A multi-user quantum privacy query method with authentication
A query method and multi-user technology, applied in user identity/authority verification, digital transmission systems, secure communication devices, etc., can solve problems such as cheating money, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0066] S301: Assuming that there is a position set M={1,2,3,...,(2k+1)N} containing (2k+1)N positions, each four-particle GHZ state prepared by Bob corresponds to A position in the set M of positions. The trusted third party Charlie randomly selects a position subset V={v of length N from the position set M={1,2,3,...,(2k+1)N} 1 ,v 2 ,...,v N }, V∈M, the identity ID of each bit of Bob, Alice1 and Alice2 is related to each position v i , i=1,2,...,N one-to-one correspondence.
[0067] S302: For each position v in the position subset V i The corresponding identity bits of Bob, Alice1 and Alice2 and The trusted third party Charlie will XOR it, that is, calculate in Represents the XOR calculation result of the identity bits corresponding to the i-th position of Bob, Alice1 and Alice2, and the calculation result of N positions is expressed as Represents an XOR operation. After Charlie's calculation is completed, then the trusted third party will V,S ID Announced t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com