CN107493295A - A kind of different account number safety login method based on blind quantum calculation - Google Patents
A kind of different account number safety login method based on blind quantum calculation Download PDFInfo
- Publication number
- CN107493295A CN107493295A CN201710793910.3A CN201710793910A CN107493295A CN 107493295 A CN107493295 A CN 107493295A CN 201710793910 A CN201710793910 A CN 201710793910A CN 107493295 A CN107493295 A CN 107493295A
- Authority
- CN
- China
- Prior art keywords
- server
- client
- quantum
- state
- bel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of different account number safety login method based on blind quantum calculation, including:Step 1:Client sends account and password and carries out login authentication to first server;Step 2:After logining successfully, client sends access request on the login interface of second server to first server, and application uses accounts information of the client in first server;Step 3:The accounts information that first server sends client gives quantum server;Step 4:Quantum server carries out blind quantum calculation to accounts information according to the blind quantum calculation agreement of single server classics client and handles the accounts information after being blinded, and is transmitted to second server;Step 5:Second server is logged in after receiving the application access information of first server transmission using the accounts information after blinding, open applications are serviced to client after logging in successfully, pass through the method for the invention, realize that account is shared and the secrecy of accounts information, improve the safe class of accounts information.
Description
Technical field
The present invention relates to quantum communication technical field, more particularly to a kind of different account number safety based on blind quantum calculation to log in
Method.
Background technology
Society enters the information age, and internet is growing, and the various application APP of in the market and website are more next
More, if the APP of each different application or website are required for applying different accounts, this can cause certain journey to user
Trouble on degree, and too many account number cipher information is also not easy to remember.By probing into, the main difficulty of the problem is exactly such as
Where ensure to reach " account is shared " in the case of user information confidentiality.
Blind quantum calculation (Blind Quantum Computation) refer to client in not enough quantum abilities or
In the case of person's quantum calculation ability, the quantum service provider that quantum task is submitted to distal end performs, but not reveals oneself
A kind of quantum calculation model of input, output and algorithm.Blind quantum calculation is in fact at quantum cryptography concept and quantal data
A kind of combination of reason.It is well known that classical cryptoraphy is often built upon on the basis of some difficult math question, can only achieve to count
Calculate safety.Theoretical research shows that the blind this data safety for calculating user can reach unconditional security.Because quantum resource has
Limit, in the future for a comparatively long period of time, may only have a small number of mechanisms just to possess quantum computer, the quantum ability of domestic consumer
It is very limited, how to allow domestic consumer also can application solutions quantum calculation will likely be a long period problems faced.It is blind
The appearance of quantum calculation, exactly in order to solve this problem, no quantum ability or quantum user limited in one's ability can borrow
Help long-range quantum computer to realize quantum calculation, while can guarantee that its input, output data and algorithm security.Therefore, blind quantum
Agreement is calculated to be likely to turn into first generation quantum calculation model.Currently, blind quantum calculation progressively moves towards real from theoretical research
Apply on border.According to the difference of implementation pattern, mainly have based on line mode and quantum measurement pattern, the quantum calculation based on measurement
Also referred to as unidirectional quantum calculation, both of which have identical computing capability.The implementation pattern of blind quantum calculation and cloud computing class
Seemingly, therefore generally domestic consumer is referred to as client, quantum computer is referred to as server.
At present, although having had many advanced quantum calculation technologies and theory now, for quantum calculation technology
Actual application scheme but can be counted on one's fingers, in order to tackle a variety of APP differences accounts and to perplexing problem caused by user, there is provided one
Kind ensures that realizing account while accounts information confidentiality shares based on blind quantum calculation.
The content of the invention
In order to tackle a variety of APP differences accounts to problem is perplexed caused by user, it is necessary to provide one kind in fact based on blind
The different account number safety login method of quantum calculation, realize the safety that user account information has also been ensured while account is shared
Property.
