Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum group authentication method based on Grover algorithm

A quantum and algorithmic technology, applied to user identity/authority verification and key distribution, can solve problems such as low efficiency, low efficiency, waste of classical and quantum resources, etc., and achieve good applicability, fewer quantum transmissions, and high efficiency.

Active Publication Date: 2019-10-15
CHONGQING UNIV OF POSTS & TELECOMM
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The rotation operator and projection operator in the algorithm have high research value, and some existing quantum associative memory models and quantum machine learning algorithms use the idea of ​​the Grover algorithm, but the group identity authentication scheme based on the Grover algorithm still has No, especially the characteristics of the Grover operator can actually be combined with the threshold idea as a group identity authentication algorithm
[0004] In recent years, the research on quantum identity authentication schemes proposed by quantum technology has been increasing, but most of the existing quantum authentication schemes consider the identity authentication of both quantum communication parties. If multiple users participate in the authentication, the authentication process needs to be carried out multiple times. Iterative authentication is inefficient, wastes classical resources and quantum resources, and cannot authenticate multiple user identities at the same time
[0005] This authentication method is proposed to solve the defects and inefficiencies that the existing quantum authentication schemes cannot simultaneously authenticate multi-user identities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum group authentication method based on Grover algorithm
  • Quantum group authentication method based on Grover algorithm
  • Quantum group authentication method based on Grover algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0048] The invention provides a quantum group authentication method based on the Grover algorithm, comprising the following steps:

[0049] S1. The authentication management center prepares the authentication quantum state for the network group. The quantum state is a two-particle state, expressed as |S w >

[0050] S2. The authentication management center randomly generates n private shares and group authentication codes according to the Shamir(t,n) threshol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of quantum computing and quantum authentication, and relates to a quantum group authentication method based on a Grover algorithm. The method comprises thesteps that an authentication management center prepares an initial authentication quantum state; the private shares are sent to a network group needing to be authenticated through a safe quantum channel, then the private shares are prepared to serve as registered user identity information and sent to a registered user through a classic channel, and a group identifier is generated for the networkgroup and sent to the network group through the classic channel; in the authentication stage, each user participating in authentication performs unitary transformation on the authentication quantum state according to own identity information and the group identifier, and finally, the group transmits the authentication quantum state after unitary transformation back to the authentication managementcenter for comparison to obtain an authentication result. According to the invention, the Grover operator is used, the usage of the Grover operator is expanded, the group user identity and the network group identifier can be authenticated at the same time, and the security of the authentication method is improved through dual authentication.

Description

technical field [0001] The invention belongs to the technical field of quantum computing and quantum authentication, and relates to a quantum group authentication method based on a Grover algorithm. Background technique [0002] As we all know, authentication is an effective method to ensure the integrity of transmitted information, and identity authentication technology is often used in specific scenarios such as e-commerce and voting, and has a very wide range of application scenarios in real life. The security of traditional authentication protocols is mostly based on the computational complexity of discrete logarithms, quadratic residues, and factorization of large numbers in classical cryptography. However, with the rapid development of quantum technology in recent years, the powerful computing power of quantum computers poses a huge challenge to the security of these classical protocols. The quantum encryption technology in the contemporary background is based on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0852H04L9/3278H04L63/0876
Inventor 宋秀丽曹耘凡周道洋
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products