Unlock instant, AI-driven research and patent intelligence for your innovation.

Two-party safe semi-quantum summation method for resisting collective dephasing noise

A phase noise, collective technology, applied in the field of quantum cryptography, can solve problems such as not considering the negative effects of noise

Active Publication Date: 2021-12-07
ZHEJIANG GONGSHANG UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the semi-quantum summation method of Zhang et al. [20] does not consider the negative impact of noise and is only applicable to ideal noise-free quantum channels

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-party safe semi-quantum summation method for resisting collective dephasing noise
  • Two-party safe semi-quantum summation method for resisting collective dephasing noise
  • Two-party safe semi-quantum summation method for resisting collective dephasing noise

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0118] 1 example of the application of the method of the present invention

[0119] Now we use an example to further explain the principle of summation. assuming x j = 0 and y j =1. Assume that Alice's measurement of the corresponding particle of the jth particle group is |0 dp >, then is 0; suppose Bob’s measurement result of the corresponding particle of the jth particle group is |1 dp >, then is 1. Therefore, according to formula (7), the measurement result of TP on the jth particle group should be or thus get therefore, Alice(Bob) calculation Then, Alice (Bob) sends Tell TP. TP is calculated by Get the summation result.

[0120] 2 Discussion and conclusion

[0121] We first discuss qubit efficiency [34], whose definition

[0122]

[0123] where c is the number of classical bits to sum and q is the number of qubits consumed. In the method of the present invention, the length of Alice's secret binary sequence and the length of Bob's secret binar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a two-party safe semi-quantum summation method for resisting collective dephasing noise, so that two classic communicators can realize summing of their secret binary sequences under the help of a quantum semi-loyal third party. 'Semi-loyalty' means that a third party is allowed to initiate an attack as his / her own will but cannot collude with any other person. According to the method, a random key does not need to be shared between any two parties in advance, and a logic quantum bit is adopted as an information carrier to overcome the negative influence of collective dephasing noise. Security analysis shows that the method provided by the invention can effectively prevent external attack of Eve and attack of participants of a third party and a non-loyal communicator. The method of the invention can be easily applied to semi-quantum privacy comparison.

Description

technical field [0001] The invention relates to the field of quantum cryptography. The invention designs a two-party safe semi-quantum summation method against collective dephasing noise, so that two classical communicators can realize the summation of their secret binary sequences with the help of a quantum semi-loyal third party. Background technique [0002] As a basic branch of quantum secure computing, the secure quantum summation problem can be described as: n users, P 1 ,P 2 ,...,P n , each with a secret input X 1 ,X 2 ,...,X n , think in X 1 ,X 2 ,...,X n Computing X on a secure basis without being compromised 1 ,X 2 ,...,X n The sum of the sum(X 1 ,X 2 ,...,X n ). Recently, many researchers have devoted so much enthusiasm to secure quantum sums that secure quantum sums have been developed to a considerable extent. Heinrich introduced quantum summation into integrals in 2002 [1], and then studied repeatable quantum Boolean functions in the worst avera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04B10/70H04B10/85H04L9/08
CPCH04B10/70H04B10/85H04L9/0858
Inventor 叶天语徐天婕耿茂洁陈颖
Owner ZHEJIANG GONGSHANG UNIVERSITY