CN110086606B - Quantum mechanism-based multi-party secret sharing method for black and white images - Google Patents
Quantum mechanism-based multi-party secret sharing method for black and white images Download PDFInfo
- Publication number
- CN110086606B CN110086606B CN201910152621.4A CN201910152621A CN110086606B CN 110086606 B CN110086606 B CN 110086606B CN 201910152621 A CN201910152621 A CN 201910152621A CN 110086606 B CN110086606 B CN 110086606B
- Authority
- CN
- China
- Prior art keywords
- quantum
- bob
- pixel
- black
- secret
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Control Of Indicators Other Than Cathode Ray Tubes (AREA)
- Image Processing (AREA)
Abstract
The invention provides a quantum mechanism-based multi-party secret sharing method for black and white images, which encodes each pixel in a secret image into an n-quantum-bit superposition state, and then distributes each quantum bit to participants as a share; when a participant wants to recover the original secret image, all share shares are collected, and the recovery is carried out by executing exclusive-or operation through a quantum circuit. Has the advantages that: the operation of each pixel is realized, and each share is disordered by using the uncertainty of a quantum superposition state; and the secret image can be completely recovered without distortion.
Description
Technical Field
The invention belongs to the field of quantum computation and visual secret sharing, and particularly relates to a quantum mechanism-based black and white image multiparty secret sharing method.
Background
Secret sharing is an important research field in classical cryptography, and aims to share secrets in a proper mode, each share after sharing is managed by different participants, secret information cannot be recovered by a single participant, and secret information can be recovered only by cooperation of a plurality of participants. Visual Secret Sharing (VSS) is derived from a secret sharing technology, and is characterized in that when a secret image is encrypted, each secret pixel point is divided into pixel blocks consisting of m sub-pixel points, so that a binary secret image is shared to generate a plurality of noise-like shared shares (shares). Since each shared share is just like random noise, an attacker cannot directly solve the secret information from the ciphertext. However, the share is m times of the original secret image, so that the pixel expansion exists, and the problem of resolution loss exists in the restored image, namely the visual quality of the restored image is poor. Another feature of visual secret sharing is that the decryption process is very simple, and the human visual system can directly recognize the secret information by printing a certain number of shared shares onto the transparent film and superimposing them. Due to the theoretical security of visual secret sharing and the simplicity of secret recovery, the method can be widely applied to the fields of group participation or control, such as password storage, key management, digital watermarking, signature authentication and the like.
Quantum Secret Sharing (QSS) is an extension of classical secret sharing in the quantum field, and multi-user secret key share sharing and recovery are realized by means of quantum mechanical correlation characteristics, so that potential unconditional security of different classical schemes is realized. Over the past 20 years, various quantum secret sharing schemes have been proposed by many scholars, playing an important role in practical issues such as quantum key distribution, non-counterfeit quantum cash, secure quantum storage, multiparty quantum communication, and so on. However, there has been little research on quantum-based visual cryptography.