A kind of different account number safety login method based on blind quantum calculation provided by the invention, including:
Step 1:Client sends account and password and carries out login authentication to first server;
Step 2:After logining successfully, the client is sent out on the login interface of second server to the first server
Go out access request, accounts information of the application using the client in the first server;
The accounts information comprises at least account and password of the client in the first server;
Step 3:The accounts information that the first server sends the client by trusted party gives quantum server;
Step 4:The quantum server is believed the account according to the blind quantum calculation agreement of single server classics client
Breath carries out blind quantum calculation and handles the accounts information after being blinded, and is transmitted to the second service by the trusted party
Device;
Step 5:The second server is received after the application access information that the first server is sent using described
Accounts information after blinding is logged in, and open applications are serviced to the client after logging in successfully.
Accounts information after blinding is to carry out quantum coding processing to accounts information, is to be represented with the form of quantum, still
Account information is substantially still fallen within, is directly to be used on second server, and second server can not be informed in
The particular content of accounts information on one server, second server will log in account depending on client and then provide application
Service.
Above-mentioned client register account number in first server, and apply accessing the using the accounts information of first server
Two servers, so that second server is to client open applications service, and then realizes and client is shared on second server
In the account of first server;Quantum server possesses quantum ability, is responsible for believing account of the client in first server
Breath carries out blind quantum calculation processing.
Preferably, the process of login authentication is as follows in the step 1:
First, the client receives the quantum bit A that trusted party is sentw、Au, and from the quantum bit A of receptionw、Au
Middle selected part qubit gives the first server, and the first server is by the quantum bit of reception according to reception
Order is arranged to two groups of quantum bits
Wherein, first group of quantum bitFor the account of client, second group of quantum bitFor the password of client, 1≤si≤n,1≤ti≤n,i∈{1,2,···,m};N, m is
Positive integer, m represent the quantity of every group of quantum bit;
Trusted party prepares 2n Bel's state and is divided into two groups of Bel's states, wherein first group of Bel's state is | ψ0,0(B1w,Aw)
>, w=1,2, n, second group of Bel's state be | ψ0,0(B2u,Au)>, u=1,2, n, n represent every group of Bel's state
The quantity of middle Bel's state;
Wherein, B1wRepresent first quantum bit of w-th of Bel's state in first group of Bel's state, AwRepresent first group of Bel
Second quantum bit of w-th of Bel's state, B2 in stateuRepresent first quantum of u-th of Bel's state in second group of Bel's state
Bit, AuRepresent second quantum bit of u-th of Bel's state in second group of Bel's state;
Trusted party is by quantum bit B1wSecond server is sent to, by quantum bit AwAnd AuIt is sent to the client
End, by quantum bit B2uQuantum server is sent to, n=(2+ δ) m, δ > 0 is preset parameter;
Finally, the first server is to all in two groups of quantum bitsWithBel's state measurement is performed successively to obtain
M group measurement resultsAnd by m group measurement resultsIt is sent to the client;
It is if allMeasurement resultIt is (0,0), then the account of the client and password authentification is led to
Cross;
Wherein,Represent respectivelyMeasurement result.
When client elder generation quantum bit is to first server, first quantum bit corresponding to transmission account, is retransmited close
Quantum bit corresponding to code, and client selected part qubit to the first server is entered according to preset rules
Row is chosen, and preset rules are set when being according to client registers account, it is therefore an objective to which client is selected when account logs in sends out
Send with account corresponding to one group of quantum bit it is identical with quantum bit corresponding to one group of same account being randomly provided during registration,
One group of same password being randomly provided when the selected one group of quantum bit sending corresponding to password of client is with registering is corresponding
Quantum bit it is identical, selected amount in the quantum bit that client is sent from trusted party when different accounts, password in addition
Sub- bit is different, and when account and password mismatch, the measurement result after Bel's state measurement is carried out to two groups of quantum bitsIn there will be the situation for being unsatisfactory for (0,0), account login authentication failure, therefore measured based on Bel's state, client can
Effectively to carry out account login authentication;Trusted party is the third party authoritative institution unrelated with network service behavior, is credible
Bad third party device, its 2n Bel's state prepared establish the information between client, second server, quantum server
Link.
Preferably, the process that access request is sent in the step 2 is as follows:
The client is based on entanglement transfer technology and according to each measurement resultKnow quantum bitNew composite stateAndWithValue, the client willWithValue be sent to
The first server;
Wherein,WithFor representing that the client request uses account of the client in the first server
The accessing request information of family information.
