Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum arbitration signature method and system based on six-particle stealth transfer

A teleportation and quantum technology, applied in transmission systems, digital transmission systems, and key distribution, it can solve problems such as incorrect security analysis, degradation of quantum resources, and inability to resist interception and retransmission attacks.

Active Publication Date: 2020-03-24
CHENGDU UNIV OF INFORMATION TECH
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2008, Curty and Lutkenhaus studied the scheme, they claimed that the scheme was not well described and the security analysis was incorrect
In 2011, Gao et al. and Choi et al. proved that existing AQS schemes have forgery and denial attacks
[0005] (1) The particle usage efficiency of the protocol is low, resulting in insufficient practical value of the protocol
[0006] (2) The anti-channel interference ability of the protocol is weak
It is easy to cause quantum resources to degrade or even collapse during the use of the protocol
[0007] (3) The security factor of existing quantum arbitration signature protocols is not high, and most of them cannot resist attack strategies such as interception and retransmission attacks
[0008] (4) None of the existing technical solutions consider the random number problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum arbitration signature method and system based on six-particle stealth transfer
  • Quantum arbitration signature method and system based on six-particle stealth transfer
  • Quantum arbitration signature method and system based on six-particle stealth transfer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] 1. Program theory knowledge

[0087] 1.1 The present invention uses two GHZ states as quantum channels to complete the teleportation of quantum information:

[0088] First, a quantum teleportation protocol based on two three-qubit GHZ states and six-qubit entangled states is established. In the present invention, the difference lies in the prior art, the present invention uses 6 qubits as a quantum channel, Alice performs BSMs on its qubit pairs, and Charlie also performs BSMs operations on its qubits. Suppose Alice, Bob, and Charlie share a six-particle cluster state composed of two 3-particle GHZ states. Alice has qubits 1 and 6, Bob has qubits 2 and 4, and Charlie has qubits 3 and 5 respectively. The six qubit cluster states are described as follows: Alice keeps the two-particle state as: |ψ> AB =(α|00>+β|10>+γ|01>+η|11>) AB . The system state at this time is:

[0089]

[0090] Alice performs Belki measurements on her (A,1) and (B,6) particle pairs, and sh...

Embodiment 2

[0132] Example 2: Protocol Analysis

[0133] 1), the non-repudiation of the signer:

[0134] Assuming that the signer Alice denies her signature, the arbitrator Charlie must be able to discover her dishonesty: Alice’s signature state|S> a contains her key in Only Alice and Charlie can use K ac Perform other operations such as encryption and decryption. Therefore Alice cannot deny her signature.

[0135] 2), the non-repudiation of the confirmer:

[0136] If Bob receives the signature sent by Alice, he cannot deny his acceptance if the agreement is completed normally. In the confirmation phase, Bob needs to use the key K bc For messages (|S> a ,|ψ>′ 1 ) for encryption operations: Bob then sends it to Charlie, who uses the key K bc Decrypt it and restore it. Therefore, the arbitrator Charlie must be able to judge the state of the message |ψ> B Does the key K exist in bc . When Bob receives the message sent back by Charlie, if he wants to get the random number r 2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of quantum arbitration signature and discloses a quantum arbitration signature method and system based on six-particle stealth transfer, and the method comprises the steps: preparing n pairs of six-particle cluster states through Charlie, enabling the Charlie and Alice and Bob to respectively share secret keys Kac and Kbc, and enabling the Alice or Bobto initiate a communication request to the Charlie; preparing three parts of ABs (| psi > AB) according to the message M and Alice, selecting a random number r1, encrypting three parts of quantum states by using a one-time pad password book, and then encrypting the three parts of quantum states by using Kac (| psi > '1); verification signature. A six-particle entanglement system composed of two three-particle GHZ states is used, and the stable entanglement attribute of the six-particle entanglement system is utilized to realize long-term particle storage, so that noise interference existing ina quantum channel can be well resisted; internal attack and external attack strategies are resisted through a shared key pair; a three-party mutual identity authentication framework is established through key pairs shared by three parties respectively.

Description

technical field [0001] The invention belongs to the technical field of quantum arbitration signatures, in particular to a quantum arbitration signature method and system based on six-particle teleportation. Background technique [0002] At present, the closest existing technology: in the modern information society, the classical cryptographic system based on complex mathematical calculations provides security for various application scenarios. With the rapid development of quantum technology, the emergence of quantum computers will make the existing encryption system vulnerable. Quantum cryptography builds an unconditionally secure cryptographic system based on the physical characteristics of quantum mechanics, such as the uncertainty principle and the quantum uncertainty principle. In 1984, Bennett and Brassard proposed the first quantum key distribution protocol, followed by quantum secret sharing (quantum secretsharing, QSS), quantum teleportation (quantum teleportation,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0852H04L9/0863H04L9/3247
Inventor 张仕斌郑涛昌燕闫丽丽
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products