Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

54 results about "Quantum walk" patented technology

Quantum walks are quantum analogues of classical random walks. In contrast to the classical random walk, where the walker occupies definite states and the randomness arises due to stochastic transitions between states, in quantum walks randomness arises through: (1) quantum superposition of states, (2) non-random, reversible unitary evolution and (3) collapse of the wave function due to state measurements.

Arbitration quantum signature method based on glass color sampling random unitary operation

The invention discloses an arbitration quantum signature method based on glass color sampling random unitary operation. The arbitration quantum signature method comprises an initialization stage, a signature stage and a verification stage. The initialization stage is used for preparing a secret key and establishing a communication system; the signature stage is used for selecting a proper signature algorithm to design the signature of the transmission information; and the verification stage is used for verifying the validity of the signer and the integrity and authenticity of original information. According to the invention, unitary operation encryption based on glass color sampling is adopted in the signature of transmission information designed in arbitration quantum signature; an m-modequantum state is transferred by adopting quantum walk invisible transmission based on a graph, a necessary entanglement state for invisible transmission does not need to be prepared in advance, the safety is higher by adopting a common channel and a random tuple, and a glass color sampling model and a quantum walk invisible transmission model are proved to be realized through a linear optical network; and therefore, the method disclosed by the invention is high in safety, resource-saving and easy to implement in experiment.
Owner:CENT SOUTH UNIV

Unentangled quantum blind signature method and system based on quantum walking

ActiveCN110213060AProven robustnessAchieve the effect of one-time pad (OTP)Key distribution for secure communicationUser identity/authority verificationE-commerceBlind signature
The invention belongs to the technical field of quantum information processing, and discloses an unentangled quantum blind signature method and system based on quantum walking, and the method comprises the steps: carrying out the coding and blind information through employing four single event states in combination with a blind coding rule of a message in the coding stage of the message; in the invisible transmission process of the coded particles, using quantum walking to achieve invisible transmission of the coded particles, wherein entanglement is spontaneously generated on the invisible transmission seed particles, which is used for resisting negative attacks of signers and denial attacks of verifiers and further used for preventing attackers from forgery signatures. The method comprises secret key updating, the effect of one-time encryption (OTP) is achieved, and therefore a next execution scheme does not need secret key redistribution any more; security analysis shows that the scheme of the invention satisfies the characteristics of unforgeability, undeniable property and blindness, can also resist entanglement attack, and is very suitable for use in electronic commerce or electronic payment systems.
Owner:芽米科技(广州)有限公司

Image encryption compression method based on discrete quantum walk and Chinese remainder theorem

The invention relates to an image encryption compression method based on a discrete quantum walk and a Chinese remainder theorem. The method comprises two phases: a secret key generation phase, i.e., generating probability distribution by use of a linear single particle one-dimensional discrete quantum random walk (QRW), and converting the probability distribution into a secret key matrix capable of encryption; and an image encryption compression phase, i.e., compressing an image by use of the generated secret key matrix and the Chinese remainder theorem. XOR operation is performed on an obtained encryption secret key and an original image, afterwards, Arnold transformation is performed on an obtained image. Diffusion and compression are carried out on a scrambling image according to a given compression ratio k by use of the Chinese remainder theorem. Compared to an image encryption compression scheme based on chaos and optics, the method provided by the invention has higher safety and better compression performance. The greatest advantage of the algorithm is that a theoretical infinite large secret key space can be generated so as to oppose a violent attack capability. Various performance comparisons indicate that the algorithm is better than prior research and can better satisfy actual demands.
Owner:BEIJING UNIV OF TECH

Image encryption method based on on-ring two particle one-dimensional discrete quantum walk

The invention relates to an image encryption method based on on-ring two particle one-dimensional discrete quantum walk. The purpose is to guarantee safety and high efficiency of an image encryption algorithm and effectively protect an image. The method includes the steps that (1), on-ring two particle one-dimensional discrete quantum walk is used for generating a secrete key matrix; the on-ring two particle one-dimensional discrete quantum walk is operated to generate probability distribution which is converted to a secrete key sequence S, and the sequence S is converted into a matrix P; (2), the image is encrypted, logic exclusive or is performed on the matrix P and the original image I to generate a mixed image E, M values and N values are randomly and respectively selected from the sequence S, so that a sequence X and a sequence Y are respectively obtained, and ascending sort is performed on the two sequences to respectively obtain two new sequences. The two new sequences IX and IY are used for rearranging the encrypted image E to obtain a final encrypted image E'. Compared with an existing image encryption method, the image encryption method is easier to operate, higher in speed, better in performance and encryption quality and capable of meeting practical needs better.
Owner:BEIJING UNIV OF TECH

