Multi-user quantum privacy query method with authentication
A query method and multi-user technology, applied in user identity/authority verification, digital transmission systems, secure communication devices, etc., can solve problems such as cheating money, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0066] S301: Suppose there is a position set M={1,2,3,...,(2k+1)N} containing (2k+1)N positions, and each four-particle GHZ state prepared by Bob corresponds to A location in the location set M. The trusted third party Charlie randomly selects a location subset V={v 1 ,v 2 ,...,v N}, V∈M, the identity ID of each bit of Bob, Alice1 and Alice2 is related to each position v i , i=1, 2,..., N are in one-to-one correspondence.
[0067] S302: For each location v in the location subset V i The corresponding identity bits of Bob, Alice1 and Alice2 and The trusted third-party Charlie performs an XOR operation on it, that is, calculates in Indicates the XOR calculation result of the i-th position corresponding to the identity bits of Bob, Alice1 and Alice2, and the calculation result of N positions is expressed as Indicates an XOR operation. After the calculation of Charlie is completed, the trusted third party will V,S ID announced.
[0068] S303: if The four-particl...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com