CN107493295A - A kind of different account number safety login method based on blind quantum calculation - Google Patents

A kind of different account number safety login method based on blind quantum calculation Download PDF

Info

Publication number
CN107493295A
CN107493295A CN201710793910.3A CN201710793910A CN107493295A CN 107493295 A CN107493295 A CN 107493295A CN 201710793910 A CN201710793910 A CN 201710793910A CN 107493295 A CN107493295 A CN 107493295A
Authority
CN
China
Prior art keywords
server
client
quantum
state
bel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710793910.3A
Other languages
Chinese (zh)
Other versions
CN107493295B (en
Inventor
石金晶
陈慧
周芳
邓家明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN201710793910.3A priority Critical patent/CN107493295B/en
Publication of CN107493295A publication Critical patent/CN107493295A/en
Application granted granted Critical
Publication of CN107493295B publication Critical patent/CN107493295B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of different account number safety login method based on blind quantum calculation, including:Step 1:Client sends account and password and carries out login authentication to first server;Step 2:After logining successfully, client sends access request on the login interface of second server to first server, and application uses accounts information of the client in first server;Step 3:The accounts information that first server sends client gives quantum server;Step 4:Quantum server carries out blind quantum calculation to accounts information according to the blind quantum calculation agreement of single server classics client and handles the accounts information after being blinded, and is transmitted to second server;Step 5:Second server is logged in after receiving the application access information of first server transmission using the accounts information after blinding, open applications are serviced to client after logging in successfully, pass through the method for the invention, realize that account is shared and the secrecy of accounts information, improve the safe class of accounts information.