The quantum bit B1 that second server distributes trusted partywCan be as the characteristic information of login interface, client
End gets quantum bit according to measurement resultNew composite stateIt is achieved thereby that
The access request of request accounts information is sent on the log-in interface of second server to first server.In addition, when client
Account and password could be sent out after being verified in first server on the log-in interface of second server to first server
Access request is sent, first server also just can send account information by trusted party and give quantum server.IfSurvey
It is (0,0) to measure result, then quantum bit canIt is expressed as WithValue all be 0.
Preferably, the process that quantum server is blinded to accounts information described in the step 4 is as follows:
First, the quantum server obtains the accounts information represented with classical information;
Wherein, accounts information is
θkRandomly selected from set S, S=(K π)/4 | and K=0,1,7 };
As k ∈ { s1,s2,···,smWhen, the z in accounts informationk、xkBy the first server from the client
ObtainWithValue determine, si∈{s1,s2,···,sm};
As k ∈ { 1,2, n }-{ s1,s2,···,smWhen, randomly select { zk,xk}∈{0,1}2;
Finally, the quantum server is according to accounts informationObtain measurement base { ± θ 'k,
In the measurement base { ± θ 'kOn the basis of measure trusted party send quantum bit B2u, obtain measurement result
Wherein, the measurement resultFor the accounts information blinded.
Beneficial effect:
The invention provides a kind of different account number safety login method based on blind quantum calculation, by client in the first clothes
After account logs in successfully on business device, client on the log-in interface of second server requesting client in first server
Accounts information, second server get the Shen of accounts information and first server after quantum server blinds processing
Login account after please accessing, and then corresponding application service is provided to client, realize and be total to the account in first server
Enjoy to second server, client need not re-register account, while get second server by blind quantum calculation
Be accounts information after blinding, it can not get the particular content of accounts information, and then realize the secrecy of accounts information,
Quantum advantage is taken full advantage of, quantum calculation technology is applied in a brand-new practical application area, expands quantum meter
The practical ranges of calculation technology.
Brief description of the drawings
Fig. 1 is a kind of signal stream of different account number safety login method based on blind quantum calculation provided in an embodiment of the present invention
Cheng Tu.
Embodiment
It is following that the present invention will be further illustrated in conjunction with specific embodiments.
The embodiment of the present invention is that the theory based on blind quantum realizes that account between different application is shared and information privacy.
Wherein, client (Alice) register account number in first server (Server1) in the present invention, and apply using
Server1 accounts information accesses second server (Server2), and ensures that Server1 accounts information is to Server2
It is kept absolutely secret.
Quantum server (Bob) possesses quantum ability, is responsible for carrying out blind quantum calculation processing to Alice accounts information.
Trusted party (Trusted Center) is the third party authoritative institution unrelated with network service behavior, and being must can
The third party of trust.
First server (Server1) possesses Alice accounts information, when Alice applies for accessing Server2,
Server1 is responsible for verifying Alice accounts information, and is got in touch with Trusted Center.
Second server (Server2) is for accounts information after trusted party encrypts Bob and from Server1
Access request when being sent to Server2, result is fed back to Server1 by Server2, and its application service is opened to Alice.
Based on the function of above-mentioned 5 participants, such as Fig. 1, a kind of different account peace based on blind quantum calculation in the present embodiment
Full login method, comprises the following steps:
Step 11:Trusted party be prepared for 2n Bel's state and send quantum bit to client, second server and
Quantum server;
Specifically, 2n Bel's state prepared by trusted party is respectively | ψ0,0(B1w,Aw)>, w=1,2, n and |
ψ0,0(B2u,Au)>, u=1,2, n.N Bel's state is prepared first | ψ0,0(B1w,Aw)>, w=1,2, n, depending on
For first group of Bel's state, B1wRepresent first quantum bit of w-th of Bel's state in first group of Bel's state, AwRepresent first group of shellfish
Second quantum bit of w-th of Bel's state in your state, by quantum bit B1 thereinwIt is sent to second server, quantum ratio
Special AwIt is sent to client;Then, other n Bel state is prepared | ψ0,0(B2u,Au)>, u=1,2, n, it is considered as second
Group Bel's state, B2uRepresent first quantum bit of u-th of Bel's state in second group of Bel's state, AuRepresent in second group of Bel's state
Second quantum bit of u-th of Bel's state;By quantum bit B2 thereinuIt is sent to quantum server, quantum bit AuSend
To client.Wherein, n=(2+ δ) m, δ > 0 is preset parameter, and n is positive integer, and n represents Bel's state in every group of Bel's state
Quantity.
Step 12:Client sends account and password is logged in first server.
Wherein, client carries out account registration in first server in advance, and first server carries out identity to client
Checking.
Specifically, client receives the quantum bit A that trusted party is sentw、Au, and from the quantum bit A of receptionw、AuIn
Selected part qubit gives the first server.
When Alice receives any one quantum bit AwOr Au, choose this quantum bit according to preset rules and lost
Abandon, or Server1 is given in forwarding, and record the position of each quantum bit for being sent to Server1.Wherein, client
The quantum bit for being sent to first server has corresponded to account and password.Wherein, preset rules are according to client registers account
When it is set, during client registers account, client is randomly provided quantum bit corresponding to one group of account and one group of password pair
The quantum bit answered, the value of quantum bit are 1 or 0, and preset rules are that client carries out account in first server and logged in
When, the selected one group of quantum bit corresponding with account sent of client and one group of same account pair being randomly provided during registration
The quantum bit answered is identical;It is randomly provided when the selected one group of quantum bit corresponding with password sent of client is with registering
Quantum bit corresponding to one group of same password is identical.It should be appreciated that during client registers account, and receive trusted party and prepare
Bel's state in quantum bit, and randomly select part quantum bit as account, randomly select other quantum bits of part
As password.For example, the value of one group of quantum bit corresponding with account is { 0,1,1,0,0,0,1 } during client registers, then it is objective
When family end logs in same account, client receives any one quantum bit AwOr AuShi Jinhang abandons or is transmitted to first
Server, the value of the one group of quantum bit corresponding with account for making finally to be transmitted to first server should also be 0,1,1,0,
0,0,1}。
Step 13:First server carries out login authentication.
Specifically, first server is received them after quantum bit according to receiving ordered storage in quantum register
In, and the quantum bit of reception wherein m quantum bit will be arranged to according to reception orderSeparately
Outer m quantum bit is arranged toWherein, first group of quantum bitIt is real
It is the selected one group of quantum bit corresponding with account sent of client on border, it is the A of clientwAccount, second group of amount
Sub- bitIt is actually the selected one group of quantum bit corresponding with password sent of client, its
For the password of client, 1≤si≤n,1≤ti≤n,i∈{1,2,···,m};Then to quantum under the request of client
BitWithPerform Bel's state measurement and obtain m group measurement resultsAnd by m group measurement resultsIt is sent to institute
State client,It is if allMeasurement resultBe (0,0), then the client
Account and password authentification by, if in the presence ofMeasurement result be not (0,0), then the account of client and password authentification be not
Pass through.
WhereinWithPosition in the quantum bit sequence received first server is informed by client;
Represent respectivelyMeasurement result.
Step 14:After logining successfully, client sends access on the login interface of second server to first server
Request, application use accounts information of the client in first server;
Accounts information includes account, password and the information related to account, such as client is in first server
Identity information etc..
Specifically, client is based on entanglement transfer technology and according to each measurement resultKnow quantum bitNew composite stateAndWithValue, client willWithValue be sent to first
Server, wherein quantum bitIt is exactly (B1 in step 11w, B2u)。
Wherein,WithFor representing that client request uses the access of accounts information of the client in first server
Solicited message.The quantum bit B1 that second server distributes trusted partywCan be as the characteristic information of login interface, client
End gets quantum bit according to measurement resultNew composite stateIt is achieved thereby that
The access request of request accounts information is sent on the log-in interface of second server to first server.
