Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A quantum arbitration signature method and system based on six-particle teleportation

A teleportation and quantum technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as low particle usage efficiency, no consideration of random numbers, and AQS scheme denial of attacks.

Active Publication Date: 2020-08-04
CHENGDU UNIV OF INFORMATION TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2008, Curty and Lutkenhaus studied the scheme, they claimed that the scheme was not well described and the security analysis was incorrect
In 2011, Gao et al. and Choi et al. proved that existing AQS schemes have forgery and denial attacks
[0005] (1) The particle usage efficiency of the protocol is low, resulting in insufficient practical value of the protocol
[0006] (2) The anti-channel interference ability of the protocol is weak
It is easy to cause quantum resources to degrade or even collapse during the use of the protocol
[0007] (3) The security factor of existing quantum arbitration signature protocols is not high, and most of them cannot resist attack strategies such as interception and retransmission attacks
[0008] (4) None of the existing technical solutions consider the random number problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A quantum arbitration signature method and system based on six-particle teleportation
  • A quantum arbitration signature method and system based on six-particle teleportation
  • A quantum arbitration signature method and system based on six-particle teleportation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] 1. Program theory knowledge

[0087] 1.1 The present invention uses two GHZ states as quantum channels to complete the teleportation of quantum information:

[0088] First, a quantum teleportation protocol based on two three-qubit GHZ states and six-qubit entangled states is established. In the present invention, the difference lies in the prior art, the present invention uses 6 qubits as a quantum channel, Alice performs BSMs on its qubit pairs, and Charlie also performs BSMs operations on its qubits. Suppose Alice, Bob, and Charlie share a six-particle cluster state composed of two 3-particle GHZ states. Alice has qubits 1 and 6, Bob has qubits 2 and 4, and Charlie has qubits 3 and 5 respectively. The six qubit cluster states are described as follows: Alice keeps the two-particle state as: |ψ> AB =(α|00>+β|10>+γ|01>+η|11>) AB . The system state at this time is:

[0089]

[0090] Alice performs Belki measurements on her (A,1) and (B,6) particle pairs, and sh...

Embodiment 2

[0132] Example 2: Protocol Analysis

[0133] 1), the non-repudiation of the signer:

[0134] Assuming that the signer Alice denies her signature, the arbitrator Charlie must be able to discover her dishonesty: Alice’s signature state|S> a contains her key in Only Alice and Charlie can use K ac Perform other operations such as encryption and decryption. Therefore Alice cannot deny her signature.

[0135] 2), the non-repudiation of the confirmer:

[0136] If Bob receives the signature sent by Alice, he cannot deny his acceptance if the agreement is completed normally. In the confirmation phase, Bob needs to use the key K bc For messages (|S> a ,|ψ>′ 1 ) for encryption operations: Bob then sends it to Charlie, who uses the key K bc Decrypt it and restore it. Therefore, the arbitrator Charlie must be able to judge the state of the message |ψ> B Does the key K exist in bc . When Bob receives the message sent back by Charlie, if he wants to get the random number r 2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of quantum arbitration signature technology, and discloses a quantum arbitration signature method and system based on six-particle teleportation. Charlie prepares n pairs of six-particle cluster states, and Charlie shares a key K with Alice and Bob respectively. ac and K bc , Alice or Bob initiates a communication request to Charlie; according to the message M, Alice prepares three |ψ> AB and choose a random number r 1 Use a one-time pad to encrypt three quantum states, and then use K ac encryption|ψ>′ 1 ; Verify the signature. The present invention uses a six-particle entanglement system composed of two three-particle GHZ states, utilizes its own stable entanglement properties to achieve relatively long-term particle preservation, and can better resist noise interference in the quantum channel; through the shared key Yes, strategies to defend against internal and external attacks; build a three-party mutual identity authentication framework through the key pairs shared by the three parties.

Description

technical field [0001] The invention belongs to the technical field of quantum arbitration signatures, in particular to a quantum arbitration signature method and system based on six-particle teleportation. Background technique [0002] At present, the closest existing technology: in the modern information society, the classical cryptographic system based on complex mathematical calculations provides security for various application scenarios. With the rapid development of quantum technology, the emergence of quantum computers will make the existing encryption system vulnerable. Quantum cryptography builds an unconditionally secure cryptographic system based on the physical characteristics of quantum mechanics, such as the uncertainty principle and the quantum uncertainty principle. In 1984, Bennett and Brassard proposed the first quantum key distribution protocol, followed by quantum secret sharing (quantum secretsharing, QSS), quantum teleportation (quantum teleportation,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0852H04L9/0863H04L9/3247
Inventor 张仕斌郑涛昌燕闫丽丽
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products