Recently, Song et al proposed a quantum image secret sharing method, in which the whole secret image (all pixels) is encoded into a quantum state during the sharing process, and then the image is divided into 2 by quantum measurement and other strategieskA share; in the recovery process, flexible quantum wires are added into the wiring diagram of the shadow image to recover the quantum images to obtain recovered images. Compared with the classic visual secret sharing method, the image storage and transmission method provides stronger safety and less qubit consumption because of the quantum mechanism. However, this scheme is to process the entire image, and does not have the features and advantages of operating VSS in units of pixels.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, provides a quantum mechanism-based multi-party secret sharing method for black and white images, and solves the defect that the conventional QSS scheme cannot meet the requirement of a classical visual password scheme for operating by taking pixels as units; and in the classic visual secret sharing scheme, the problem of resolution loss exists in image recovery. The method is realized by the following technical scheme:
the quantum mechanism-based multi-party secret sharing method for black and white images sets a sharer to send a secret image to n participants Bob1,Bob2,…,BobnAnd the secret image comprises s black and white pixels; stipulate |0>Represents white, |1>Representing black, the main process of the method comprises a secret image sharing process and a secret image recovery process, wherein the sharing process comprises the following steps:
step 1) a sharer selects any pixel l in the secret image, wherein the pixel l corresponds to the ith pixel, and the color information of the pixel l is encoded into a quantum superposition state | C according to the formula (1)b>l;
Step 2) sharer will compose | Cb>lN bits ofDistributed as a shared share to n participants Bob1,Bob2,…,BobnCompleting the sharing operation of the current pixel, wherein the superscript n represents that the current bit is distributed to the nth participant;
step 3) repeating the steps 1) to 2) until all pixels of the whole image complete sharing operation;
the recovery process comprises the steps of:
step a) participant BobjSending out requests to other n-1 bit participants to obtain n share shares corresponding to the ith pixel
Step b) participant BobjSelect { |0>,|1>Measure the base, for n share sharesFormed superimposed state | Cb>lMeasuring to obtain a determined quantum state
Step c) participant BobjQuantum state of quantumPerforming XOR operation by quantum circuit to obtain a result state
Step d) participant BobjFor the result stateMake a judgment ifIs |0>If the state is "1", the first pixel is white; if it is notIs |1>If the state is "black", the first pixel is black;
step e) BobjAnd repeating the steps a) to d), and recovering the colors of all the pixels to finish the recovery of the original secret image.
The quantum-based multi-party secret sharing method for black and white images further comprises the step of constructing the quantum circuit in the step c) by a CNOT quantum gate.
The invention has the following advantages:
compared with the method provided by Song et al, the quantum mechanism-based multi-party secret sharing method for the black and white image realizes the operation of each pixel, and makes each share be disordered by using the uncertainty of a quantum superposition state; compared with the classic visual secret sharing, the method can completely recover the secret image and does not have the phenomenon of loss of the resolution of the recovered image.
Drawings
Fig. 1 is a schematic diagram of a quantum encoding process of pixels in a secret image.
Fig. 2 is a schematic diagram of a secret image sharing process.
Fig. 3 is a quantum circuit diagram of an n-quantum-bit accumulated exclusive-or operation.
Fig. 4 is a schematic diagram of a secret image recovery process.
Fig. 5 is an example of a quantum visual secret sharing method for a 4-pixel secret image.
Detailed Description
The technical solution of the present invention will be described in detail below with reference to the accompanying drawings.
The quantum-mechanism-based multi-party secret sharing method for black and white images in this embodiment is as shown in fig. 5, and it is assumed that a sharer Alice wants to share a secret image composed of 4 black and white pixels to 3 participants Bob1,Bob2And Bob3I.e., s-4 and n-3, the process consists of the following sharing process (see fig. 2) and recovery process (see fig. 4).
The sharing process of this embodiment is as follows:
step (1) As shown in Step 1 in FIG. 2, Alice needs to encode each pixel, for example, the 1 st pixel, and encode its color information into the 3-qubit superposition state | C0>1Inner, | C0>1The specific encoding process can be obtained as shown in FIG. 1Like the 1 st pixel operation, the 2 nd pixel is encoded intoThe 3 rd pixel is coded intoThe 4 th pixel is coded into
Step (2) As shown in Step 2 in FIG. 2, Alice will constitute the superposed state | C0>1As 3 shared shares of 3 qubitsAnddistributed to all participants Bob1,Bob2And Bob3。
Step (3) is as shown in Step 3 in fig. 2, and Step 1 and Step 2 are repeated until all pixels of the whole image complete the sharing operation.
The recovery process of this embodiment is as follows:
suppose Bob2Wanting to restore the original secret image (as shown in the example of FIG. 5)
Step (a) Bob2The share shares corresponding to the same pixel are obtained from all other participants, which can be shown as Step 1 in fig. 4, assuming that it corresponds to the 1 st pixel,and
step (b) is as in Step 2, Bob of FIG. 42Select { |0>,|1>Measurement base pairAndform | C0>1Measurement is carried out, | C0>1Collapse into a defined quantum state
Step (c) is as in Step 3, Bob of FIG. 42Will be provided withThrough the quantum circuit as shown in fig. 3. The quantum circuit of fig. 3 is mainly composed of CNOT quantum gates, and the main function is to perform xor operation on input quantum states to obtain result states
Step (d) is as in Step 4, Bob of FIG. 42For result stateMaking a judgment, if the result state is correctIs |0>State, the 1 st pixel is white; if the result state isIs |1>For state, the 1 st pixel is black.
