao Qizhi proposed the concept of secure multi-party computing in the 1980s, this field has become one of the important research contents of modern cryptography. With the birth of quantum algorithms, the security of classical cryptography based on computational complexity is threatened. As one of the important branches of secure multi-party quantum computing, quantum two-party computing has also attracted the attention of many scholars. Many secure two-party quantum computing protocols with special-purpose applications have emerged. [0003] The secure two-party quantum information co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/32H04L9/00
CPCH04L9/002H04L9/0643H04L9/0852H04L9/3236
Inventor 吴万青
Owner HEBEI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products