Voting protocol method based on d-dimensional three-quantum entanglement state

A quantum entangled state and quantum entanglement technology, applied in key distribution, can solve the problems of only considering the security of voting information and low efficiency, and achieve the effect of ensuring security and high information efficiency

Active Publication Date: 2018-11-02
CHONGQING UNIV OF POSTS & TELECOMM
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And many of these schemes that exploit entanglement only consider the case of one or two voters
[0005] In view of the fact that most of the existing quantum schemes only consider the security of voting in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voting protocol method based on d-dimensional three-quantum entanglement state
  • Voting protocol method based on d-dimensional three-quantum entanglement state
  • Voting protocol method based on d-dimensional three-quantum entanglement state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] A d-dimensional three-quantum entangled state-based voting protocol method of the present invention will be further described below in conjunction with the accompanying drawings.

[0039] This example is a quantum voting protocol based on the d-dimensional three-quantum entangled state and using the idea of ​​the shamir(t,n) threshold secret sharing scheme. This example is divided into the following parties according to the traditional voting model: voting management center administrator, voting group P 1 ,P 2 ...P n , the scrutineer Alice and the voter Bob. refer to figure 1 The method flowchart of the present invention can be roughly divided into an initialization stage, a group voting stage, a verification stage and a vote counting stage. A secure quantum channel can be established between the voting management center, voting groups, scrutineers and vote counters, and the voting management center transmits information such as initial quantum states, keys and auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a voting protocol method based on a d-dimensional three-quantum entanglement state, and belongs to the technical field of quantum computation and quantum authentication. The voting protocol method comprises the steps that a d-dimensional three-quantum entanglement system is prepared by a voting management center, three quanta are distributed to voting groups, a scrutineer and a vote counting person correspondingly, n private shares and group authentication codes a<0> are prepared simultaneously, the private shares are distributed to n voting group registered authorized persons, t persons with the voting qualification are selected from the voting groups to participate in voting, and the group authentication codes are issued to the scrutineer; the voting groups calculate the private authentication codes of the voting groups, and vote according to the voting intentions and the private authentication codes of the voting groups; after voting is completed, the scrutineer conducts unitary operation on the quanta in the hands through the group authentication codes in the hands, and authenticate safety through measuring; and after authentication is qualified, the votecounting person obtains a voting result. Compared with other protocols, the number of the quanta required to be prepared by the voting protocol method is much less, and thus the efficiency is improved, and the protocol flexibility and universality are enhanced by using any d-dimensional quantum state.

Description

technical field [0001] The invention belongs to the technical field of quantum calculation and quantum authentication, and relates to a voting protocol method based on a d-dimensional three-quantum entangled state. Background technique [0002] In the past few decades, classical cryptography and different fields have been combined into practical applications. One of the most brilliant applications of this is group voting. The security of traditional voting protocols is mostly based on the computational complexity of discrete logarithms, quadratic residues, and factorization of large numbers in classical cryptography. However, with the rapid development of quantum technology in recent years, the powerful computing power of quantum computers poses a huge challenge to the security of these classical protocols. The quantum encryption technology in the contemporary background is based on the basic principles of quantum physics, and its security is based on the Heisenberg uncert...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/085H04L9/0852H04L9/0863H04L9/3226H04L2209/463
Inventor 宋秀丽曹耘凡周道洋
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products