Step (e) is as in Step 5, Bob of FIG. 42And repeating the operations from Step 1 to Step 4 until the original secret image is recovered.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (2)
1. Black-white image based on quantum mechanismThe multi-party secret sharing method is characterized in that a sharer is set to share a secret image to n participants Bob1,Bob2,...,BobnAnd the secret image comprises s black and white pixels; stipulate |0>Represents white, |1>Representing black, the main process of the method comprises a secret image sharing process and a secret image recovery process, wherein the sharing process comprises the following steps:
step 1) a sharer selects any pixel l in the secret image, the pixel l represents the ith pixel, and the color information of the pixel l is encoded into an n-qubit superposition state | C according to the formula (1)b>l;
Step 2) sharer will compose | Cb>lN bits ofDistributed as a shared share to n participants Bob1,Bob2,…,BobnCompleting the sharing operation of the current pixel, wherein the superscript n represents that the current bit is distributed to the nth participant;
step 3) repeating the steps 1) to 2) until all pixels of the whole image complete sharing operation;
the recovery process comprises the steps of:
step a) participant BobjSending out requests to other n-1 bit participants to obtain n share shares corresponding to the ith pixel
Step b) participant BobjSelect { |0>,|1>Measure the base, for n share sharesFormed superimposed state | Cb>lMeasuring to obtain a determined quantum state
Step c) participant BobjQuantum state of quantumPerforming XOR operation by quantum circuit to obtain a result state
Step d) participant BobjFor the result stateMake a judgment ifIs |0>If the state is "1", the first pixel is white; if it is notIs |1>If the state is "black", the first pixel is black;
step e) BobjAnd repeating the steps a) to d), and recovering the colors of all the pixels to finish the recovery of the original secret image.
2. The quantum-based mechanism secret sharing method between black and white images of claim 1, wherein the quantum circuit in step c) is formed by a CNOT quantum gate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910152621.4A CN110086606B (en) | 2019-02-28 | 2019-02-28 | Quantum mechanism-based multi-party secret sharing method for black and white images |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910152621.4A CN110086606B (en) | 2019-02-28 | 2019-02-28 | Quantum mechanism-based multi-party secret sharing method for black and white images |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110086606A CN110086606A (en) | 2019-08-02 |
CN110086606B true CN110086606B (en) | 2021-12-14 |
Family
ID=67413124
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910152621.4A Active CN110086606B (en) | 2019-02-28 | 2019-02-28 | Quantum mechanism-based multi-party secret sharing method for black and white images |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110086606B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110602349B (en) * | 2019-08-27 | 2021-07-02 | 成都信息工程大学 | Method for security protection of associated image content |
CN111049646B (en) * | 2019-11-21 | 2023-04-07 | 南京信息工程大学 | Multi-party quantum searchable encryption method based on quantum entrusting calculation |
CN113312604B (en) * | 2021-05-31 | 2023-05-09 | 南京信息工程大学 | Distributed secret image sharing method with public reconstruction based on blockchain authentication |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1383267A1 (en) * | 2001-03-21 | 2004-01-21 | Japan Science and Technology Corporation | Quantum cipher communication system |
CN101719263A (en) * | 2009-12-08 | 2010-06-02 | 清华大学 | Image visual dividing storing method with least dividing storage and optimal comparison |
CN105389517A (en) * | 2015-12-21 | 2016-03-09 | 西安电子科技大学 | Method for hiding secret information in images |
CN108648133A (en) * | 2018-05-11 | 2018-10-12 | 陕西师范大学 | A kind of rotation of combined block and mosaic without embedded camouflage method |
CN109257108A (en) * | 2018-11-13 | 2019-01-22 | 广东水利电力职业技术学院(广东省水利电力技工学校) | A kind of multiplicate controlling quantum communications protocol implementing method and system |
