Unlock instant, AI-driven research and patent intelligence for your innovation.

Quantum two-party cryptographic protocol construction method irrelevant to measurement equipment

A technology of two-party ciphers and measurement equipment, applied to countermeasures against encryption mechanisms and key distribution, can solve problems such as side channel attacks, hidden dangers of information security, and insecure underlying principles, and achieve the effect of easy implementation and wide applicability

Pending Publication Date: 2021-07-23
NANJING UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, most information security fields use traditional passwords based on complex calculations. With the increase of computer computing power, this brings great hidden dangers to information security.
For example: 1. The secrecy based on computational complexity faces the test of the insecurity of the underlying principle; 2. The secrecy based on quantum mechanics often has the problem of side channel attacks, so how to find a better solution to achieve more perfection Quantum cryptography security schemes become important

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum two-party cryptographic protocol construction method irrelevant to measurement equipment
  • Quantum two-party cryptographic protocol construction method irrelevant to measurement equipment
  • Quantum two-party cryptographic protocol construction method irrelevant to measurement equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention provides a method for constructing a measurement-device-independent quantum two-party cryptographic protocol, and specifically designs two measurement-device-independent protocols based on misestimation, including: 2-out-1 random inadvertent transmission ( ROT) protocol and quantum identification (PID) protocol based on ROT protocol. The following will introduce the flow of the two protocols and specific security proofs.

[0046] The specific design process of the 2 out of 1 arbitrary and inadvertent transmission protocol is as follows:

[0047] Preparation phase: Alice chooses string x n ∈ {0, 1} n and measurement basis Bob also chooses the string y n ∈ {0, 1} n and measurement basis The two parties will encode the quantum state and Sent to third party Charlie.

[0048] Measurement phase: Charlie vs. and For joint Bell state measurements, four photon detectors are used to display the relevant results, as defined by Indicates the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a quantum two-party cryptographic protocol construction method irrelevant to measurement equipment, which comprises the following steps that: two communication parties generate quantum states by using a weak coherent light source, prepare different BB84 states through a polarization modulator, generate decoy states by using an intensity modulator, send the quantum states to a third party, enter a 50:50 beam splitter to interfere, and the light enters the polarization beam splitter and is detected by the photon detector, a detection result is published, and then the two parties carry out corresponding processing according to the result.

Description

technical field [0001] The invention relates to a method for constructing a quantum two-party cryptographic protocol irrelevant to measuring equipment. Background technique [0002] Two-party cryptography is an important branch of modern cryptography, which allows two parties far apart to achieve reliable communication. However, with the advent of quantum computers, this has had a great impact on traditional cryptography based on computational complexity, which of course has greatly affected the enthusiasm for cryptographic communication research. Fortunately, the emergence of quantum cryptography, a product of the combination of quantum mechanics and cryptography, has brought a glimmer of hope to the study of cryptography. The security of quantum cryptography is guaranteed by the characteristics of the basic principles of quantum mechanics, which can achieve unconditional security. Therefore, the research on quantum cryptography is becoming more and more extensive and deep...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/08
CPCH04L9/002H04L9/0852
Inventor 陈力军周自帅江东高潮辉郭宇刘森黄伟聪
Owner NANJING UNIV