Verifiable threshold quantum secret sharing method for sequential communication

A quantum secret and sequential technology, applied to secure communication devices and key distribution, can solve problems such as lack of effective design considerations, inconsistencies, reduced application range and practicability, and achieve the effect of improving practicability and ensuring security

Active Publication Date: 2019-01-22
UNIV OF SCI & TECH OF CHINA
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0026] The success rate of the scheme is relatively low, and only 1 / d rounds are legal, so the efficiency of secret sharing is low and does not meet the actual needs
[0027] Although the above schemes show a protocol that can map a multi-entangled system to a simpler quantum protocol involving a system, some of these designs lack effective considerations, such as only (n,n) structures, which require trusted third parties and schemes The low success rate greatly reduces its scope of application and practicability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable threshold quantum secret sharing method for sequential communication
  • Verifiable threshold quantum secret sharing method for sequential communication
  • Verifiable threshold quantum secret sharing method for sequential communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] An embodiment of the present invention provides a verifiable threshold quantum secret sharing method for sequential communication, such as figure 1 As shown, it mainly includes the following steps:

[0040]1. Private share allocation stage: The secret distributor (Dealer) selects a random polynomial, calculates its own share (secret share) for each share holder, and securely delivers it to the corresponding share holder.

[0041] Such as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verifiable threshold quantum secret sharing method for sequential communication, which can recover the secret cooperatively without the participation of all shareholders, sothat the method has more flexibility in application. At that same time, no trusted third party is need, and a verifiable mechanism is provided to detect cheat, so that the security is guarantee, in addition, each round can be legally used for secret sharing, and the practicability is greatly improved.

Description

technical field [0001] The invention relates to the technical field of network and information security, in particular to a verifiable threshold quantum secret sharing method for sequential communication. Background technique [0002] 1) Secret sharing: [0003] The basic idea of ​​(t,n) threshold secret sharing is to divide a secret into n secret shares and distribute each share to a participant. Only t(t≤n) or more participants can cooperate. To recover the secret, less than t participants cannot recover the secret, where t is the threshold value. [0004] There are many ways to implement the (t,n) threshold secret sharing scheme, among which the most widely used is the polynomial-based Shamir secret sharing scheme: [0005] The scheme assumes that Dealer is the secret distributor, n is the number of participants, t is the threshold value, p is a large prime number much larger than n; both the secret space and the share space are finite fields GF(p). The (t,n) threshold...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/085H04L9/0852H04L9/0869
Inventor 苗付友陆长彬侯俊鹏孟珂举黄文超熊焰
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products