Description

A kind of different account number safety login method based on blind quantum calculation
Technical field
The present invention relates to quantum communication technical field, more particularly to a kind of different account number safety based on blind quantum calculation to log in Method.
Background technology
Society enters the information age, and internet is growing, and the various application APP of in the market and website are more next More, if the APP of each different application or website are required for applying different accounts, this can cause certain journey to user Trouble on degree, and too many account number cipher information is also not easy to remember.By probing into, the main difficulty of the problem is exactly such as Where ensure to reach " account is shared " in the case of user information confidentiality.
Blind quantum calculation (Blind Quantum Computation) refer to client in not enough quantum abilities or In the case of person's quantum calculation ability, the quantum service provider that quantum task is submitted to distal end performs, but not reveals oneself A kind of quantum calculation model of input, output and algorithm.Blind quantum calculation is in fact at quantum cryptography concept and quantal data A kind of combination of reason.It is well known that classical cryptoraphy is often built upon on the basis of some difficult math question, can only achieve to count Calculate safety.Theoretical research shows that the blind this data safety for calculating user can reach unconditional security.Because quantum resource has Limit, in the future for a comparatively long period of time, may only have a small number of mechanisms just to possess quantum computer, the quantum ability of domestic consumer It is very limited, how to allow domestic consumer also can application solutions quantum calculation will likely be a long period problems faced.It is blind The appearance of quantum calculation, exactly in order to solve this problem, no quantum ability or quantum user limited in one's ability can borrow Help long-range quantum computer to realize quantum calculation, while can guarantee that its input, output data and algorithm security.Therefore, blind quantum Agreement is calculated to be likely to turn into first generation quantum calculation model.Currently, blind quantum calculation progressively moves towards real from theoretical research Apply on border.According to the difference of implementation pattern, mainly have based on line mode and quantum measurement pattern, the quantum calculation based on measurement Also referred to as unidirectional quantum calculation, both of which have identical computing capability.The implementation pattern of blind quantum calculation and cloud computing class Seemingly, therefore generally domestic consumer is referred to as client, quantum computer is referred to as server.
At present, although having had many advanced quantum calculation technologies and theory now, for quantum calculation technology Actual application scheme but can be counted on one's fingers, in order to tackle a variety of APP differences accounts and to perplexing problem caused by user, there is provided one Kind ensures that realizing account while accounts information confidentiality shares based on blind quantum calculation.
The content of the invention
In order to tackle a variety of APP differences accounts to problem is perplexed caused by user, it is necessary to provide one kind in fact based on blind The different account number safety login method of quantum calculation, realize the safety that user account information has also been ensured while account is shared Property.
A kind of different account number safety login method based on blind quantum calculation provided by the invention, including:
Step 1:Client sends account and password and carries out login authentication to first server;
Step 2:After logining successfully, the client is sent out on the login interface of second server to the first server Go out access request, accounts information of the application using the client in the first server;
The accounts information comprises at least account and password of the client in the first server;
Step 3:The accounts information that the first server sends the client by trusted party gives quantum server;
Step 4:The quantum server is believed the account according to the blind quantum calculation agreement of single server classics client Breath carries out blind quantum calculation and handles the accounts information after being blinded, and is transmitted to the second service by the trusted party Device;
Step 5:The second server is received after the application access information that the first server is sent using described Accounts information after blinding is logged in, and open applications are serviced to the client after logging in successfully.
Accounts information after blinding is to carry out quantum coding processing to accounts information, is to be represented with the form of quantum, still Account information is substantially still fallen within, is directly to be used on second server, and second server can not be informed in The particular content of accounts information on one server, second server will log in account depending on client and then provide application Service.
Above-mentioned client register account number in first server, and apply accessing the using the accounts information of first server Two servers, so that second server is to client open applications service, and then realizes and client is shared on second server In the account of first server;Quantum server possesses quantum ability, is responsible for believing account of the client in first server Breath carries out blind quantum calculation processing.
Preferably, the process of login authentication is as follows in the step 1:
First, the client receives the quantum bit A that trusted party is sentw、Au, and from the quantum bit A of receptionw、Au Middle selected part qubit gives the first server, and the first server is by the quantum bit of reception according to reception Order is arranged to two groups of quantum bits
Wherein, first group of quantum bitFor the account of client, second group of quantum bitFor the password of client, 1≤si≤n,1≤ti≤n,i∈{1,2,···,m};N, m is Positive integer, m represent the quantity of every group of quantum bit;
Trusted party prepares 2n Bel's state and is divided into two groups of Bel's states, wherein first group of Bel's state is | ψ0,0(B1w,Aw) >, w=1,2, n, second group of Bel's state be | ψ0,0(B2u,Au)>, u=1,2, n, n represent every group of Bel's state The quantity of middle Bel's state;
Wherein, B1wRepresent first quantum bit of w-th of Bel's state in first group of Bel's state, AwRepresent first group of Bel Second quantum bit of w-th of Bel's state, B2 in stateuRepresent first quantum of u-th of Bel's state in second group of Bel's state Bit, AuRepresent second quantum bit of u-th of Bel's state in second group of Bel's state;
Trusted party is by quantum bit B1wSecond server is sent to, by quantum bit AwAnd AuIt is sent to the client End, by quantum bit B2uQuantum server is sent to, n=(2+ δ) m, δ > 0 is preset parameter;
Finally, the first server is to all in two groups of quantum bitsWithBel's state measurement is performed successively to obtain M group measurement resultsAnd by m group measurement resultsIt is sent to the client;
It is if allMeasurement resultIt is (0,0), then the account of the client and password authentification is led to Cross;
Wherein,Represent respectivelyMeasurement result.
When client elder generation quantum bit is to first server, first quantum bit corresponding to transmission account, is retransmited close Quantum bit corresponding to code, and client selected part qubit to the first server is entered according to preset rules Row is chosen, and preset rules are set when being according to client registers account, it is therefore an objective to which client is selected when account logs in sends out Send with account corresponding to one group of quantum bit it is identical with quantum bit corresponding to one group of same account being randomly provided during registration, One group of same password being randomly provided when the selected one group of quantum bit sending corresponding to password of client is with registering is corresponding Quantum bit it is identical, selected amount in the quantum bit that client is sent from trusted party when different accounts, password in addition Sub- bit is different, and when account and password mismatch, the measurement result after Bel's state measurement is carried out to two groups of quantum bitsIn there will be the situation for being unsatisfactory for (0,0), account login authentication failure, therefore measured based on Bel's state, client can Effectively to carry out account login authentication;Trusted party is the third party authoritative institution unrelated with network service behavior, is credible Bad third party device, its 2n Bel's state prepared establish the information between client, second server, quantum server Link.
Preferably, the process that access request is sent in the step 2 is as follows:
The client is based on entanglement transfer technology and according to each measurement resultKnow quantum bitNew composite stateAndWithValue, the client willWithValue be sent to The first server;
Wherein,WithFor representing that the client request uses account of the client in the first server The accessing request information of family information.
The quantum bit B1 that second server distributes trusted partywCan be as the characteristic information of login interface, client End gets quantum bit according to measurement resultNew composite stateIt is achieved thereby that The access request of request accounts information is sent on the log-in interface of second server to first server.In addition, when client Account and password could be sent out after being verified in first server on the log-in interface of second server to first server Access request is sent, first server also just can send account information by trusted party and give quantum server.IfSurvey It is (0,0) to measure result, then quantum bit canIt is expressed as WithValue all be 0.
Preferably, the process that quantum server is blinded to accounts information described in the step 4 is as follows:
First, the quantum server obtains the accounts information represented with classical information;
Wherein, accounts information is
θkRandomly selected from set S, S=(K π)/4 | and K=0,1,7 };
As k ∈ { s1,s2,···,smWhen, the z in accounts informationk、xkBy the first server from the client ObtainWithValue determine, si∈{s1,s2,···,sm};
As k ∈ { 1,2, n }-{ s1,s2,···,smWhen, randomly select { zk,xk}∈{0,1}2
Finally, the quantum server is according to accounts informationObtain measurement base { ± θ 'k, In the measurement base { ± θ 'kOn the basis of measure trusted party send quantum bit B2u, obtain measurement result
Wherein, the measurement resultFor the accounts information blinded.
Beneficial effect:
The invention provides a kind of different account number safety login method based on blind quantum calculation, by client in the first clothes After account logs in successfully on business device, client on the log-in interface of second server requesting client in first server Accounts information, second server get the Shen of accounts information and first server after quantum server blinds processing Login account after please accessing, and then corresponding application service is provided to client, realize and be total to the account in first server Enjoy to second server, client need not re-register account, while get second server by blind quantum calculation Be accounts information after blinding, it can not get the particular content of accounts information, and then realize the secrecy of accounts information, Quantum advantage is taken full advantage of, quantum calculation technology is applied in a brand-new practical application area, expands quantum meter The practical ranges of calculation technology.
Brief description of the drawings
Fig. 1 is a kind of signal stream of different account number safety login method based on blind quantum calculation provided in an embodiment of the present invention Cheng Tu.
Embodiment
It is following that the present invention will be further illustrated in conjunction with specific embodiments.
The embodiment of the present invention is that the theory based on blind quantum realizes that account between different application is shared and information privacy.
Wherein, client (Alice) register account number in first server (Server1) in the present invention, and apply using Server1 accounts information accesses second server (Server2), and ensures that Server1 accounts information is to Server2 It is kept absolutely secret.
Quantum server (Bob) possesses quantum ability, is responsible for carrying out blind quantum calculation processing to Alice accounts information.
Trusted party (Trusted Center) is the third party authoritative institution unrelated with network service behavior, and being must can The third party of trust.
First server (Server1) possesses Alice accounts information, when Alice applies for accessing Server2, Server1 is responsible for verifying Alice accounts information, and is got in touch with Trusted Center.
Second server (Server2) is for accounts information after trusted party encrypts Bob and from Server1 Access request when being sent to Server2, result is fed back to Server1 by Server2, and its application service is opened to Alice.
Based on the function of above-mentioned 5 participants, such as Fig. 1, a kind of different account peace based on blind quantum calculation in the present embodiment Full login method, comprises the following steps:
Step 11:Trusted party be prepared for 2n Bel's state and send quantum bit to client, second server and Quantum server;
Specifically, 2n Bel's state prepared by trusted party is respectively | ψ0,0(B1w,Aw)>, w=1,2, n and | ψ0,0(B2u,Au)>, u=1,2, n.N Bel's state is prepared first | ψ0,0(B1w,Aw)>, w=1,2, n, depending on For first group of Bel's state, B1wRepresent first quantum bit of w-th of Bel's state in first group of Bel's state, AwRepresent first group of shellfish Second quantum bit of w-th of Bel's state in your state, by quantum bit B1 thereinwIt is sent to second server, quantum ratio Special AwIt is sent to client;Then, other n Bel state is prepared | ψ0,0(B2u,Au)>, u=1,2, n, it is considered as second Group Bel's state, B2uRepresent first quantum bit of u-th of Bel's state in second group of Bel's state, AuRepresent in second group of Bel's state Second quantum bit of u-th of Bel's state;By quantum bit B2 thereinuIt is sent to quantum server, quantum bit AuSend To client.Wherein, n=(2+ δ) m, δ > 0 is preset parameter, and n is positive integer, and n represents Bel's state in every group of Bel's state Quantity.
Step 12:Client sends account and password is logged in first server.
Wherein, client carries out account registration in first server in advance, and first server carries out identity to client Checking.
Specifically, client receives the quantum bit A that trusted party is sentw、Au, and from the quantum bit A of receptionw、AuIn Selected part qubit gives the first server.
When Alice receives any one quantum bit AwOr Au, choose this quantum bit according to preset rules and lost Abandon, or Server1 is given in forwarding, and record the position of each quantum bit for being sent to Server1.Wherein, client The quantum bit for being sent to first server has corresponded to account and password.Wherein, preset rules are according to client registers account When it is set, during client registers account, client is randomly provided quantum bit corresponding to one group of account and one group of password pair The quantum bit answered, the value of quantum bit are 1 or 0, and preset rules are that client carries out account in first server and logged in When, the selected one group of quantum bit corresponding with account sent of client and one group of same account pair being randomly provided during registration The quantum bit answered is identical;It is randomly provided when the selected one group of quantum bit corresponding with password sent of client is with registering Quantum bit corresponding to one group of same password is identical.It should be appreciated that during client registers account, and receive trusted party and prepare Bel's state in quantum bit, and randomly select part quantum bit as account, randomly select other quantum bits of part As password.For example, the value of one group of quantum bit corresponding with account is { 0,1,1,0,0,0,1 } during client registers, then it is objective When family end logs in same account, client receives any one quantum bit AwOr AuShi Jinhang abandons or is transmitted to first Server, the value of the one group of quantum bit corresponding with account for making finally to be transmitted to first server should also be 0,1,1,0, 0,0,1}。
Step 13:First server carries out login authentication.
