Multi-user quantum privacy query method with authentication

A query method and multi-user technology, applied in user identity/authority verification, digital transmission systems, secure communication devices, etc., can solve problems such as cheating money, and achieve the effect of improving security

Active Publication Date: 2021-07-13
CHONGQING UNIV OF POSTS & TELECOMM
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in real scenarios, there may be the following situations: (1) Eve may impersonate the identity of the database provider (Alice) to communicate with the user (Bob), and then use illegally obtained data to obtain benefits, or Eve impersonates Bob (2) Eve may directly sneak into the communication between Alice and Bob, negotiate with them inadvertently and eavesdrop on the data purchased by Alice from Bob

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user quantum privacy query method with authentication
  • Multi-user quantum privacy query method with authentication
  • Multi-user quantum privacy query method with authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0066] S301: Suppose there is a position set M={1,2,3,...,(2k+1)N} containing (2k+1)N positions, and each four-particle GHZ state prepared by Bob corresponds to A location in the location set M. The trusted third party Charlie randomly selects a location subset V={v 1 ,v 2 ,...,v N}, V∈M, the identity ID of each bit of Bob, Alice1 and Alice2 is related to each position v i , i=1, 2,..., N are in one-to-one correspondence.

[0067] S302: For each location v in the location subset V i The corresponding identity bits of Bob, Alice1 and Alice2 and The trusted third-party Charlie performs an XOR operation on it, that is, calculates in Indicates the XOR calculation result of the i-th position corresponding to the identity bits of Bob, Alice1 and Alice2, and the calculation result of N positions is expressed as Indicates an XOR operation. After the calculation of Charlie is completed, the trusted third party will V,S ID announced.

[0068] S303: if The four-particl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of quantum communication and quantum cryptography, in particular to a multi-user quantum privacy query method with authentication, which comprises the following steps that: participants negotiate important security parameters; the database provider prepares an initial multi-particle GHZ state and distributes corresponding particles to other participants; all participants perform security detection to verify whether the quantum state is shared securely; a database owner and a user utilize an entanglement swapping technology to convert bidirectional identity authentication between a database and each user into verification of legality of identities of other participants by a trusted third party; if the identity authentication of the participant succeeds, the database provider carries out casual key negotiation with the user; and the database provider and the user carry out key post-processing and complete privacy query. According to the method, an identity authentication mechanism is added, the security of multi-user quantum privacy query is enhanced, database privacy and user privacy of the same level are achieved, and external counterfeit attacks and man-in-the-middle attacks can be defended.

Description

technical field [0001] The invention relates to the fields of quantum communication and quantum cryptography, in particular to a multi-user quantum privacy query method with authentication. Background technique [0002] The security of classical cryptography is guaranteed by computational assumptions and is vulnerable to quantum computers, while quantum cryptography solves this problem, and its security is provided by quantum information theory. Recently, quantum cryptography has brought a new possibility to the problem of Symmetrically Private Information Retrieval (SPIR), that is, Quantum Private Query (QPQ). Specifically, compared with the classic SPIR protocol, the QPQ protocol not only reduces the complexity of communication and calculation, but also is easy to implement with existing technologies. Most of the proposed QPQ protocols, no matter single-user or multi-user QPQ protocols, only focus on the privacy of the database and users, and ignore the active attack of e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0852H04L9/0838H04L9/0869H04L9/3226H04L2209/50
Inventor 肖敏雷术梅杨豪
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products