Authenticable semi-quantum secret sharing method and system based on GHZ state

A quantum secret and secret sharing technology, applied in the field of information security, can solve the problems of not being able to resist interception and retransmission attacks, the security factor of the quantum secret sharing protocol is not high, and the identity authentication problem is not considered, so as to achieve good particle use efficiency and resist noise. The effect of interference, good efficiency

Active Publication Date: 2019-09-17
成都继存科技有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The existing quantum secret sharing protocol has a low security factor and cannot resist attack strategies such as interception and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authenticable semi-quantum secret sharing method and system based on GHZ state
  • Authenticable semi-quantum secret sharing method and system based on GHZ state
  • Authenticable semi-quantum secret sharing method and system based on GHZ state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0052] The particle usage efficiency of the protocol is low, resulting in insufficient practical value of the protocol.

[0053] The anti-channel interference ability of the protocol is weak. It is easy to cause quantum resources to degrade or even collapse during the use of the protocol. Most of the existing quantum secret sharing protocols require protocol participants to have full quantum operation capabilities, but ordinary users cannot afford expensive costs in real communication networks. Most of the existing quantum secret sharing protocols use the six-particle cluster state as the quantum channel, and there are se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security. The invention discloses an authenticable semi-quantum secret sharing method and system based on a GHZ state, and the method comprises the steps: enabling a strong quantum party to share an n-bit message m secret to a first semi-quantum party and a second semi-quantum party, and obtaining a secret message m after the first semi-quantum party and the second semi-quantum party both know the coding results of the other two parties; by utilizing an absolutely safe quantum key distribution technology, the strong quantum party and the first semi-quantum party sharing keys key ab1 and key ab2; the strong quantum party and the second semi-quantum party sharing the keys keyac1 and keyac2; and the second semi-quantum party and the first semi-quantum party sharing the keybc. In the secret sharing process, bidirectional authentication of the user identity is completed at the same time, security analysis shows that the protocol can resist different attack strategies such as internal attacks and external attacks, and the secret key shared between the users can be used for multiple times; in addition, the method has good particle use efficiency, quantum resources can be saved, and three-party secret sharing can be completed efficiently.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a GHZ state-based authenticated semi-quantum secret sharing method and system. Background technique [0002] Currently, the closest prior art: [0003] In the modern information society, classical cryptographic systems based on complex mathematical calculations provide security for various application scenarios. With the rapid development of quantum technology, the emergence of quantum computers will make the existing encryption system vulnerable. Quantum cryptography builds an unconditionally secure cryptographic system based on the physical characteristics of quantum mechanics, such as the uncertainty principle and the quantum uncertainty principle. In 1984, Bennett and Brassard proposed the first quantum key distribution protocol, followed by quantum secret sharing (quantum secret sharing, QSS), quantum teleportation (quantum teleportation, QT), quan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/00H04L29/06
CPCH04L9/002H04L9/085H04L9/0858H04L63/0869H04L63/1416
Inventor 张仕斌郑涛
Owner 成都继存科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products