Specifically, first server is received them after quantum bit according to receiving ordered storage in quantum register In, and the quantum bit of reception wherein m quantum bit will be arranged to according to reception orderSeparately Outer m quantum bit is arranged toWherein, first group of quantum bitIt is real It is the selected one group of quantum bit corresponding with account sent of client on border, it is the A of clientwAccount, second group of amount Sub- bitIt is actually the selected one group of quantum bit corresponding with password sent of client, its For the password of client, 1≤si≤n,1≤ti≤n,i∈{1,2,···,m};Then to quantum under the request of client BitWithPerform Bel's state measurement and obtain m group measurement resultsAnd by m group measurement resultsIt is sent to institute State client,It is if allMeasurement resultBe (0,0), then the client Account and password authentification by, if in the presence ofMeasurement result be not (0,0), then the account of client and password authentification be not Pass through.
WhereinWithPosition in the quantum bit sequence received first server is informed by client; Represent respectivelyMeasurement result.
Step 14:After logining successfully, client sends access on the login interface of second server to first server Request, application use accounts information of the client in first server;
Accounts information includes account, password and the information related to account, such as client is in first server Identity information etc..
Specifically, client is based on entanglement transfer technology and according to each measurement resultKnow quantum bitNew composite stateAndWithValue, client willWithValue be sent to first Server, wherein quantum bitIt is exactly (B1 in step 11w, B2u)。
Wherein,WithFor representing that client request uses the access of accounts information of the client in first server Solicited message.The quantum bit B1 that second server distributes trusted partywCan be as the characteristic information of login interface, client End gets quantum bit according to measurement resultNew composite stateIt is achieved thereby that The access request of request accounts information is sent on the log-in interface of second server to first server.
Entanglement transfer technology is as follows:Four Bel's states (Bell state) of selection, which are used as, tangles resource, it is assumed that two particle (a, B) it is represented as:
Wherein (z, x) ∈ { 0,1 }2, X=| 0>b<1|+|1>b<0 |, Z=| 0>b<0|-|1>b<1 |, it is contemplated that two particles To (a, b) and (a', b'), their Bell state form is respectively | ψz,x(a,b)>With | ψz',x'(a',b')>, now in Bell state On the basis of to particle b and b' carry out combined measurement, then particle a and a' composite state be re-set as in four Bell states One, the state of four Bell states depends on particle b and b'Bell state measurement result.
In the case of without loss of generality, it is assumed that particle a and b state is | ψ0,0(a,b)>, particle a' and b' state It is | ψ0,0(a',b')>, therefore the composite state of four particles is:
Following form can also be rewritten as:
Step 15:The accounts information that first server leads to trusted party transmission client gives quantum server;
First server represents accounts information in the form of classical information, wherein, accounts information isθkRandomly selected from set S, S=(K π)/4 | and K=0,1,7 } and, as k ∈ {s1,s2,···,smWhen, the z in accounts informationk、xkObtained by first server from clientWithValue determine, I.e. in step 14WithValue determine, si∈{s1,s2,···,sm};As k ∈ { 1,2, n }-{ s1, s2,···,smWhen, randomly select { zk,xk}∈{0,1}2
Assuming that { θ '1,θ'2,···,θ'nSubstantially uniformity is distributed in set S;Because n classical informationBe by Server1 is ultimately sent to Bob, but because Bob does not knowValue, andValue be in step by Server1 Randomly selected in 12, so Bob is also impossible to knowValue.
Step 16:Quantum server carries out blind according to the blind quantum calculation agreement of single server classics client to accounts information Quantum calculation handles the accounts information after being blinded, and is transmitted to second server and first service by trusted party Device.
Specifically, quantum server is according to accounts informationObtain measurement base { ± θ 'k, in the measurement base { ± θ 'kOn the basis of measure trusted party send quantum bit B2u, obtain measurement resultWherein, the measurement resultFor the accounts information blinded.
Wherein, measurement base { ± θ 'kIt is to include+θ 'k、-θ'kTwo measurement bases.
Step 17:Second server receives the application access information of first server transmissionAfterwards using blinding after Accounts information is logged in, and open applications are serviced to client after logging in successfully.
Wherein, first server receives the accounts information blindedAfterwards, send and stated in the form of classical information Application access informationTo second server, for representing that it agrees to that second server uses the account after being blinded to believe Breath, therefore second server is logged in after receiving the application access information of first server using the accounts information after blinding.
Accounts information after wherein being blinded substantially is also account information, and it can directly be logged in by second server Certification uses as account, therefore second server has logged in account open applications depending on client services to client.
The present invention by the above method, share, while also assures that account by the account realized between different application service The security of information, even if account is shared, but the particular content of accounts information is not shared.
Presently preferred embodiments of the present invention is the foregoing is only, is merely illustrative for the purpose of the present invention, and it is non-limiting 's.Those skilled in the art understands, can carry out many modifications to it in the scope of the claims in the present invention, but all will Fall within the scope of protection of the present invention.

