Unlock instant, AI-driven research and patent intelligence for your innovation.
Novel arbitration quantum signature method based on XOR encryption and GHZ state
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A new type of quantum technology, applied in the field of quantum communication, can solve the problems of technical realization and application difficulties, and achieve the effect of simple operation
Pending Publication Date: 2022-05-27
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF0 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
However, there are still difficulties in the current technical realization and application
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
example 1
[0061] Example 1: m={011} is a 3-bit message. Suppose that by using the hash function and the key k A Calculated to get t A1 =G 1 (m||k A ) = {010} and t A2 =G 2 (m||k A )={101}. According to the coding rules shown in Table 1, we can get in
[0062] Step 2Alice uses sequence A as a control bit, sequence P A As a target, the CNOT operation is performed to obtain
[0063]
example 2
[0064] Example 2: Let all data be as described in Example 1. Then according to example 1 and step 2, we can get
[0065]
[0066]
[0067]
[0068] Step 3 Through eavesdropping detection technology, Alice safely Send to Bob. Alice, on the other hand, sends message m to Bob over the classical channel.
[0069] Step 4 Through wiretap detection technology, Bob securely receives Bob, on the other hand, receives message m over the classical channel. Finally, Bob will as Alice's signature.
[0070] The signature verification steps mainly include four steps:
[0071] Bob checks the signature with the following verification steps Validity of:
[0072]Step 5Bob uses sequence B as the control bit, and the sequence As the target position, the control NOT gate operation CNOT is performed. This operation can be expressed as
example 3
[0073] Example 3: Let all data be as described in Example 2. Then according to example 2 and verification step 5, we can get
[0074]
[0075]
[0076]
[0077] Step 6Bob sends a message to Trent through eavesdropping detection technology where |m>=|m 1 m 2 ...m n >.
[0078] Example 4: Let all data be as described in Example 1. It can be known from example 1 that |m>=|011>.
[0079] Step 7 Through eavesdropping detection technology, Trent is safely obtained Trent then uses the sequence T as a control bit, while the sequence As the target position, the control NOT gate CNOT operation is performed. The operation can be expressed as:
[0080]
[0081] Example 5: Let all data be as described in Examples 3 and 4. Then according to the verification step 7, we can get
[0082]
[0083]
[0084]
[0085] easy to prove Here, for simplicity, use express Bob, on the other hand, can easily derive m from |m> by measuring each |m with an orthonormal...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides a novel arbitration quantum signature method based on XOR encryption and a GHZ state. The novel arbitration quantum signature method comprises three steps of initialization, signature generation and signature verification. Firstly, an arbiter and a signer use a group of one-way hash functions and share a shared key; secondly, the signer performs quantum coding on the quantum message by using a key control hash function, and performs control NOT gate operation on the quantum message by using a control bit in a GHZ state to generate a quantum signature; and finally, a verifier performs similar XOR operation to verify the signature by using the control bit in the GHZ state. Compared with other arbitration quantum signature methods, key distribution and encryption of the method do not involve complex encryption methods or quantum operations, and forgery attacks and denial attacks can be effectively resisted; on the basis of meeting the requirements of safety, unforgeability and non-repudiation, the method disclosed by the invention is more practical and higher in efficiency.
Description
technical field [0001] The invention relates to the technical field of quantum communication, in particular to a novel arbitration quantum signature method based on XOR encryption and GHZ state. Background technique [0002] A digital signature is a digital analog to a traditional manual signature. It can guarantee the authenticity, integrity and non-repudiation of the electronic information sent by the source. The security of most traditional digital signatures based on mathematical problems relies on mathematically difficult assumptions and cannot deal with the security threats of quantum computers. One of the great advantages of quantum signatures is that their security relies on the fundamental principles of quantum mechanics, which can theoretically deal with the security threats of quantum computers. In 2001, Gottesman and Chuang first proposed the concept of quantum signature and proposed a design scheme of quantum signature. However, in their scheme, the signer's ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.