Quantum walking-based quantum secret sharing method and system with credible authentication

The invention provides a quantum walking-based quantum secret sharing method with credible authentication. The method comprises the following steps: a secret participation end preparing single photonsequences SB and SC, encoding the SB and SC according to an identity authentication key of the secret participation end to obtain SB' and SC ', and sending the SB' and SC' to a secret distribution end; the secret distribution end authenticating the identity of the secret distribution end based on the identity authentication key of the secret participation end; the secret distribution end constructing two quantum walking systems based on the SB and the SC, encoding secret information to be shared to the SB and the SC, and recording secret information encoding particles as MB and MC; the secretdistribution end invisibly transmitting the MB and the MC to the secret participation end; the secret participation ends cooperating with each other to complete identity authentication of the secret distribution end and reconstruction of secret information. According to the trusted identity authentication function and the quantum walking circuit, the safety and practicability of the quantum secretsharing method and system can be improved, and interception/retransmission attacks, entanglement attacks, participant attacks and pretending attacks from the inside and the outside are avoided.
Owner:龙图腾网科技(合肥)股份有限公司

Traffic flow characteristic modal decomposition method based on generation-filtering mechanism

The invention discloses a traffic flow characteristic modal decomposition method based on a generation-filtering mechanism, and the method comprises the steps: firstly enabling a high-speed traffic flow to serve as a closed traffic system, enabling each driver to serve as an independent particle according to the randomness of the drivers, simulating a path track, and calculating the probability distribution of the track according to the probability distribution of the track under different parameters; obtaining a corresponding traffic mode; secondly, taking different quantum random walk parameters, obtaining time evolution of traffic flow probability distribution caused by different driving modes on the stations, and then transforming the different stations to form the high-speed traffic flow mode set; and finally, screening the generated traffic modes according to the actually observed traffic flow data, and inverting to obtain the mode structure of the traffic flow. The complex structure and multi-modal characteristics of the traffic flow are disclosed from the perspective of multi-scale decomposition, a certain reference is provided for traffic management, prediction and regulation, and the method has great significance in solving various traffic problems faced by the current society.
Owner:NANJING NORMAL UNIVERSITY

Robust image watermarking method based on quantum random walk and discrete wavelet transform

The invention discloses a robust image watermarking method based on quantum random walk and discrete wavelet transform, and aims to improve robustness and select to embed watermarks in a frequency domain. The discrete wavelet transform has the advantages that the discrete wavelet transform has good discreteness and spatial locality; important information in the image is compressed through discrete cosine transform, and the important information is concentrated and stepwise on the upper left portion of a coefficient matrix. The SVD coefficients provide high robustness, visual quality, and data payload. Second-level discrete wavelet transform is applied to a carrier image, and watermark embedding is completed in a high-frequency coefficient HH2 of the carrier image, so that the robustness of the watermark is ensured, and better visual quality of the carrier image is kept. After 2-DWT is carried out on a carrier image, the carrier image is divided into blocks, DCT operation is carried out on each block, and main energy of the image is further extracted. In order to not influence the visual quality as far as possible, the watermarking is embedded in the alternating current coefficient, and the watermarking is embedded into the singular value of the block by performing singular value decomposition on the watermarking.
Owner:BEIJING UNIV OF TECH

Method for realizing information integrity based on continuous quantum walk hash algorithm

The invention discloses a method for realizing information integrity based on a continuous quantum walk hash algorithm. The method comprises the following steps: selecting a Hamiltonian operator according to the bit of a binary message; secondly, constructing a quantum hash algorithm by message control based on continuous quantum walk on bounded one-dimensional crystal lattices to realize information integrity; and finally, analyzing the safety and the efficiency of the constructed quantum hash algorithm by using a simulation experiment. The hash algorithm based on continuous quantum walk hasthe advantages that the efficiency of the quantum hash algorithm is obviously improved when files with the same size are calculated; and the collision performance is lower. According to the method, people can be promoted to construct a new quantum computing model and explore the application of the hash algorithm in the cryptology field to realize information integrity, and the fusion of quantum computing and traditional cryptography is further promoted. Meanwhile, the method can also be used as a key technology for password application such as digital signature and message authentication, andis widely applied to the fields of finance, securities, electronic commerce and the like.
Owner:BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products