Claims (4)

  1. A kind of 1. different account number safety login method based on blind quantum calculation, it is characterised in that:Including:
    Step 1:Client sends account and password and carries out login authentication to first server;
    Step 2:After logining successfully, the client sends visit on the login interface of second server to the first server Ask request, accounts information of the application using the client in the first server;
    The accounts information comprises at least account and password of the client in the first server;
    Step 3:The accounts information that the first server sends the client by trusted party gives quantum server;
    Step 4:The quantum server enters according to the blind quantum calculation agreement of single server classics client to the accounts information The blind quantum calculation of row handles the accounts information after being blinded, and is transmitted to the second server by the trusted party;
    Step 5:The second server is blinded after receiving the application access information that the first server is sent using described Accounts information afterwards is logged in, and open applications are serviced to the client after logging in successfully.
  2. 2. according to the method for claim 1, it is characterised in that:The process of login authentication is as follows in the step 1:
    First, the client receives the quantum bit A that trusted party is sentw、Au, and from the quantum bit A of receptionw、AuMiddle choosing Part quantum bit is taken to be sent to the first server, the first server is by the quantum bit of reception according to reception order It is arranged to two groups of quantum bits
    Wherein, first group of quantum bitFor the account of client, second group of quantum bitFor the password of client, 1≤si≤n,1≤ti≤n,i∈{1,2,···,m};N, m is just Integer, m represent the quantity of every group of quantum bit;
    Trusted party prepares 2n Bel's state and is divided into two groups of Bel's states, wherein first group of Bel's state is | ψ0,0(B1w,Aw)>, w= 1,2 ..., n, the second group Bel's state is | ψ0,0(B2u,Au)>, u=1,2 ..., n, n represent every group of Bel's state in Bel's state number Amount;
    Wherein, B1wRepresent first quantum bit of w-th of Bel's state in first group of Bel's state, AwRepresent in first group of Bel's state Second quantum bit of w-th of Bel's state, B2uFirst quantum bit of u-th of Bel's state in second group of Bel's state is represented, AuRepresent second quantum bit of u-th of Bel's state in second group of Bel's state;
    Trusted party is by quantum bit B1wSecond server is sent to, by quantum bit AwAnd AuThe client is sent to, will Quantum bit B2uQuantum server is sent to, n=(2+ δ) m, δ > 0 is preset parameter;
    Finally, the first server is to all in two groups of quantum bitsWithBel's state measurement is performed successively obtains m groups Measurement resultAnd by m group measurement resultsIt is sent to the client;
    It is if allMeasurement resultIt is (0,0), then the account of the client and password authentification passes through;
    Wherein,Represent respectivelyMeasurement result.
  3. 3. according to the method for claim 2, it is characterised in that:The process that access request is sent in the step 2 is as follows:
    The client is based on entanglement transfer technology and according to each measurement resultKnow quantum bit's New composite stateAndWithValue, the client willWithValue be sent to it is described first clothes Business device;
    Wherein,WithFor representing that the client request is believed using account of the client in the first server The accessing request information of breath.
  4. 4. according to the method for claim 3, it is characterised in that:Quantum server is to accounts information described in the step 4 The process blinded is as follows:
    First, the quantum server obtains the accounts information represented with classical information;
    Wherein, accounts information is
    θkRandomly selected from set S, S={ (K π)/4K=0,1 ..., 7 };
    As k ∈ { s1,s2,…,smWhen, the z in accounts informationk、xkObtained by the first server from the client WithValue determine, si∈{s1,s2,…,sm};
    As k ∈ { 1,2 ..., n }-{ s1,s2,…,smWhen, randomly select { zk,xk}∈{0,1}2
    Finally, the quantum server is according to accounts informationObtain measurement base { ± θ 'k, institute State measurement base { ± θk' on the basis of measure trusted party send quantum bit B2u, obtain measurement result
    Wherein, the measurement resultFor the accounts information blinded.
CN201710793910.3A 2017-09-06 2017-09-06 A kind of different account number safety login method based on blind quantum calculation Active CN107493295B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710793910.3A CN107493295B (en) 2017-09-06 2017-09-06 A kind of different account number safety login method based on blind quantum calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710793910.3A CN107493295B (en) 2017-09-06 2017-09-06 A kind of different account number safety login method based on blind quantum calculation

