A semi-quantum privacy comparison method and system based on bell state

A quantum and privacy technology, applied in the field of data information, can solve the problems of less private information, low qubit efficiency, and limit the scope of use of quantum privacy comparison protocols, so as to reduce hardware costs and improve qubit efficiency.

Active Publication Date: 2020-09-22
CHENGDU UNIV OF INFORMATION TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, classical users or users with only partial quantum processing capabilities cannot afford such expensive quantum equipment, which limits the scope of use of quantum privacy comparison protocols to a certain extent.
[0007] (2) The efficiency of qubits is not high: the existing quantum privacy comparison protocols usually need to add anti-eavesdropping and anti-information leakage measures at each step, which requires ingenious protocol design, and even requires a large number of qubits to assist in completing these tasks. However, there are very few private information that can be detected.
[0008] (3) The implementation of the existing quantum privacy comparison protocol is relatively complicated: the realization of privacy comparison usually requires the XOR of multiple quantum sequences to hide the user's private information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A semi-quantum privacy comparison method and system based on bell state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0037] High hardware cost requirements for users: Existing privacy comparison schemes based on quantum technology usually require users to have full quantum processing capabilities, that is, to be equipped with advanced quantum devices, such as quantum generators, quantum memories, and unitary operators. However, classical users or users with only partial quantum processing capabilities cannot afford such expensive quantum equipment, which limits the scope of use of quantum privacy comparison protocols to a certain extent.

[0038] The application of the present invention will be further described below in conjunction with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of data information technology, discloses a semi-quantum privacy comparison method and system based on the Bell state, and uses the attributes of the Bell state to realize the comparison of privacy information between semi-quantum users; on the basis of ensuring the completion of the privacy comparison, the present invention It improves the qubit efficiency and simplifies the protocol process; while ensuring the completion of privacy comparison, it ensures that third-party TP and external eavesdroppers cannot obtain some or all of the user's private information. The invention enables the protocol to be applied to the current actual network environment, and promotes the practical process of quantum technology; the semi-trusted TP can complete privacy comparison and wiretapping detection through simple Bell measurement, and he cannot obtain additional private information; TP finally only needs to publish a classic particle to indicate whether the private information of both parties is equal.

Description

technical field [0001] The invention belongs to the technical field of data information, in particular to a Bell state-based semi-quantum privacy comparison method and system. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] In the context of the increasingly perfect quantum technology, my country has built a 2,000-kilometer-long Beijing-Shanghai quantum communication trunk line, the metropolitan optical fiber quantum communication technology has matured, and the quantum communication network has entered the practical application stage from the laboratory research stage. Quantum cryptography is an interdisciplinary subject that combines quantum physics and classical cryptography. It is a new type of cryptographic system that uses the basic characteristics of quantum physics to realize cryptographic ideas. Compared with classical cryptography, which relies on computational complexity to achieve communi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04B10/70
Inventor 闫丽丽孙裕华张仕斌昌燕盛志伟
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products