Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Continuous variable quantum secret sharing implementation method capable of autonomously selecting users, electronic equipment and computer readable storage medium

A self-selecting, quantum-secret technology, applied to electrical components and key distribution, can solve problems such as high cost of use, low communication efficiency, and low detection efficiency, and achieve the effects of ensuring security, improving security, and having a wide range of applications

Active Publication Date: 2021-06-29
CENT SOUTH UNIV +1
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Quantum secret sharing protocol is a kind of protocol that uses the knowledge of quantum cryptography to solve the problem of secret sharing. It is one of the main research directions of quantum cryptography. Due to the quantum non-cloning principle and the uncertainty principle, quantum cryptography can realize unconditional information interaction. Compared with traditional encryption, it has higher security; with the increasing number of quantum communication network users, the development of more concise, efficient, multi-user participation quantum communication network architecture and network communication protocols has gradually become a research hotspot, secret sharing is the solution An important technology for key management and multi-party communication, which splits the secret into several sub-secrets in an appropriate form, and the message sender sends the split sub-secrets to the participants arbitrarily, and each participant manages its own sub-secrets independently, only The secret information can only be recovered by the joint cooperation of a certain number of participants, and neither illegal participants nor legal participants less than the specified number can obtain the secret information
[0004] Quantum secret sharing protocols are divided into discrete variable quantum secret sharing protocols and continuous variable quantum secret sharing protocols. Although the discrete variable quantum secret sharing protocol was developed earlier, the information carrier—discrete variable—has the following limitations: 1. It is difficult to prepare. Some discrete variable quantum secret sharing protocols cannot directly obtain single photons in experiments, and can only use weak laser pulses instead of single photons, but the probability of their generation is extremely low; 2. The cost is high and the detection is difficult. Silicon avalanche diodes are used to detect optical fibers In the communication band, the detection efficiency is not high; 3. A large amount of invalid data will be generated, resulting in low communication efficiency; although the continuous variable quantum secret sharing protocol is developed late, its information carrier—continuous variable can effectively overcome the shortcomings of discrete variables. make it more widely used
[0005] Continuous variable quantum state carriers include squeezed state, entangled state, and coherent state. Among them, coherent state is relatively mature in laboratory preparation technology and has low production cost. It encrypts information on the regular component of quantum state and uses high-efficiency homodyne detection or heterodyne detection, the detection method is simple and efficient; however, in the continuous variable quantum secret sharing protocol, each participant has the ability to participate in the recovery of secret information indiscriminately, which cannot satisfy the multi-party communication of specific members in a large group. The use requirements of multiple tasks, and most of the existing continuous variable quantum secret sharing protocols are based on compressed states and entangled states, and the cost of use is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Continuous variable quantum secret sharing implementation method capable of autonomously selecting users, electronic equipment and computer readable storage medium
  • Continuous variable quantum secret sharing implementation method capable of autonomously selecting users, electronic equipment and computer readable storage medium
  • Continuous variable quantum secret sharing implementation method capable of autonomously selecting users, electronic equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0046] The method for implementing continuous variable quantum secret sharing that can independently select users includes the following steps:

[0047] Step 1, all participants generate a dual-mode entangled state, and use the heterodyne detector HED to perform projection measurement on the mode A of the dual-mode entangled state to obtain two regular components Project the modulo B to any coherent state of discrete modulation and send it to the data distributor Dealer. The data distributor uses the double homodyne detector DHD to detect the two regular components of the modulo B coherent state sent by all participants until sufficient Quantitative initial data information;

[0048] Step 2, the data distributor Dealer randomly selects legitimate participants among all participants, and reorders them, and calculates the regular component of the modulo B coherent state when each legitimate participant is the only honest participant based on Split the initial secret informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a continuous variable quantum secret sharing implementation method capable of autonomously selecting users, electronic equipment and a computer readable storage medium. The method comprises the steps: 1, enabling each participant to generate a dual-mode entangled state, carrying out the projection measurement of a mode A in the dual-mode entangled state, and transmitting a mode B to a data distributor to form original data; step 2, the data distributor selects legal participants from all participants, sorts the legal participants, calculates a regular part when each legal participant is a unique honest participant, and splits the initial secret information according to the regular part; 3, the data distributor sends the sub-secret information to each legal participant according to the sequence, and each legal participant processes the sub-secret information to obtain unique sub-secret information; 4, all the legal participants cooperate with one another to recover the initial secret information; according to the invention, the data distributor can autonomously select part of participants for communication, and the communication safety is improved.

Description

technical field [0001] The invention belongs to the technical field of quantum secret sharing, and relates to a continuous variable quantum secret sharing realization method capable of independently selecting users, electronic equipment and a computer-readable storage medium. Background technique [0002] With the increasing development of scientific information technology, information resources occupy an important strategic position, and the confidentiality and security of information data transmission are getting more and more attention. The importance of information security to individuals, society and even the country is self-evident. Cryptography is a common method to ensure secure communication. Quantum cryptography has become an important research field in the branch of cryptography because it can realize unconditional information exchange. [0003] The quantum secret sharing protocol is a kind of protocol that uses the knowledge of quantum cryptography to solve the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0838H04L9/085
Inventor 黎胤王一军贾冰周正春郭迎
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products