Publications (2)

Publication Number Publication Date
CN107493295A true CN107493295A (en) 2017-12-19
CN107493295B CN107493295B (en) 2019-09-24

Family

ID=60652232

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710793910.3A Active CN107493295B (en) 2017-09-06 2017-09-06 A kind of different account number safety login method based on blind quantum calculation

Country Status (1)

Country Link
CN (1) CN107493295B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108388946A (en) * 2018-01-29 2018-08-10 湘潭大学 A kind of two side's quantum computing methods based on blind quantum calculation
CN113708926A (en) * 2021-08-25 2021-11-26 重庆邮电大学 Safe multi-party computing method based on verifiable blind quantum computing
US20220085985A1 (en) * 2018-12-26 2022-03-17 Veriqloud Method and device for quantum computation delegated to a quantum server by a client for the creation of a quantum state known to the client purpose concealed from the quantum server

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795724A (en) * 2014-02-07 2014-05-14 陈珂 Method for protecting account security based on asynchronous dynamic password technology
CN104821874A (en) * 2015-05-15 2015-08-05 长春大学 Method employing quantum secret key for IOT (Internet of Things) data encryption transmission
US20150288517A1 (en) * 2014-04-04 2015-10-08 Ut-Battelle, Llc System and method for secured communication
CN106972922A (en) * 2013-06-08 2017-07-21 科大国盾量子技术股份有限公司 A kind of mobile secret communication method based on quantum key distribution network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106972922A (en) * 2013-06-08 2017-07-21 科大国盾量子技术股份有限公司 A kind of mobile secret communication method based on quantum key distribution network
CN103795724A (en) * 2014-02-07 2014-05-14 陈珂 Method for protecting account security based on asynchronous dynamic password technology
US20150288517A1 (en) * 2014-04-04 2015-10-08 Ut-Battelle, Llc System and method for secured communication
CN104821874A (en) * 2015-05-15 2015-08-05 长春大学 Method employing quantum secret key for IOT (Internet of Things) data encryption transmission

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108388946A (en) * 2018-01-29 2018-08-10 湘潭大学 A kind of two side's quantum computing methods based on blind quantum calculation
CN108388946B (en) * 2018-01-29 2021-08-17 湘潭大学 Two-party quantum computing method based on blind quantum computing
US20220085985A1 (en) * 2018-12-26 2022-03-17 Veriqloud Method and device for quantum computation delegated to a quantum server by a client for the creation of a quantum state known to the client purpose concealed from the quantum server
CN113708926A (en) * 2021-08-25 2021-11-26 重庆邮电大学 Safe multi-party computing method based on verifiable blind quantum computing
CN113708926B (en) * 2021-08-25 2024-05-10 重庆邮电大学 Safe multiparty calculation method based on verifiable blind quantum calculation

Also Published As

Publication number Publication date
CN107493295B (en) 2019-09-24

Similar Documents

Publication Publication Date Title
US11720891B2 (en) Method and system for zero-knowledge and identity based key management for decentralized applications
US10887100B2 (en) Systems and methods for distributed key storage
Yu et al. Platform-independent secure blockchain-based voting system
CN113127916B (en) Data set processing method, data processing method, device and storage medium
CN108235805A (en) Account unifying method and device and storage medium
EP2365679B1 (en) Secret interest groups in online social networks
Li et al. Semiquantum key distribution with secure delegated quantum computation
CN107017984A (en) Key derivation based on parameter
Sun et al. Privacy-preserving verifiable incentive mechanism for online crowdsourcing markets
Pallavi et al. Authentication-based access control and data exchanging mechanism of IoT devices in fog computing environment
CN107493295B (en) A kind of different account number safety login method based on blind quantum calculation
Mishra et al. Quantum anonymous veto: a set of new protocols
Abulkasim et al. Quantum-based privacy-preserving sealed-bid auction on the blockchain
Thapa et al. SPA: A secure and private auction framework for decentralized online social networks
Ren et al. Building resilient web 3.0 with quantum information technologies and blockchain: An ambilateral view
Braeken Highly efficient bidirectional multi-factor authentication and key agreement for real-time access to sensor data
CN107104804A (en) A kind of platform integrity verification method and device
Yao et al. Private information: To reveal or not to reveal
WO2017074953A1 (en) Method and system for dynamic password authentication based on quantum states
CN111447058B (en) Book resource access control method based on Chinese remainder theorem
Wu et al. A secure quantum sealed-bid auction protocol based on quantum public key encryption
Liu et al. Multiparty Sealed-Bid auction protocol based on the correlation of Four-Particle entangled state
Srisakthi et al. Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment
Sunil Kumar et al. A Data Privacy Approach Using Shamir’s Secret Scheme in Permissioned Blockchain
Boshrooyeh et al. Inonymous: anonymous invitation-based system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant