Method for realizing information integrity based on continuous quantum walk hash algorithm

A hash algorithm and continuous quantum technology, applied in secure communication devices and key distribution, can solve the problem of low quantum hashing efficiency, and achieve the effect of high security and execution efficiency

Active Publication Date: 2021-03-26
BEIJING UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the construction method is simple, it also guarantees a good collision, but the efficiency of quantum hashing is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing information integrity based on continuous quantum walk hash algorithm
  • Method for realizing information integrity based on continuous quantum walk hash algorithm
  • Method for realizing information integrity based on continuous quantum walk hash algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0038] First, according to the binary message M ∈ {0,1} * bits to select the Hamiltonian:

[0039] 2.1 Set two Hamiltonian operators H 0 = γ 0 L and H 1 = γ 1 L;

[0040] 2.2 In each time period t of walking x -t x-1 Inside, according to the binary message M∈{0,1} * bits to select which Hamiltonian to control the continuous quantum walk on the bounded one-dimensional crystal lattice, if M i =0(i=0,1,2....) select H 0 = γ 0 L, if M i =1(i=0,1,2....) select H 1 = γ 1 L;

[0041] Second, with the message M∈{0,1} * As the input of the hash algorithm, the probability value of walking to the node on the bounded one-dimensional crystal lattice is used as the output of the hash algorithm. The construction process of the hash algorithm to achieve information integrity is as follows:

[0042] 3.1 Select parameters Among them, m represents half o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing information integrity based on a continuous quantum walk hash algorithm. The method comprises the following steps: selecting a Hamiltonian operator according to the bit of a binary message; secondly, constructing a quantum hash algorithm by message control based on continuous quantum walk on bounded one-dimensional crystal lattices to realize information integrity; and finally, analyzing the safety and the efficiency of the constructed quantum hash algorithm by using a simulation experiment. The hash algorithm based on continuous quantum walk hasthe advantages that the efficiency of the quantum hash algorithm is obviously improved when files with the same size are calculated; and the collision performance is lower. According to the method, people can be promoted to construct a new quantum computing model and explore the application of the hash algorithm in the cryptology field to realize information integrity, and the fusion of quantum computing and traditional cryptography is further promoted. Meanwhile, the method can also be used as a key technology for password application such as digital signature and message authentication, andis widely applied to the fields of finance, securities, electronic commerce and the like.

Description

technical field [0001] The invention relates to a construction method for realizing information integrity, in particular to a construction method for realizing information integrity based on continuous time quantum walk hash algorithm on a bounded one-dimensional crystal lattice. The present invention can also be used as a key technology for cryptographic applications such as digital signatures and message authentication, and is widely used in the fields of finance, securities, e-commerce and the like. Background technique [0002] As a strategic resource, information is related to national security and national interests. Therefore, how to ensure information security has become an important research topic for domestic and foreign scholars, and information integrity is one of the important indicators to measure information security. Hash algorithm in cryptography is the core technology to achieve information integrity, and it is also a key technology for cryptographic appli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0643H04L9/0852
Inventor 侍伟敏王烁
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products