A Method for Contrasting Quantum Information of Two Parties Based on Bell Basis

A quantum information and secret information technology, which is applied in the field of quantum information comparison between two parties based on the Bell basis, can solve problems such as reducing efficiency and difficulty in implementing protocols

Inactive Publication Date: 2020-10-27
HEBEI UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are some flaws in the existing third-party protocols based on semi-honesty. First, in actual situations, TP will try to eavesdrop on the participants' secrets through various attack methods.
Secondly, the existence of TP adds difficulties to the implementation of the protocol and reduces the efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Contrasting Quantum Information of Two Parties Based on Bell Basis
  • A Method for Contrasting Quantum Information of Two Parties Based on Bell Basis
  • A Method for Contrasting Quantum Information of Two Parties Based on Bell Basis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The method for comparing two-party quantum information based on the Bell base provided by the present invention is specifically implemented as follows:

[0023] Suppose Alice has a secret information x, and Bob has a secret information y. Alice and Bob compare the secret information according to the following steps:

[0024] The first step: Alice and Bob agree on one-the mapped hash function H: {0,1} n →{0,1} n ; Alice calculates the hash value of her secret information x and gets Bob calculates the hash value of his secret information y and gets

[0025]

[0026] Step 2: Alice divides the hash value H(x) of her secret information x into Groups before There are m elements in each group, and k elements in the last group, m≤n, k≤m; the hash value grouping of Alice's secret information x is as follows:

[0027]

[0028] Bob also divides the hash value H(y) of his secret information y into Groups before There are m elements in each group in the group, and k elements in the las...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a two-party quantum information comparison method based on a bell base. The two-party quantum information comparison method is characterized in that: when secret information ofAlice and secret information of Bob are compared, a hash function is shared by the Alice and the Bob firstly, and hash values of the secret information of the Alice and the Bob are calculated respectively; the hash values of the secret information are grouped respectively; the secret information of the Alice and the secret information of the Bob are compared according to the hash values in each group; if the secret information of the Alice is not equal to the secret information of the Bob in a comparison according to the hash value in any group, it is considered that the secret information ofthe Alice and the secret information of the Bob are not equal; and if the secret information of the Alice is equal to the secret information of the Bob in companions according to the hash values in all groups, it is considered that the secret information of the Alice and the secret information of the Bob are equal. The two-party quantum information comparison method of the invention has the beneficial effects that: a decoy state is inserted in the comparison process, and whether there is an attacker can be detected, so that the comparison process is safe and reliable; in addition, the two-party quantum information comparison method is a high-efficiency quantum secret information comparison method, the operation of the method mainly comprises measurement and rotation operation of optical particles, so that a computing efficiency is high.

Description

Technical field [0001] The invention relates to the technical field of information security, in particular to a method for comparing two-party quantum information based on a Bell base. Background technique [0002] Secure multi-party computing is the theoretical basis of distributed cryptography and a basic problem in distributed computing research. Since Academician Yao Qizhi proposed the concept of secure multi-party computing in the 1980s, this field has become one of the important research contents of modern cryptography. With the birth of quantum algorithms, the security of classical cryptography based on computational complexity has been threatened. As one of the important branches of secure multi-party quantum computing, quantum two-party computing has also attracted the attention of many scholars. Many special-purpose secure two-party quantum computing agreements have emerged. [0003] The secure two-party quantum information comparison protocol is a scheme with special ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/32H04L9/00
CPCH04L9/002H04L9/0643H04L9/0852H04L9/3236
Inventor 吴万青
Owner HEBEI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products