A semi-quantum privacy comparison method and system based on a Bell state

A quantum and privacy technology, which is applied in the Bell state-based semi-quantum privacy comparison method and system field, can solve the problems of less private information, low qubit efficiency, and limit the scope of use of quantum privacy comparison protocols, so as to reduce hardware costs, The effect of improving qubit efficiency

Active Publication Date: 2019-05-03
CHENGDU UNIV OF INFORMATION TECH
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, users cannot afford such expensive quantum devices, which limits the scope of use of quantum privacy comparison protocols to a certain extent.
[0007] (2) The efficiency of qubits is not high: the existing quantum privacy comparison protocols usually need to add anti-eavesdropping and anti-information leakage measures at each step, which requires ingenious protocol design, and even requires a large number of qubits to assist in completing these tasks. However, there is very little private information that can be detected
[0008] (3) The implementation of the existing quantum privacy comparison protocol is relatively complicated: the realization of privacy comparison usually requires the XOR of multiple quantum sequences to hide the user's private information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A semi-quantum privacy comparison method and system based on a Bell state
  • A semi-quantum privacy comparison method and system based on a Bell state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0037] High hardware cost requirements for users: Existing privacy comparison schemes based on quantum technology usually require users to have full quantum processing capabilities, that is, to be equipped with advanced quantum devices, such as quantum generators, quantum memories, and unitary operators. However, ordinary users cannot afford such expensive quantum devices, which limits the scope of use of quantum privacy comparison protocols to a certain extent.

[0038] The application of the present invention will be further described below in conjunction with specific analysis.

[0039] figure 1 , the Bell state-based ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of data information, and discloses a semi-quantum privacy comparison method and system based on a Bell state, and the method comprises the steps: achievingthe comparison of privacy information between semi-quantum users through the attributes of a Bell state; On the basis of ensuring completion of privacy comparison, the quantum bit efficiency is improved, and the protocol process is simplified; And it is ensured that the third-party TP and the external eavesdropper cannot obtain part or even all of privacy information of the user while it is ensured that privacy comparison is completed. According to the invention, the protocol can be applied to the current actual network environment, and the practical process of the quantum technology is promoted; Privacy comparison and eavesdropping detection can be completed by the semi-trusted TP through simple Bell measurement, and additional privacy information cannot be acquired by the semi-trusted TP; And at last, the TP only needs to publish one classical particle to represent whether the privacy information of the two parties is equal or not.

Description

technical field [0001] The invention belongs to the technical field of quantum security communication, and in particular relates to a Bell state-based semi-quantum privacy comparison method and system. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] In the context of the increasingly perfect quantum technology, my country has built a 2,000-kilometer-long Beijing-Shanghai quantum communication trunk line, the metropolitan optical fiber quantum communication technology has matured, and the quantum communication network has entered the practical application stage from the laboratory research stage. Quantum cryptography is an interdisciplinary subject that combines quantum physics and classical cryptography. It is a new type of cryptographic system that uses the basic characteristics of quantum physics to realize cryptographic ideas. Compared with classical cryptography relying on computational complexit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04B10/70
Inventor 闫丽丽孙裕华张仕斌昌燕盛志伟
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products