Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure multi-party quantum computing method based on quantum Fourier transform

A technology of Fourier transform and quantum computing, which is applied in the field of quantum computing, can solve problems such as difficulty in realization, leakage of secret numbers, and many quantum resources, and achieve practical significance, make up for security loopholes, and be simple to operate

Pending Publication Date: 2022-07-08
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the participant who is responsible for preparing the entangled state of d-dimensional n particles first performs the inverse transform of the discrete quantum Fourier transform on the particles in the entangled state, and then transmits the prepared particles to other participants, the secret number of other participants may be leaked
The second solution consumes more quantum resources, and requires the client to have the ability to prepare quantum states and complex quantum operations, which is difficult to implement in practice

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure multi-party quantum computing method based on quantum Fourier transform
  • Secure multi-party quantum computing method based on quantum Fourier transform
  • Secure multi-party quantum computing method based on quantum Fourier transform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make those skilled in the art better understand the solutions of the embodiments of the present invention, the following is combined with the following appendixes. Figure 1-3 The embodiments of the present invention will be further described in detail with reference to the implementation manner. Embodiment 1 of the present invention provides a method for realizing secure multi-party quantum computing, including a server and n clients P 1 , P 2 ,...,P n , client P i Each has a secret number x i , where x i ∈ {0,1,...,N}, i=1,...,n.

[0024] as attached figure 1 As shown, n clients jointly construct N+1 blinding matrices B 0 , B 1 ,…,B N , for each blinding matrix B j , j=0,1,...,N. Client P i Build its i-th row element, which is P i Randomly generate n positive integers as matrix B j The i-th row element of , and satisfy Blind Matrix B j The form is as follows:

[0025]

[0026] for matrix B j The i-th row element of If t=i, then th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing secure multi-party quantum computing based on quantum Fourier transform, which comprises the following steps: a server has a secret number xi with n clients P1, P2,..., Pn and a client Pi respectively, xi belongs to {0, 1,..., N}, and i = 1,..., n; the client Pi holds a secret sequence Ai, and the server prepares N + 1 d-level n-particle entangled states omegagt; j, and omega gt; the particles in the j are sent to the client Pi; when j is equal to xi, the client Pi performs unitary operation U (1 + aij) on the particles, and when j is not equal to xi, the client Pi performs unitary operation U (aij) on the particles, and returns the operated particles to the server; the server measures the particle and records the measurement result to calculate the serial number of the secret number xi from small to large in all the secret numbers; or calculating to obtain the sum of all secret numbers xi. According to the invention, safe quantum secret serial number solving and summation calculation can be realized, and the complexity of client operation can be effectively reduced.

Description

technical field [0001] The invention relates to the field of quantum computing, in particular to a method for secure multi-party quantum computing based on quantum Fourier transform. Background technique [0002] Secure multi-party quantum computing is a method design that applies some basic principles of quantum mechanics to secure multi-party computing, so that while completing the function of secure multi-party computing, the computing method can resist the attack of quantum computing and has better security performance. Secure multi-party quantum summation is a fundamental problem of secure multi-party quantum computing. The problem of how to safely calculate the sum of secret numbers can be used to construct other secure multi-party computing methods with more complex structures. [0003] At present, there are two main approaches for researchers to conduct theoretical and experimental research on secure multi-party quantum summation based on quantum Fourier transform: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06N10/60
CPCG06N10/00
Inventor 曹聪易鑫樊玲
Owner BEIJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More