A No-Third-Party Quantum Information Equality Comparison Method Based on Permutation Operation

A technology of permutation operation and quantum information, which is applied in the field of information security, can solve problems such as complex implementation, low efficiency, and difficulty in protocol implementation, and achieve the effect of overcoming information leakage

Active Publication Date: 2022-03-25
HEBEI UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are some flaws in the existing third-party protocols based on semi-honesty. First, in actual situations, TP will try to eavesdrop on the participants' secrets through various attack methods.
Secondly, the existence of TP adds difficulties to the implementation of the protocol and reduces the efficiency
[0005] At present, there are few results of quantum secret comparison protocols without third-party participation, and the implementation is relatively complicated, and the implementation efficiency needs to be further improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A No-Third-Party Quantum Information Equality Comparison Method Based on Permutation Operation
  • A No-Third-Party Quantum Information Equality Comparison Method Based on Permutation Operation
  • A No-Third-Party Quantum Information Equality Comparison Method Based on Permutation Operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The third-party quantum information equality comparison method based on the replacement operation provided by the present invention, its specific implementation method is as follows:

[0056] Let |S|=r N , and the set S is as follows:

[0057] S={a (1,...,1,1) ,...,a (1,…,1,r) , a (1,...,2,1) ,...,a (1,...,2,r) ,...,a (r,…,r,1) ,...,a (r,…,r,r)}

[0058] Among them, S is an N-order array set, each element in S is taken from the set {0,1}, and both N and r are positive integers.

[0059] The following defines a special permutation operation on the set S

[0060]

[0061] Among them, k i ≤r, i=1,...,N, Wherein, l=1, 2, ..., r. The permutation operation π induces a new permutation operation τ,

[0062]

[0063] The set S here is essentially a set composed of multi-index arrays. In a quantum system, the permutation and transformation of the position of quantum particles can be realized through specific quantum exchange gates. This application provides...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a third-party quantum information equality comparison method based on permutation operation. The invention transforms the secret information into Bell state through encoding, forms a new sequence with the first particle of each Bell state and sends it to the other party. When the other party receives the sequence, use the permutation operation to rearrange the sequence, and then send the result back. Then form a new sequence with the second particle of each Bell state and send it to the other party. After receiving the sequence, both parties rearrange the two received sequences according to the permutation operation. Then the two parties perform 0-1 base measurement on the two received sequences, and obtain the comparison result through calculation. Inserting a decoy state between two transmissions ensures that the presence of an external attacker can be detected. Security analysis shows that both external attackers and internal dishonest cheaters can be effectively overcome. The method provided by the invention can be widely used in the fields of network security, e-commerce and other related information security systems.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a third-party quantum information equality comparison method based on permutation operations. Background technique [0002] Secure multi-party computation is the theoretical basis of distributed cryptography, and it is also a basic problem in distributed computing research. Since Academician Yao Qizhi proposed the concept of secure multi-party computing in the 1980s, this field has become one of the important research contents of modern cryptography. Secure multi-party computing has broad application prospects in financial, military, political, medical and other fields. [0003] Quantum information technology is an interdisciplinary subject resulting from the integration of information science and physical science. The combination of quantum information technology and secure multi-party computing technology has produced a new research hotspot - secure multi-party q...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0852H04L9/0631
Inventor 吴万青
Owner HEBEI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products