Entanglement transfer technology is as follows:Four Bel's states (Bell state) of selection, which are used as, tangles resource, it is assumed that two particle (a,
B) it is represented as:
Wherein (z, x) ∈ { 0,1 }2, X=| 0>b<1|+|1>b<0 |, Z=| 0>b<0|-|1>b<1 |, it is contemplated that two particles
To (a, b) and (a', b'), their Bell state form is respectively | ψz,x(a,b)>With | ψz',x'(a',b')>, now in Bell state
On the basis of to particle b and b' carry out combined measurement, then particle a and a' composite state be re-set as in four Bell states
One, the state of four Bell states depends on particle b and b'Bell state measurement result.
In the case of without loss of generality, it is assumed that particle a and b state is | ψ0,0(a,b)>, particle a' and b' state
It is | ψ0,0(a',b')>, therefore the composite state of four particles is:
Following form can also be rewritten as:
Step 15:The accounts information that first server leads to trusted party transmission client gives quantum server;
First server represents accounts information in the form of classical information, wherein, accounts information isθkRandomly selected from set S, S=(K π)/4 | and K=0,1,7 } and, as k ∈
{s1,s2,···,smWhen, the z in accounts informationk、xkObtained by first server from clientWithValue determine,
I.e. in step 14WithValue determine, si∈{s1,s2,···,sm};As k ∈ { 1,2, n }-{ s1,
s2,···,smWhen, randomly select { zk,xk}∈{0,1}2。
Assuming that { θ '1,θ'2,···,θ'nSubstantially uniformity is distributed in set S;Because n classical informationBe by
Server1 is ultimately sent to Bob, but because Bob does not knowValue, andValue be in step by Server1
Randomly selected in 12, so Bob is also impossible to knowValue.
Step 16:Quantum server carries out blind according to the blind quantum calculation agreement of single server classics client to accounts information
Quantum calculation handles the accounts information after being blinded, and is transmitted to second server and first service by trusted party
Device.
Specifically, quantum server is according to accounts informationObtain measurement base { ± θ
'k, in the measurement base { ± θ 'kOn the basis of measure trusted party send quantum bit B2u, obtain measurement resultWherein, the measurement resultFor the accounts information blinded.
Wherein, measurement base { ± θ 'kIt is to include+θ 'k、-θ'kTwo measurement bases.
Step 17:Second server receives the application access information of first server transmissionAfterwards using blinding after
Accounts information is logged in, and open applications are serviced to client after logging in successfully.
Wherein, first server receives the accounts information blindedAfterwards, send and stated in the form of classical information
Application access informationTo second server, for representing that it agrees to that second server uses the account after being blinded to believe
Breath, therefore second server is logged in after receiving the application access information of first server using the accounts information after blinding.
Accounts information after wherein being blinded substantially is also account information, and it can directly be logged in by second server
Certification uses as account, therefore second server has logged in account open applications depending on client services to client.
The present invention by the above method, share, while also assures that account by the account realized between different application service
The security of information, even if account is shared, but the particular content of accounts information is not shared.
Presently preferred embodiments of the present invention is the foregoing is only, is merely illustrative for the purpose of the present invention, and it is non-limiting
's.Those skilled in the art understands, can carry out many modifications to it in the scope of the claims in the present invention, but all will
Fall within the scope of protection of the present invention.
Claims (4)
- A kind of 1. different account number safety login method based on blind quantum calculation, it is characterised in that:Including:Step 1:Client sends account and password and carries out login authentication to first server;Step 2:After logining successfully, the client sends visit on the login interface of second server to the first server Ask request, accounts information of the application using the client in the first server;The accounts information comprises at least account and password of the client in the first server;Step 3:The accounts information that the first server sends the client by trusted party gives quantum server;Step 4:The quantum server enters according to the blind quantum calculation agreement of single server classics client to the accounts information The blind quantum calculation of row handles the accounts information after being blinded, and is transmitted to the second server by the trusted party;Step 5:The second server is blinded after receiving the application access information that the first server is sent using described Accounts information afterwards is logged in, and open applications are serviced to the client after logging in successfully.
