Secure multi-party computing method based on verifiable blind quantum computing

A secure multi-party computing and quantum computing technology, applied in the field of secure multi-party computing based on verifiable blind quantum computing, can solve problems such as high resource consumption, high requirements for customers' quantum capabilities, and low security, achieving high security and practicality. The effect of flexibility, high scalability and practicality

Pending Publication Date: 2021-11-26
CHONGQING UNIV OF POSTS & TELECOMM
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problems of large resource consumption, high requirements for customers' quantum capabilities and low security in the current secure two-party computing based on verifiable blind quantum computing, the present invention proposes a secure multi-party computing based on verifiable blind quantum computing The method includes three stages: system initialization, quantum state calculation and result output;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure multi-party computing method based on verifiable blind quantum computing
  • Secure multi-party computing method based on verifiable blind quantum computing
  • Secure multi-party computing method based on verifiable blind quantum computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] In view of the large resource consumption in the current secure two-party computing based on verifiable blind quantum computing, the demand for quantum capabilities on the client side is large, the security needs to be improved, and the expansion of line difference and other issues. This method reduces resource consumption by 50%; Alice's quantum ability requirements are reduced from preparing a single quantum state |+> to only needing to prepare {|0>,|1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of quantum cryptography, and particularly relates to a secure multi-party computing method based on verifiable blind quantum computation. The secure multi-party computing method comprises the three stages that the first stage is a preparation stage, and in the preparation stage, an S (T) graph is systematically generated and generated quantum bits are subjected to data encryption processing; the second stage is a calculation stage, and the final output quantum state is calculated according to the actually measured angle by calculating the actually measured angle; and the third stage is an output stage, in the output stage, trap quantum bits are checked through Alice to determine a correct calculation result, and the result is output. According to the method, the number of participated clients is expanded from two clients to multiple clients, the requirement of multi-party calculation can be met, and the method has higher expansibility and practicability.

Description

technical field [0001] The invention belongs to the field of quantum cryptography, and in particular relates to a secure multi-party computing method based on verifiable blind quantum computing. Background technique [0002] The classic safe two-party problem, namely the millionaire problem, mainly studies the problem of knowing which of the two millionaires is richer without disclosing their specific wealth values ​​in the early stage. Based on this problem model, more and more secure multi-party computation protocols have been proposed. As an important part of cryptography, classical secure multi-party computing refers to multiple users who do not trust each other to complete computing tasks together and ensure their privacy is not disclosed. [0003] With the continuous improvement of customers' demand for computer computing power, the demand for entrusted computing in the form of cloud computing is increasing day by day. Quantum computing, as an emerging computing mode...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06N10/00
CPCH04L9/0852H04L9/0869H04L9/0863G06N10/00
Inventor 何兴平宋秀丽李闯
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products