Unlock instant, AI-driven research and patent intelligence for your innovation.

A multi-party quantum privacy comparison method for strangers based on d-level single photons

A single-photon, stranger technique with applications in quantum cryptography

Active Publication Date: 2020-10-09
西安豪密网络科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The above privacy comparison method can only compare the secrets of two parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-party quantum privacy comparison method for strangers based on d-level single photons
  • A multi-party quantum privacy comparison method for strangers based on d-level single photons
  • A multi-party quantum privacy comparison method for strangers based on d-level single photons

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0134] 1 Application example of multi-party quantum privacy comparison method

[0135] P 1 ,P 2 and P 3 The method of the present invention is illustrated by way of example. Without loss of generality, suppose K=10, k 1 = 1,k 2 = 3,k 3 = 4; and, P 1 ,P 2 and P 3 The secret integers are respectively s 1 = 2, s 2 = 6 and s 3 =4. TP 1 Particle|k i > (i=1,2,3) send to P i , then P i right|k i > perform a unitary operation P i Particles that will encode their own information |k i +s i > send to TP 2 . TP 2 Particles obtained by measurement|k i +s i > status. at TP 1 To TP 2 publish k' 1 , k' 2 and k' 3 after TP 2 to k i +s i and k' i Perform summation to get M i , namely M 1 =12, M 2 = 16 and M 3 =14. Therefore, M 1 3 2 . m i The size relationship with s i The size relationship is equivalent. TP 2 Publish M i The comparison results of the size relationship of P i Just know the size relationship of their respective secret information....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multi-party quantum private comparison method suitable for strangers based on a d-level single photon. The method provided by the invention has a total of two semi-loyal thirdparties, wherein each third party is allowed to act wrongly according to the own will, but is not allowed to conspire with other people. According to the scheme of the invention, each participant encodes a secret by using a quantum bottom shift operation. According to the method of the invention, external attacks and participant attacks can be resisted, and the secret of each participant is unknown to other participants and the two third parties. The method of the invention has the following two obvious characteristics: on the one hand, the size of secret integers from n participants can be compared at one time, rather than comparing the equality of the secret integers; and on the other hand, the participants do not need to communicate with each other and do not share keys in advance, sothat the method is suitable for the case where the participants are strangers.

Description

technical field [0001] The invention relates to the field of quantum cryptography. The present invention designs a multi-party quantum privacy comparison method suitable for strangers based on d-level single photons, and realizes the size comparison of secret information of strangers with the help of two third parties (Third party, TP). Background technique [0002] Quantum cryptography can be seen as a combination of quantum mechanics and classical cryptography. The security of classical cryptography depends on the computational complexity of solving mathematical problems, while the security of quantum cryptography is based on the basic principles of quantum mechanics. Compared with classical cryptography, quantum cryptography has significant security advantages. Since Bennett and Brassard proposed the first quantum key distribution method [1] in 1984, many quantum cryptography methods have been designed to complete various cryptographic tasks that are difficult for class...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/00H04B10/70
CPCH04B10/70H04L9/002H04L9/0852H04L9/0858
Inventor 叶崇强叶天语
Owner 西安豪密网络科技有限公司