Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A ghz-state-based authenticated semi-quantum secret sharing method and system

A quantum secret and quantum party technology, applied in the field of verifiable semi-quantum secret sharing methods and systems, can solve the problems of inability to resist interception and retransmission attacks, low security factor of quantum secret sharing protocol, and no consideration of identity authentication issues, etc.

Active Publication Date: 2020-10-27
成都继存科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The existing quantum secret sharing protocol has a low security factor and cannot resist attack strategies such as interception and retransmission attacks, making the protocol
[0011] None of the existing technical solutions considers the issue of identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A ghz-state-based authenticated semi-quantum secret sharing method and system
  • A ghz-state-based authenticated semi-quantum secret sharing method and system
  • A ghz-state-based authenticated semi-quantum secret sharing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the objectives, technical solutions, and advantages of the present invention clearer and more comprehensible, the present invention will be further described in detail below in conjunction with embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0052] The particle use efficiency of the agreement is low, which leads to the lack of practical value of the agreement.

[0053] The anti-channel interference capability of the protocol is weak. It is easy to cause quantum resources to degenerate or even collapse during the use of the agreement. Existing quantum secret sharing protocols mostly require the participants of the protocol to have full quantum operation capabilities, but ordinary users cannot afford the expensive cost in the actual communication network. Most existing quantum secret sharing protocols use six-particle cluster states as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and discloses a GHZ-state-based verifiable half-quantum secret sharing method and system. A strong quantum party shares n-bit message m secrets with the first half-quantum party and the second half-quantum party. When both the first half-quantum party and the second half-quantum party know the encoding results of the other two parties, they get the secret message m; using the absolutely secure quantum key distribution technology, the strong quantum party shares the secret key with the first half-quantum party ab1 and key ab2 ; The strong quantum party shares the secret key with the second half quantum party ac1 and key ac2 ; The second half-quantum party shares the secret key with the first half-quantum party bc . In the process of sharing secrets, this invention completes the two-way authentication of user identities at the same time. The security analysis shows that this protocol can resist different attack strategies such as internal attacks and external attacks, and the shared key between users can be used multiple times; and this The invention has better particle usage efficiency, which helps to save quantum resources and efficiently complete three-party secret sharing.

Description

Technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a certifiable semi-quantum secret sharing method and system based on a GHZ state. Background technique [0002] Currently, the closest existing technology: [0003] In the modern information society, classic cryptosystems based on complex mathematical calculations provide security for various application scenarios. With the rapid development of quantum technology, the emergence of quantum computers will make the existing encryption system vulnerable. Quantum cryptography builds an unconditionally secure cryptographic system based on the uncertainty principle of quantum mechanics, quantum uncertainty principle and other physical characteristics. In 1984, Bennett and Brassard proposed the first quantum key distribution protocol, followed by quantum secret sharing (QSS), quantum teleportation (QT), and quantum secure direct communication (quantum secure direct). ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/00H04L29/06
CPCH04L9/002H04L9/085H04L9/0858H04L63/0869H04L63/1416
Inventor 张仕斌郑涛
Owner 成都继存科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products