CN109951235A (en) * | 2019-01-24 | 2019-06-28 | 西北大学 | The quantum teleportation method of volume subsystem based on Quantum fourier transform |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8260067B2 (en) * | 2008-04-18 | 2012-09-04 | New Jersey Institute Of Technology | Detection technique for digitally altered images |
TW201201556A (en) * | 2010-06-29 | 2012-01-01 | Chunghwa Telecom Co Ltd | Construction structure of quantum encryption service network |
-
2019
- 2019-02-28 CN CN201910152621.4A patent/CN110086606B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1383267A1 (en) * | 2001-03-21 | 2004-01-21 | Japan Science and Technology Corporation | Quantum cipher communication system |
CN101719263A (en) * | 2009-12-08 | 2010-06-02 | 清华大学 | Image visual dividing storing method with least dividing storage and optimal comparison |
CN105389517A (en) * | 2015-12-21 | 2016-03-09 | 西安电子科技大学 | Method for hiding secret information in images |
CN108648133A (en) * | 2018-05-11 | 2018-10-12 | 陕西师范大学 | A kind of rotation of combined block and mosaic without embedded camouflage method |
CN109257108A (en) * | 2018-11-13 | 2019-01-22 | 广东水利电力职业技术学院(广东省水利电力技工学校) | A kind of multiplicate controlling quantum communications protocol implementing method and system |
CN109951235A (en) * | 2019-01-24 | 2019-06-28 | 西北大学 | The quantum teleportation method of volume subsystem based on Quantum fourier transform |
Non-Patent Citations (5)
Title |
---|
Authenticated Quantum Secure Direct Communication with Qutrits;Wenjie Liu;《IEEE》;20081107;全文 * |
Flexible Quantum Image Secret Sharing Based on Measurement and Strip;Xianhua Song;《IEEE》;20141229;全文 * |
基于互认证的三维单光子量子安全直接通信;刘文杰;《中南大学学报(自然科学版)》;20090910;全文 * |
无纠缠量子秘密共享中酉操作的选择;刘文杰;《中国科学信息科学》;20110720;全文 * |
秘密共享技术及其应用的研究;袁理锋;《中国博士学位论文全文数据库.电子期刊》;20171015(第10期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN110086606A (en) | 2019-08-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Guo et al. | A hierarchical threshold secret image sharing | |
CN110086606B (en) | Quantum mechanism-based multi-party secret sharing method for black and white images | |
Feng et al. | Visual secret sharing for multiple secrets | |
CN104200424B (en) | Difference conversion based (K, N) meaningful image sharing and recovering method | |
Yang et al. | Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach | |
WO2014075469A1 (en) | Method and device for information hiding | |
CN106683053A (en) | GF(2<6>) finite-field multi-threshold progressive secrete image sharing and reconstruction methods | |
Wen et al. | Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding | |
CN104751400B (en) | Secret image share method based on the insertion of pixel-map matrix | |
Anbarasi et al. | Secured secret color image sharing with steganography | |
Hou et al. | A privilege-based visual secret sharing model | |
Vijayakumar et al. | Increased level of security using DNA steganography | |
CN104702814B (en) | (K, N) Image of Meaningful based on triple backups point is deposited and restoration methods | |
Chiu et al. | An XOR-based progressive visual cryptography with meaningful shares | |
CN108171665B (en) | Multi-version backup and restrictive dual authentication master key (t, s, k, n) image separate storage method | |
Liu et al. | Quantum steganography for multi-party covert communication | |
Nilesh | Simple proof of security of the multiparty prepare and measure QKD | |
Guo et al. | A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction. | |
CN114189595A (en) | Image secret sharing method based on alliance chain | |
CN109558701B (en) | Medical CT image secret sharing method | |
CN113312604A (en) | Block chain authentication-based public reconstruction-based distributed secret image sharing method | |
Yan et al. | Secret image sharing based on error-correcting codes | |
CN110460737B (en) | Image sharing and restoring method | |
Verma et al. | Significant secret image sharing scheme based on boolean operation | |
Verma et al. | Strong threshold secret image sharing based on boolean operation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |