Quantum walking-based quantum secret sharing method and system with credible authentication

A quantum walk, quantum secret technology, applied in photon quantum communication, transmission system, digital transmission system and other directions, can solve the problem of secret information leakage, avoid attacks, prevent the acquisition of valid information, and resist interception/retransmission attacks.

Active Publication Date: 2020-07-10
龙图腾网科技(合肥)股份有限公司
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, illegals can issue false orders by pretending to be the secret distribution end, instructing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum walking-based quantum secret sharing method and system with credible authentication
  • Quantum walking-based quantum secret sharing method and system with credible authentication
  • Quantum walking-based quantum secret sharing method and system with credible authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0105] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0106] Such as figure 2 As shown, in the embodiment of the present invention, Alice is the secret distribution end, and Bob and Charlie are the secret participation ends. The method includes five stages: particle preparation stage, identity authentication stage, secret information encoding stage, secret information distribution stage and secret information recovery stage. Specifically include the following steps:

[0107] In the first step, Bob and Charlie randomly prepare N-bit single photons, each single photon is randomly located in {|0>,|1>, |+>,|->}, and the two qubit sequences formed are respectively denoted as S B and S C .

[0108] In the second step, Bob uses his identity authentication key h Bob (S ID-Bob ) to S B Each photon in performs the following operations: if h Bob (S ID-Bob ) with the i-th value of 0, then for the qubit sequ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a quantum walking-based quantum secret sharing method with credible authentication. The method comprises the following steps: a secret participation end preparing single photonsequences SB and SC, encoding the SB and SC according to an identity authentication key of the secret participation end to obtain SB' and SC ', and sending the SB' and SC' to a secret distribution end; the secret distribution end authenticating the identity of the secret distribution end based on the identity authentication key of the secret participation end; the secret distribution end constructing two quantum walking systems based on the SB and the SC, encoding secret information to be shared to the SB and the SC, and recording secret information encoding particles as MB and MC; the secretdistribution end invisibly transmitting the MB and the MC to the secret participation end; the secret participation ends cooperating with each other to complete identity authentication of the secret distribution end and reconstruction of secret information. According to the trusted identity authentication function and the quantum walking circuit, the safety and practicability of the quantum secretsharing method and system can be improved, and interception/retransmission attacks, entanglement attacks, participant attacks and pretending attacks from the inside and the outside are avoided.

Description

technical field [0001] The invention belongs to the technical field of quantum information sharing, and in particular relates to a quantum secret sharing method and system with credible authentication based on quantum walks. Background technique [0002] Quantum Secret Sharing (QSS) is a combination of classical secret sharing and quantum theory, which allows secret information to be distributed, transmitted and recovered through quantum operations (classical information or quantum encoded information). Suppose Alice wants to hand over secret plans to Bob and Charlie at a distance, but she doesn't fully trust Bob and Charlie. The secret sharing protocol plays an important role in the above situation, and the security of QSS is based on the basis of quantum mechanics, which makes QSS more secure than traditional secret sharing. The earliest QSS scheme was proposed by Hillery et al. in 1999, and they used Greenberger-Horne-Zeilinger (GHZ) entangled states to complete secret s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04B10/70
CPCH04B10/70H04L9/085H04L9/0852H04L9/0858H04L9/32
Inventor 昌燕李雪杨张仕斌
Owner 龙图腾网科技(合肥)股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products