- 2. according to the method for claim 1, it is characterised in that:The process of login authentication is as follows in the step 1:First, the client receives the quantum bit A that trusted party is sentw、Au, and from the quantum bit A of receptionw、AuMiddle choosing Part quantum bit is taken to be sent to the first server, the first server is by the quantum bit of reception according to reception order It is arranged to two groups of quantum bitsWherein, first group of quantum bitFor the account of client, second group of quantum bitFor the password of client, 1≤si≤n,1≤ti≤n,i∈{1,2,···,m};N, m is just Integer, m represent the quantity of every group of quantum bit;Trusted party prepares 2n Bel's state and is divided into two groups of Bel's states, wherein first group of Bel's state is | ψ0,0(B1w,Aw)>, w= 1,2 ..., n, the second group Bel's state is | ψ0,0(B2u,Au)>, u=1,2 ..., n, n represent every group of Bel's state in Bel's state number Amount;Wherein, B1wRepresent first quantum bit of w-th of Bel's state in first group of Bel's state, AwRepresent in first group of Bel's state Second quantum bit of w-th of Bel's state, B2uFirst quantum bit of u-th of Bel's state in second group of Bel's state is represented, AuRepresent second quantum bit of u-th of Bel's state in second group of Bel's state;Trusted party is by quantum bit B1wSecond server is sent to, by quantum bit AwAnd AuThe client is sent to, will Quantum bit B2uQuantum server is sent to, n=(2+ δ) m, δ > 0 is preset parameter;Finally, the first server is to all in two groups of quantum bitsWithBel's state measurement is performed successively obtains m groups Measurement resultAnd by m group measurement resultsIt is sent to the client;It is if allMeasurement resultIt is (0,0), then the account of the client and password authentification passes through;Wherein,Represent respectivelyMeasurement result.
- 3. according to the method for claim 2, it is characterised in that:The process that access request is sent in the step 2 is as follows:The client is based on entanglement transfer technology and according to each measurement resultKnow quantum bit's New composite stateAndWithValue, the client willWithValue be sent to it is described first clothes Business device;Wherein,WithFor representing that the client request is believed using account of the client in the first server The accessing request information of breath.
- 4. according to the method for claim 3, it is characterised in that:Quantum server is to accounts information described in the step 4 The process blinded is as follows:First, the quantum server obtains the accounts information represented with classical information;Wherein, accounts information isθkRandomly selected from set S, S={ (K π)/4K=0,1 ..., 7 };As k ∈ { s1,s2,…,smWhen, the z in accounts informationk、xkObtained by the first server from the client WithValue determine, si∈{s1,s2,…,sm};As k ∈ { 1,2 ..., n }-{ s1,s2,…,smWhen, randomly select { zk,xk}∈{0,1}2;Finally, the quantum server is according to accounts informationObtain measurement base { ± θ 'k, institute State measurement base { ± θk' on the basis of measure trusted party send quantum bit B2u, obtain measurement resultWherein, the measurement resultFor the accounts information blinded.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710793910.3A CN107493295B (en) | 2017-09-06 | 2017-09-06 | A kind of different account number safety login method based on blind quantum calculation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710793910.3A CN107493295B (en) | 2017-09-06 | 2017-09-06 | A kind of different account number safety login method based on blind quantum calculation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107493295A true CN107493295A (en) | 2017-12-19 |
CN107493295B CN107493295B (en) | 2019-09-24 |
Family
ID=60652232
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710793910.3A Active CN107493295B (en) | 2017-09-06 | 2017-09-06 | A kind of different account number safety login method based on blind quantum calculation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107493295B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108388946A (en) * | 2018-01-29 | 2018-08-10 | 湘潭大学 | A kind of two side's quantum computing methods based on blind quantum calculation |
CN113708926A (en) * | 2021-08-25 | 2021-11-26 | 重庆邮电大学 | Safe multi-party computing method based on verifiable blind quantum computing |
US20220085985A1 (en) * | 2018-12-26 | 2022-03-17 | Veriqloud | Method and device for quantum computation delegated to a quantum server by a client for the creation of a quantum state known to the client purpose concealed from the quantum server |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103795724A (en) * | 2014-02-07 | 2014-05-14 | 陈珂 | Method for protecting account security based on asynchronous dynamic password technology |
