A multi-user quantum privacy query method with authentication

A query method and multi-user technology, applied in user identity/authority verification, digital transmission systems, secure communication devices, etc., can solve problems such as cheating money, and achieve the effect of improving security

Active Publication Date: 2022-08-05
CHONGQING UNIV OF POSTS & TELECOMM
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in real scenarios, there may be the following situations: (1) Eve may impersonate the identity of the database provider (Alice) to communicate with the user (Bob), and then use illegally obtained data to obtain benefits, or Eve impersonates Bob (2) Eve may directly sneak into the communication between Alice and Bob, negotiate with them inadvertently and eavesdrop on the data purchased by Alice from Bob

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-user quantum privacy query method with authentication
  • A multi-user quantum privacy query method with authentication
  • A multi-user quantum privacy query method with authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0066] S301: Assuming that there is a position set M={1,2,3,...,(2k+1)N} containing (2k+1)N positions, each four-particle GHZ state prepared by Bob corresponds to A position in the set M of positions. The trusted third party Charlie randomly selects a position subset V={v of length N from the position set M={1,2,3,...,(2k+1)N} 1 ,v 2 ,...,v N }, V∈M, the identity ID of each bit of Bob, Alice1 and Alice2 is related to each position v i , i=1,2,...,N one-to-one correspondence.

[0067] S302: For each position v in the position subset V i The corresponding identity bits of Bob, Alice1 and Alice2 and The trusted third party Charlie will XOR it, that is, calculate in Represents the XOR calculation result of the identity bits corresponding to the i-th position of Bob, Alice1 and Alice2, and the calculation result of N positions is expressed as Represents an XOR operation. After Charlie's calculation is completed, then the trusted third party will V,S ID Announced t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the fields of quantum communication and quantum cryptography, in particular to a multi-user quantum privacy query method with authentication, which includes: negotiating important security parameters between participants; a database provider prepares an initial multi-particle GHZ state, and converts corresponding particles into Distributed to other participants; all participants conduct security checks to verify whether the quantum state is safely shared; database owners and users use entanglement exchange technology to convert the two-way authentication between the database and each user into a trusted third party to verify other The legitimacy of the participant's identity; if the participant's identity authentication is successful, the database provider and the user conduct inadvertent key negotiation; the database provider and the user perform key post-processing, and complete the privacy query. The invention adds an identity authentication mechanism to enhance the security of multi-user quantum privacy query, not only has the same level of database privacy and user privacy, but also can defend against external counterfeiting attacks and man-in-the-middle attacks.

Description

technical field [0001] The invention relates to the fields of quantum communication and quantum cryptography, in particular to a multi-user quantum privacy query method with authentication. Background technique [0002] The security of classical cryptography is guaranteed by computational assumptions and is vulnerable to attacks by quantum computers, while quantum cryptography solves this problem with security provided by quantum information theory. Recently, quantum cryptography has brought a new possibility to the Symmetrically Private Information Retrieval (SPIR) problem, namely Quantum Private Query (QPQ). Specifically, compared with the classical SPIR protocol, the QPQ protocol not only reduces the communication and computational complexity, but also is easy to implement with the existing technology. Most of the proposed QPQ protocols, whether it is a single-user or a multi-user QPQ protocol, only focus on the privacy of the database and users, while ignoring the activ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0852H04L9/0838H04L9/0869H04L9/3226H04L2209/50
Inventor 肖敏雷术梅杨豪
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products