Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum signature method based on secret sharing

A secret sharing and quantum technology, applied in the field of quantum signatures based on secret sharing, can solve the problems of high cost, difficulty in preparation and storage of a large number of entangled states, security performance cannot be effectively guaranteed, etc., to achieve improved security and less calculation Effect

Pending Publication Date: 2021-12-28
BEIJING INSTITUTE OF GRAPHIC COMMUNICATION
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In recent years, quantum digital signature schemes have been continuously innovated on the basis of proposed schemes. These schemes can be roughly divided into two categories according to the quantum state. One is designed using the characteristics of quantum entanglement. Quantum transmission is a quantum entangled state. The prohibition principle and the entanglement feature make it easy to detect whether there is a third-party Eve, which greatly improves the unconditional security of digital signatures. The disadvantage is that when the group is too large, it is difficult to prepare and store a large number of entangled states, and the cost is too high
Another solution is the design of entanglement-free signatures. This type of solution is similar to the idea of ​​classical signature algorithms. Most of them use the quantum key distribution process to realize the unconditional security of the key, and use the computing characteristics of quantum mechanics to design efficient and safe signatures. There is no need to prepare a large number of entangled states, and the operation is simple, but its safety performance cannot be effectively guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum signature method based on secret sharing
  • Quantum signature method based on secret sharing
  • Quantum signature method based on secret sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Embodiment 1 of the present invention discloses a quantum signature method based on secret sharing. The method mainly includes three steps of initialization, signature generation, and signature verification. In this embodiment, the signer Alice, the verifier Bob, and a reliable third party Trent ( Arbitrator) for detailed description of the three steps.

[0031] In the initialization step, it mainly includes three steps:

[0032] S11. The third party Trent issues the first key K to the signer Alice through the quantum key distribution protocol AT , issue the second key K to the verifier Bob BT .

[0033] As a preferred solution, the quantum key distribution protocol in this embodiment can use the BB84 protocol to provide unconditionally secure shared keys for Alice and Bob.

[0034] S12. The third-party Trent randomly creates a classic bit string n-bit. The classic bit string n-bit is a string of length n consisting of 0 and 1. Choose any string as the selection bit ...

Embodiment 2

[0049] As an optimization solution, Embodiment 1 can also be extended to multiple quantum signatures, that is, a signer group consisting of multiple signers Alice, a reliable third party Trent, and a verifier Bob. The overall process is that n-1 signer members sign the information M respectively, send the signed information to a reliable third party Trent (third party) for sorting, generate the final signature, and verify it by any verifier after publication. The specific process is as follows:

[0050] initialization:

[0051] (1) Each group member establishes contact with a reliable third party Trent and obtains the corresponding key K TAi , the verifier V and T obtain the key K TV , the key distribution process is the same as the algorithm in Embodiment 1.

[0052] (2) Key C i The distribution process is consistent with the algorithm in Embodiment 1, except that Trent (the third party) creates an n-qubit product state|b 1 ,b 2 ,...,b n >, so that the n-bit qubit b 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum signature method based on secret sharing, which comprises three steps of initialization, signature generation and signature verification, and in the whole process, distribution of secret keys and partial verification and arrangement of signatures are carried out according to a reliable third party. Compared with other quantum signature schemes, the key distribution and encryption of the method do not involve complex encryption methods or complex quantum operations, and the method is more practical and higher in efficiency on the basis of meeting security, unforgeability and non-repudiation.

Description

technical field [0001] The invention relates to the technical field of quantum communication, in particular to a quantum signature method based on secret sharing. Background technique [0002] Digital signature is a method to guarantee the identity of legitimate users, and has the characteristics of anti-tampering, anti-counterfeiting, and non-repudiation. In the Internet age, it has become a necessary means to maintain network security and personal rights, especially the rapid development of blockchain technology, which has higher requirements for the security, efficiency and feasibility of digital signatures. Classical digital signature algorithms are based on mathematical problems such as large number decomposition and discrete logarithm. The rapid development of quantum computers means that classical digital signatures based on mathematically difficult problems are facing great challenges, and the development of quantum signatures has become an irresistible trend. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/60G06N10/00
CPCG06F21/64G06F21/602G06N10/00
Inventor 李祯祯黄秀菊李子臣游福成张珍珍
Owner BEIJING INSTITUTE OF GRAPHIC COMMUNICATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products