CN104821874A (en) * | 2015-05-15 | 2015-08-05 | 长春大学 | Method employing quantum secret key for IOT (Internet of Things) data encryption transmission |
US20150288517A1 (en) * | 2014-04-04 | 2015-10-08 | Ut-Battelle, Llc | System and method for secured communication |
CN106972922A (en) * | 2013-06-08 | 2017-07-21 | 科大国盾量子技术股份有限公司 | A kind of mobile secret communication method based on quantum key distribution network |
-
2017
- 2017-09-06 CN CN201710793910.3A patent/CN107493295B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106972922A (en) * | 2013-06-08 | 2017-07-21 | 科大国盾量子技术股份有限公司 | A kind of mobile secret communication method based on quantum key distribution network |
CN103795724A (en) * | 2014-02-07 | 2014-05-14 | 陈珂 | Method for protecting account security based on asynchronous dynamic password technology |
US20150288517A1 (en) * | 2014-04-04 | 2015-10-08 | Ut-Battelle, Llc | System and method for secured communication |
CN104821874A (en) * | 2015-05-15 | 2015-08-05 | 长春大学 | Method employing quantum secret key for IOT (Internet of Things) data encryption transmission |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108388946A (en) * | 2018-01-29 | 2018-08-10 | 湘潭大学 | A kind of two side's quantum computing methods based on blind quantum calculation |
CN108388946B (en) * | 2018-01-29 | 2021-08-17 | 湘潭大学 | Two-party quantum computing method based on blind quantum computing |
US20220085985A1 (en) * | 2018-12-26 | 2022-03-17 | Veriqloud | Method and device for quantum computation delegated to a quantum server by a client for the creation of a quantum state known to the client purpose concealed from the quantum server |
CN113708926A (en) * | 2021-08-25 | 2021-11-26 | 重庆邮电大学 | Safe multi-party computing method based on verifiable blind quantum computing |
CN113708926B (en) * | 2021-08-25 | 2024-05-10 | 重庆邮电大学 | Safe multiparty calculation method based on verifiable blind quantum calculation |
Also Published As
Publication number | Publication date |
---|---|
CN107493295B (en) | 2019-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11720891B2 (en) | Method and system for zero-knowledge and identity based key management for decentralized applications | |
US10887100B2 (en) | Systems and methods for distributed key storage | |
Yu et al. | Platform-independent secure blockchain-based voting system | |
CN113127916B (en) | Data set processing method, data processing method, device and storage medium | |
CN108235805A (en) | Account unifying method and device and storage medium | |
EP2365679B1 (en) | Secret interest groups in online social networks | |
Li et al. | Semiquantum key distribution with secure delegated quantum computation | |
CN107017984A (en) | Key derivation based on parameter | |
Sun et al. | Privacy-preserving verifiable incentive mechanism for online crowdsourcing markets | |
Pallavi et al. | Authentication-based access control and data exchanging mechanism of IoT devices in fog computing environment | |
CN107493295B (en) | A kind of different account number safety login method based on blind quantum calculation | |
Mishra et al. | Quantum anonymous veto: a set of new protocols | |
Abulkasim et al. | Quantum-based privacy-preserving sealed-bid auction on the blockchain | |
Thapa et al. | SPA: A secure and private auction framework for decentralized online social networks | |
Ren et al. | Building resilient web 3.0 with quantum information technologies and blockchain: An ambilateral view | |
Braeken | Highly efficient bidirectional multi-factor authentication and key agreement for real-time access to sensor data | |
CN107104804A (en) | A kind of platform integrity verification method and device | |
Yao et al. | Private information: To reveal or not to reveal | |
WO2017074953A1 (en) | Method and system for dynamic password authentication based on quantum states | |
CN111447058B (en) | Book resource access control method based on Chinese remainder theorem | |
Wu et al. | A secure quantum sealed-bid auction protocol based on quantum public key encryption | |
Liu et al. | Multiparty Sealed-Bid auction protocol based on the correlation of Four-Particle entangled state | |
Srisakthi et al. | Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment | |
Sunil Kumar et al. | A Data Privacy Approach Using Shamir’s Secret Scheme in Permissioned Blockchain | |
Boshrooyeh et al. | Inonymous: anonymous invitation-based system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |