CN115473630A - Internet of things privacy query method and system based on quantum computing - Google Patents

Internet of things privacy query method and system based on quantum computing Download PDF

Info

Publication number
CN115473630A
CN115473630A CN202210962130.8A CN202210962130A CN115473630A CN 115473630 A CN115473630 A CN 115473630A CN 202210962130 A CN202210962130 A CN 202210962130A CN 115473630 A CN115473630 A CN 115473630A
Authority
CN
China
Prior art keywords
data
client
quantum
privacy
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210962130.8A
Other languages
Chinese (zh)
Inventor
刘白
张香宜
王春枝
张吉昕
冯其凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei University of Technology
Original Assignee
Hubei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei University of Technology filed Critical Hubei University of Technology
Priority to CN202210962130.8A priority Critical patent/CN115473630A/en
Publication of CN115473630A publication Critical patent/CN115473630A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The invention provides an Internet of things privacy query method based on quantum computing, which is characterized in that a privacy query system model is set, wherein four entities are respectively a client, a data provider, edge equipment and terminal Internet of things equipment; after a data provider owns data which meets the requirement of a client to inquire, when a user owning index address information inquires a data item through the data provider, the data provider encrypts and quantizes a data set after knowing that a client needs to inquire the data, and sends the data set to the client; after receiving the encrypted data set, the client decrypts to obtain target data; in the process, the client privacy information-index address cannot be disclosed, and the server privacy data except the query data item also cannot be disclosed. The invention only needs one round of data transmission in the data transmission process, and simultaneously, the communication cost only needs the linear communication complexity; the method has high safety in the communication process.

Description

Internet of things privacy query method and system based on quantum computing
Technical Field
The invention belongs to the field of quantum cryptography and privacy protection under the Internet of things, relates to the field of quantum computing, information security technology and the Internet of things, and particularly relates to an Internet of things privacy query scheme based on quantum computing.
Background
The internet of things originates from the field of media and is the third revolution of the information technology industry. The internet of things is that any object is connected with a network through information sensing equipment according to an agreed protocol, and the object performs information exchange and communication through an information transmission medium so as to realize functions of intelligent identification, positioning, tracking, supervision and the like. The rapid development of the Internet of things brings huge prospects for various industries and lays a foundation for the soaring of various industries. In the application research report of the internet of things industry in 2018, the internet of things relates to a plurality of fields such as logistics, traffic, security, energy, medical treatment, construction, manufacturing, home furnishing, retail and agriculture. However, when the internet of things is generated and applied with a large amount of data, the large amount of data is abused and leaked, and further serious harm is brought to material wealth of people and even life and property. At present, a large number of cases show that the leakage of data privacy brings serious consequences to the country and people, so that privacy security is also important in the environment of the internet of things. Database query in the internet of things is almost an operation which is not executed in any application at all times, and the operation also has the risk of privacy disclosure. Fortunately, the privacy query protocol is used as a basic protocol in cryptography, and can effectively ensure the privacy information of the user and the server in the query process. With the continuous proposal of privacy query protocols in the classical field, the security requirements can be basically met.
However, with the continuous and deep understanding of the quantum field, the privacy query protocol in many classical fields may not be able to protect the data privacy and security. Compared with the classical technology, quantum computing has high-efficiency computing power. There are already articles that show the breaking of some classical security protocols by means of quantum computing. In the classical field, most of the protocols of the privacy query at present are based on the mathematical problem of computational difficulty, and the protocols may have failure hidden dangers in the future, so that the long-term safety cannot be ensured. In addition, in the quantum field, there has been some research work on quantum privacy inquiry. But some working safety still has certain hidden trouble, and some efficiency is not very high-efficient.
Disclosure of Invention
In view of this, the present invention provides a privacy query scheme for the internet of things based on quantum computing, so that a client (i.e., a user) can perform secure communication with a data provider (i.e., a server) on the premise of ensuring efficiency and security.
In order to achieve the purpose, the technical scheme of the invention provides an internet of things privacy query method based on quantum computing, which comprises the steps of setting a privacy query system model, wherein four entities are respectively a client, a data provider, edge equipment and terminal internet of things equipment in the privacy query system model;
the client is used as a query object of a user for target data in a database of a data provider; the client side is provided with terminal electronic equipment and a quantum device and can perform quantum bit operation;
the data provider is used for storing a large amount of data information; the data provider has a server and a quantum device capable of performing qubit operations;
the edge device is used for receiving data information uploaded by the terminal Internet of things device, then carrying out integration and aggregation locally, and finally uploading the processed data information to a data provider;
the terminal Internet of things equipment is used for collecting data information and then uploading the data information to the edge equipment;
after a data provider owns data which meets the requirement of a client to inquire, when a user owning index address information inquires a data item through the data provider, the data provider encrypts and quantizes a data set after knowing that a client needs to inquire the data, and sends the data set to the client; after receiving the encrypted data set, the client decrypts the data set to obtain target data; in the process, the client privacy information-index address cannot be disclosed, and the server privacy data except the query data item also cannot be disclosed.
Moreover, the privacy inquiry is carried out based on the privacy inquiry system model, the implementation process comprises the following steps,
s1, initializing a system, including data provider collection data, and client registration to obtain an index address;
s2, generating a secret key, including generating a shared secret key, a private secret key and a private random number;
s3, the data provider transmits the ciphertext, wherein the ciphertext comprises a quantum superposition state with encrypted data provided for the client;
and S4, protecting the privacy information and simultaneously acquiring query data by the client.
Moreover, the implementation manner of the step 1 is that the client registers and obtains the index address information of the index data; and the data provider receives the aggregated data information uploaded by the edge equipment, wherein the uploaded data information of the edge equipment is obtained after being processed and aggregated after receiving the information uploaded by the terminal Internet of things equipment.
Moreover, the implementation of step 2 comprises the following sub-steps,
s2.1, the client and the data provider obtain a shared key through quantum key distribution;
s2.2, the client generates a private random key;
s2.3, the client generates a random private integer.
Furthermore, the implementation of step 3 comprises the following sub-steps,
s3.1, encrypting the original data by the data provider by using a shared key;
s3.2, the data provider quantizes the encrypted original data by using the quantum memory, so that a quantum superposition state of the encrypted data is obtained;
and S3.3, the data provider sends the quantum superposition state to the client.
Furthermore, the implementation of step 4 comprises the following sub-steps,
s4.1, the client side carries out quantum one-time pad encryption on the first register-index superposition state in the quantum superposition state by using the private random key;
s4.2, the client encrypts the second bit register-encrypted data superposition state in the quantum superposition state by using the random private integer;
s4.3, adding a mark superposition state for searching a target state on the whole quantum superposition state by the client;
s4.4, the client carries out a quantum search algorithm on the whole quantum superposition state, and then measures the whole quantum superposition state, so that encrypted target data are obtained;
s4.5, the client decrypts the measurement data by using the private random number;
and S4.6, the client further decrypts the measurement data by using the shared secret key so as to obtain the target data.
On the other hand, the invention also provides an internet of things privacy query system based on quantum computing, which is used for realizing the internet of things privacy query method based on quantum computing.
And, including the following modules,
the system initialization module is used for system initialization, and comprises the steps of collecting data by a data provider, storing the data and registering a client so as to obtain index address information;
the key generation module is used for encrypting original data by a data provider to improve communication security and encrypting quantum state protection privacy data information by a client;
the data provider transmission ciphertext module is used for encrypting original data by using a shared secret key by the data provider, quantizing the original data by using a quantum random access memory, and sending a quantum state to the client, so that the client can obtain target data finally; in the process, the privacy information of the data provider cannot be leaked;
the client-side obtaining query data module is used for helping the client-side obtain target data without revealing privacy information; the client side firstly conducts a series of encryption on the received quantum state so as to ensure that the risk of revealing privacy information of the client side does not exist in the subsequent operation, and then the client side obtains target data through searching, measuring and decrypting operations.
Compared with the prior art, the invention has the advantages and beneficial effects that,
(1) The invention has information theory safety under the condition of ensuring correctness. Compared with some current researches, the method has higher safety, and can effectively ensure that the privacy information of the client (user) and the data provider (server) is not leaked.
(2) The invention has high communication efficiency. Compared with some current researches, the invention only needs linear communication complexity, and only needs 1 round when data information is transmitted.
(3) The invention has certain robustness and expansibility, and the key security generated by using the quantum key distribution protocol in the invention is information theory security and is a symmetric key. Therefore, the key can be repeatedly used within a certain time to reduce the cost, and meanwhile, the key can be applied to a wide range of scenes. Therefore, the invention is more suitable for the requirement of taking privacy inquiry as a basic component in the actual environment.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is to be understood that the embodiments described herein are merely illustrative and explanatory of the invention and are not restrictive thereof.
FIG. 1 is a diagram of a system model according to an embodiment of the present invention;
FIG. 2 is a flow chart of an embodiment of the present invention;
FIG. 3 is a data query interaction diagram of an embodiment of the present invention;
FIG. 4 is a flowchart of a method according to an embodiment of the present invention.
Detailed Description
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following description will be made with reference to the accompanying drawings. It is obvious that the drawings in the following description are only some examples of the invention, and that for a person skilled in the art, other drawings and embodiments can be derived from them without inventive effort. For the sake of simplicity, the drawings only schematically show the parts relevant to the present invention, and they do not represent the actual structure as a product.
The invention realizes a privacy query method under the Internet of things by means of quantum technologies including quantum key generation, quantum one-time pad and quantum random access memory. The embodiment client can efficiently communicate with the data provider, and only one round of data transmission is needed in the data transmission process. While the communication cost in the overall embodiment requires only linear communication complexity. Secondly, the invention has information theory level security in the communication process. Due to the quantum characteristic, once the communication data is intercepted and measured by an external enemy, the communication data cannot be restored again, and whether an external enemy obtains a dishonest data provider or not can be effectively judged.
The invention provides a privacy query system model under the Internet of things based on quantum computing. It is assumed that four entities, a client, a data provider, edge equipment and terminal internet-of-things equipment exist in the model. In the invention, the condition of multiple clients is basically consistent with the condition of a single client, and the multiple clients can be generated by combining a plurality of single clients. For convenience, it is assumed that there is only one client for serving as a query object of a user for target data in a database of a data provider. The client has terminal electronics and a quantum device capable of qubit operation. The multiple data provider scenario is substantially identical to the single data provider scenario, and multiple data provider scenarios may be generated by multiple single data providers in combination. Also for convenience, it is assumed that there is only one data provider, which may own one or more servers. He can store a large amount of data information. In addition, data providers also have quantum devices that are capable of qubit operation. It is assumed that one or more edge devices exist, which can receive data information uploaded by the terminal internet of things device and then integrate and aggregate the data information locally. Eventually they upload the processed data information to the data provider. The edge device can effectively reduce the communication efficiency during data uploading, and the edge device can be formed by devices such as a fog node. It is assumed that there are one or more terminal internet of things devices, which may exist in various forms including a mobile phone, a computer, a watch, and the like. The terminal Internet of things equipment has the main function of collecting data information and uploading the data information to the edge equipment.
Referring to fig. 1, an embodiment of the present invention provides a privacy query system model supported by quantum technology under the Internet of Things based on the method, which includes four entity units, specifically, a terminal Internet of Things device (Internet of Things devices, which is hereinafter abbreviated as IoT-Ds), an edge device (edge devices, which is hereinafter abbreviated as ED), a data provider (server provider, which is abbreviated as SP), and a client (the client).
Suppose that there are m terminal internet of things devices IoT-Ds in an area, which are deployed around different users respectively, and collecting data information of the users includes behaviors and physical conditions. After collection, the IoT-Ds device uploads it to the ED. The ED is not present in only one but may be present in plural. They receive the data sent by different IoT-Ds, respectively. Each edge device ED, after receiving the data sent by the IoT-Ds, first performs local processing and aggregation to obtain preprocessed data. The ED then sends the pre-processed data to the data provider SP. Through the auxiliary uploading of data of EDs, SP can collect data information more efficiently, and communication efficiency is improved. This process is only one way for the SP to collect data to obtain database information and is not the focus of the present invention. The present invention does not take into account the safety in this process.
After the SP has data satisfying the client's desire to query, it is assumed that the user having the index address information wants to query one data item through the SP. For convenience, it is assumed that there is a user making a private data query for the SP using a client platform. After knowing that a client needs to inquire data, the SP encrypts and quantizes the data set and sends the data set to the client. And after receiving the encrypted data set, the client decrypts the encrypted data set to obtain the target data. In the process, the client privacy information-index address is not disclosed, and the server privacy data (except the query data item) is also not disclosed.
Referring to fig. 2, fig. 3 and fig. 4, the invention provides a quantum computing-based internet of things privacy query method, which mainly comprises four parts, namely system initialization, key generation, cryptograph transmission by a data provider and query data acquisition by a client.
System initialization includes step 1 in fig. 2.
Step 1, data providers collect data, and clients register to obtain index addresses.
The client registers and obtains index address information of the index data; and the data provider receives the aggregated data information uploaded by the edge device, wherein the uploaded data information of the edge device is obtained after being processed and aggregated after receiving the information uploaded by the terminal Internet of things device.
For convenience of explanation in the following, the embodiment assumes that the data provider has an original data set S = { S = } S 0 ,s 1 ,...,s N-1 Each data item s therein 0 ,s 1 ,...,s N-1 Are all located at Z 2 ={0,1},Z 2 Indicating that the data value is 0 or 1 and the total number of data items N =2 n And N represents a value having a specific mathematical relationship with the total number N of data items for providing parameters for a later step. Assume that the client has obtained the index address x.
Key generation see step 2 in fig. 2.
And 2, generating a shared key, a private key and a private random number.
Step 2 in the examples is preferably implemented using sub-steps,
step 2.1, the data provider and the client obtain an equal-length N-bit shared key K = { K } through a quantum key distribution protocol (taking B92 protocol as an example) 0 ,k 1 ,...,k N-1 Where each key data item k 0 ,k 1 ,...,k N-1 All can get rid ofIs 0 or 1.
Step 2.2, the client randomly generates a private key KAB = (ka, kb) = { ka = (ka, kb) = 0 ,ka 1 ,...,ka n-1 ,kb 0 ,kb 1 ,...,kb n-1 Denotes that the content in the private key KAB is ka 0 ,ka 1 ,...,ka n-1 Kb represents that the content in the private key KAB is kb 0 ,kb 1 ,...,kb n-1 The partial private key string of (1). kb 0 ,kb 1 ,...,kb n-1 And ka 0 ,ka 1 ,...,ka n-1 A specific key item representing a private key, wherein each item has a value of either 0 or 1 at random.
And 2.3, the client generates a random private integer, namely a private random number r is in the range of 0,1.
The data provider transport key is shown in step 3 of fig. 2.
And 3, providing the quantum superposition state with the encrypted data to the client by the data provider. Step 3 in the examples is preferably implemented using sub-steps,
step 3.1, data provider utilizes shared secret key K = { K = { K = } 0 ,k 1 ,...,k N-1 For database data S = { S = } 0 ,s 1 ,...,s N-1 Get the encrypted data by encrypting
Figure BDA0003793172860000061
(
Figure BDA0003793172860000062
Is an exclusive or operation). Wherein, ks 0 ,ks 1 ,...,ks N-1 To encrypt the data item.
Step 3.2, the data provider prepares a Quantum Random Access Memory (QRAM) in which the address register of the QRAM contains a Quantum superposition State
Figure BDA0003793172860000063
Correspondingly, each data register stores a basis state | ks (i)>. That is, the QRAM outputs a quantum superposition state,
Figure BDA0003793172860000064
wherein | i>A quantum representation representing the ith bit of address data.
Figure BDA0003793172860000065
Representing the quantum stacking state of the index address,
Figure BDA0003793172860000066
representing the quantum superposition state of the encrypted data. For ease of explanation, we introduce c and d to represent the register storing the quantum superposition state of the address and the register storing the quantum superposition state of the encrypted data, respectively, such that i> c Can represent the quantum superposition state of index address, | ks i (i)> d A quantum superposition state of the encrypted data may be represented. Ks | (R) i (i)>Ks in (1) i Represents the ith item of the encrypted data KS, and (i) represents that he is at | data>Corresponding to the index value in the quantum superposition state.
And 3.3, the data provider sends the quantum superposition state | data > to the client.
The client obtaining the query data includes step 4 in fig. two.
And 4, protecting the privacy information and simultaneously acquiring query data by the client.
Step 4.1, the client side carries out quantum one-time pad encryption on the first register-index superposition state in the quantum superposition state by using the private random key:
the client receives the quantum superposition state | data>Then, a quantum superposition state | i of the index address is encrypted by using a private key KAB and through a quantum one-time pad encryption mode> c
Then, the client can get the quantum superposition state,
Figure BDA0003793172860000071
wherein
Figure BDA0003793172860000072
Paoli-Z door
Figure BDA0003793172860000073
Paoli-X gate
Figure BDA0003793172860000074
Figure BDA0003793172860000075
Called the tensor product in the quantum domain, for combining vector spaces together to form a larger vector space,
Figure BDA0003793172860000076
indicating that some of the element tensors from 0 to n-1 are multiplied together.
Figure BDA0003793172860000077
Ka for expressing Paly X door i The power of the first power of the image,
Figure BDA0003793172860000078
kb representing the Pauli Z Gate i To the power of one. X ka Expressing the tensor product of n pauli X gates raised by the ka part of the private key, like X kb Meaning that n pauli Z gates raised by the kb portion of the private key are tensor multiplied. X ka And X kb And simultaneously, the method is used for encrypting the quantum bits used by the quantum superposition state of the index address according to bits. | i * >Represents the quantum state of the index address on the ith bit after encryption, | i * > c And representing the quantum superposition state of the encrypted index address. | ks i (i * )> d Representing the quantum superposition state of the encrypted data corresponding to the quantum superposition state of the encrypted index address, wherein i * And the index value representing the ith bit encryption is used for indicating the encrypted index value corresponding to each encrypted data in the quantum superposition state of the encrypted data.
Step 4.2, the client encrypts the second bit register-encrypted data superposition state in the quantum superposition state by using the random private integer:
the client randomly selects an integer r epsilon {0,1., N-1} and further executes an addition operator
Figure BDA0003793172860000079
Acting on quantum superposition state | data A >To realize
Figure BDA00037931728600000710
After the random number adding operation is performed, the client can obtain the following quantum state,
Figure BDA0003793172860000081
wherein
Figure BDA0003793172860000082
The quantum superposition state representing the addition of random data r to the encrypted data in the quantum state is equivalent to the quantum superposition state of the encrypted data obtained by secondarily encrypting the original data. ks is the product of i * For encrypting data ks i The result after adding the random number r.
Step 4.3, the client adds a mark superposition state for searching a target state on the whole quantum superposition state:
client prepares an auxiliary quantum state |0>And executes an operator U mark To realize U mark :
Figure BDA0003793172860000083
After this operation is performed, the client can get the quantum states,
Figure BDA0003793172860000084
wherein
Figure BDA0003793172860000085
The lower case x in the above formula is the privacy information-index address of the client.
Figure BDA0003793172860000086
|0>Represents converting quantum state |0>Zhang Chengji in quantum superposition state
Figure BDA0003793172860000087
The above. i.e. i * Representing data corresponding to quantum superposition state B >Of a certain encrypted index value, mark (i) * ) Indicating a value of a flag if the encrypted index address quantum overlaps state i * > c The quantum state of the ith bit satisfies | i * >=X ka Z kb |x>Then the corresponding mark (i) * ) The value is 1, otherwise labeled 0 for ease of explanation, e is introduced here to denote a register storing a quantum superposition of the information of the mark, such that | mark (i) * )> e A quantum superposition state of the tag information may be represented.
Step 4.4, the client carries out quantum search algorithm on the whole quantum superposition state, and then measures the quantum search algorithm, so as to obtain encrypted target data:
client side searches quantum superposition state | data by applying quantum search algorithm-Grover C >To find a target state
Figure BDA0003793172860000091
Where | x * >=X ka Z kb |x>,
Where | x>Quantum form, | x, representing client target data index address * >Represents a pair | x>Quantum form, x, after one-time pad encryption * Representing the encrypted value of the target data index address x. ks is the product of x (x * ) Representing the median value of the quantum superposition state of the encrypted data as ks x The value of the corresponding index address quantum state of the encrypted data of (3) is x *
State | data when performing Grover iterations in a Grover search algorithm C >Second and third quantum stacking states of
Figure BDA0003793172860000092
Are considered to be oracle workspace quantum bits.
And 4.5, the client decrypts the measurement data by using the private random number:
client measures quantum state | data applying Grover search algorithm C >Thereby obtaining encrypted target data
Figure BDA0003793172860000093
Step 4.6, the client further decrypts the measurement data by using the shared key, thereby obtaining the target data:
the client firstly compares the measurement results
Figure BDA0003793172860000095
Subtracting the random integer r to obtain the cryptographic value ks x . The client then passes K in the shared secret key K x Bit to decrypt encrypted value ks x Thereby obtaining target index data
Figure BDA0003793172860000094
According to the invention, through quantum key distribution, quantum one-time pad, addition of random numbers on quantum bits and other modes, the security of a client and a data provider in privacy query is improved, and the security of a privacy query protocol is ensured. The invention ensures that the communication process has information theory safety through the XOR encryption. Meanwhile, a data provider utilizes the quantum random access memory to enable classical data quanta to be superposed and attitude, and communication safety is further enhanced. In addition, the transmission data is in a quantum superposition state, so that the communication efficiency is greatly reduced.
In addition, the step numbers described herein only exemplarily show one possible execution sequence among the steps, and in some other embodiments, the steps may also be executed out of the numbering sequence, for example, two steps with different numbers are executed simultaneously, or two steps with different numbers are executed in a reverse order to the order shown in the figure, which is not limited by the embodiment of the present application.
In specific implementation, a person skilled in the art can implement the automatic operation process by using a computer software technology, and a system device for implementing the method, such as a computer-readable storage medium storing a corresponding computer program according to the technical solution of the present invention and a computer device including a corresponding computer program for operating the computer program, should also be within the scope of the present invention.
In some possible embodiments, a privacy query system of the internet of things based on quantum computing is provided, which comprises the following modules,
the system initialization module is used for system initialization, and comprises the steps of collecting data by a data provider, storing the data and registering a client so as to obtain index address information;
the key generation module is used for encrypting original data by a data provider to improve communication security and encrypting quantum state protection privacy data information by a client;
the data provider transmission ciphertext module is used for encrypting original data by using a shared secret key by a data provider, quantizing the original data by using a quantum random access memory, sending a quantum state to a client, and finally enabling the client to obtain target data; in the process, the privacy information of the data provider cannot be leaked;
the client-side obtaining query data module is used for helping the client-side obtain target data without revealing privacy information; the client side firstly conducts a series of encryption on the received quantum state so as to ensure that the risk of revealing privacy information of the client side does not exist in the subsequent operation, and then the client side obtains target data through searching, measuring and decrypting operations.
The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the present application should be included in the protection scope of the present application.
The foregoing is only a partial embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and embellishments can be made without departing from the principle of the present invention, and these should also be construed as the scope of the present invention.

Claims (8)

1. A quantum computation-based Internet of things privacy query method is characterized by comprising the following steps: setting a privacy query system model, wherein four entities exist in the privacy query system model, and are respectively a client, a data provider, edge equipment and terminal Internet of things equipment;
the client is used as a query object of a user for target data in a database of a data provider; the client side is provided with terminal electronic equipment and a quantum device and can carry out quantum bit operation;
the data provider is used for storing a large amount of data information; the data provider is provided with a server and a quantum device and can carry out quantum bit operation;
the edge device is used for receiving data information uploaded by the terminal Internet of things device, then carrying out integration and aggregation locally, and finally uploading the processed data information to a data provider;
the terminal Internet of things equipment is used for collecting data information and then uploading the data information to the edge equipment;
after a data provider owns data which meets the requirement of a client to inquire, when a user owning index address information inquires a data item through the data provider, the data provider encrypts and quantizes a data set after knowing that a client needs to inquire the data, and sends the data set to the client; after receiving the encrypted data set, the client decrypts the data set to obtain target data; in the process, the client privacy information-index address cannot be disclosed, and the server privacy data except the query data item also cannot be disclosed.
2. The privacy query method for the internet of things based on quantum computing as claimed in claim 1, wherein: the privacy inquiry is carried out based on the privacy inquiry system model, the implementation process comprises the following steps,
s1, initializing a system, including data provider collection data, and client registration to obtain an index address;
s2, generating a secret key, including generating a shared secret key, a private secret key and a private random number;
s3, the data provider transmits the ciphertext, wherein the ciphertext comprises a quantum superposition state with encrypted data provided for the client;
and S4, protecting the privacy information and simultaneously acquiring query data by the client.
3. The privacy query method for the internet of things based on quantum computing as claimed in claim 2, wherein: the implementation mode of the step 1 is that a client registers and obtains index address information of index data; and the data provider receives the aggregated data information uploaded by the edge device, wherein the uploaded data information of the edge device is obtained after being processed and aggregated after receiving the information uploaded by the terminal Internet of things device.
4. The privacy query method for the internet of things based on quantum computing as claimed in claim 2, wherein: the implementation of step 2 comprises the following sub-steps,
s2.1, the client and the data provider obtain a shared key through quantum key distribution;
s2.2, the client generates a private random key;
and S2.3, the client generates a random private integer.
5. The privacy query method for the internet of things based on quantum computing as claimed in claim 2, wherein: the implementation of step 3 comprises the following sub-steps,
s3.1, encrypting the original data by the data provider by using a shared key;
s3.2, the data provider quantizes the encrypted original data by using the quantum memory, so that a quantum superposition state of the encrypted data is obtained;
and S3.3, the data provider sends the quantum superposition state to the client.
6. The privacy query method for the internet of things based on quantum computing as claimed in claim 2, wherein: the implementation of step 4 comprises the following sub-steps,
s4.1, the client side carries out quantum one-time pad encryption on the first register-index superposition state in the quantum superposition state by using the private random key;
s4.2, the client encrypts the second bit register-encrypted data superposition state in the quantum superposition state by using the random private integer;
s4.3, adding a mark superposition state for searching a target state on the whole quantum superposition state by the client;
s4.4, the client carries out a quantum search algorithm on the whole quantum superposition state, and then measures the whole quantum superposition state, so that encrypted target data are obtained;
s4.5, the client decrypts the measurement data by using the private random number;
and S4.6, the client further decrypts the measurement data by using the shared secret key so as to obtain the target data.
7. The utility model provides a thing networking privacy inquiry system based on quantum computing which characterized in that: the method for realizing the privacy query of the internet of things based on quantum computing as claimed in any one of claims 1 to 6.
8. The privacy query system for internet of things based on quantum computing as claimed in claim 7, wherein: comprises the following modules which are used for realizing the functions of the system,
the system initialization module is used for system initialization, and comprises the steps of collecting data by a data provider, storing the data and registering a client so as to obtain index address information;
the key generation module is used for encrypting original data by a data provider to improve communication security and encrypting quantum state protection privacy data information by a client;
the data provider transmission ciphertext module is used for encrypting original data by using a shared secret key by the data provider, quantizing the original data by using a quantum random access memory, and sending a quantum state to the client, so that the client can obtain target data finally; in the process, the privacy information of the data provider cannot be revealed;
the client-side obtaining query data module is used for helping the client-side obtain target data without revealing privacy information; the client side firstly conducts a series of encryption on the received quantum state so as to ensure that the risk of revealing privacy information of the client side does not exist in the subsequent operation, and then the client side obtains target data through searching, measuring and decrypting operations.
CN202210962130.8A 2022-08-11 2022-08-11 Internet of things privacy query method and system based on quantum computing Pending CN115473630A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210962130.8A CN115473630A (en) 2022-08-11 2022-08-11 Internet of things privacy query method and system based on quantum computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210962130.8A CN115473630A (en) 2022-08-11 2022-08-11 Internet of things privacy query method and system based on quantum computing

Publications (1)

Publication Number Publication Date
CN115473630A true CN115473630A (en) 2022-12-13

Family

ID=84367300

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210962130.8A Pending CN115473630A (en) 2022-08-11 2022-08-11 Internet of things privacy query method and system based on quantum computing

Country Status (1)

Country Link
CN (1) CN115473630A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196431A (en) * 2011-05-13 2011-09-21 南京邮电大学 Internet of things application scene-based protection method of privacy query and private identity verification
US20170243028A1 (en) * 2013-11-01 2017-08-24 Anonos Inc. Systems and Methods for Enhancing Data Protection by Anonosizing Structured and Unstructured Data and Incorporating Machine Learning and Artificial Intelligence in Classical and Quantum Computing Environments
CN110572370A (en) * 2019-08-16 2019-12-13 湖北工业大学 Agent re-encryption system and method for resisting quantum attack
CN112332987A (en) * 2021-01-06 2021-02-05 成都信息工程大学 Cloud quantum privacy query method based on user agent
CN112865967A (en) * 2021-02-05 2021-05-28 安徽华典大数据科技有限公司 Mobile data memory based on quantum key encryption
CN113179154A (en) * 2021-03-25 2021-07-27 北京邮电大学 Resource joint distribution method in quantum key distribution Internet of things and related equipment
CN114297714A (en) * 2021-12-30 2022-04-08 电子科技大学广东电子信息工程研究院 Method for data privacy protection and safe search in cloud environment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196431A (en) * 2011-05-13 2011-09-21 南京邮电大学 Internet of things application scene-based protection method of privacy query and private identity verification
US20170243028A1 (en) * 2013-11-01 2017-08-24 Anonos Inc. Systems and Methods for Enhancing Data Protection by Anonosizing Structured and Unstructured Data and Incorporating Machine Learning and Artificial Intelligence in Classical and Quantum Computing Environments
CN110572370A (en) * 2019-08-16 2019-12-13 湖北工业大学 Agent re-encryption system and method for resisting quantum attack
CN112332987A (en) * 2021-01-06 2021-02-05 成都信息工程大学 Cloud quantum privacy query method based on user agent
CN112865967A (en) * 2021-02-05 2021-05-28 安徽华典大数据科技有限公司 Mobile data memory based on quantum key encryption
CN113179154A (en) * 2021-03-25 2021-07-27 北京邮电大学 Resource joint distribution method in quantum key distribution Internet of things and related equipment
CN114297714A (en) * 2021-12-30 2022-04-08 电子科技大学广东电子信息工程研究院 Method for data privacy protection and safe search in cloud environment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
BAI LIU ET AL.: "Quantum private set intersection cardinality based on bloom filter", SCIENTIFIC REPORTS, 30 August 2021 (2021-08-30) *
BAI LIU ET AL: "SEPSI:A secure and efficient privacy-preserving set intersection with identity authentication in IOT", MATHEMATICS, 17 June 2022 (2022-06-17), pages 2 - 5 *

Similar Documents

Publication Publication Date Title
Xu et al. Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber–physical system
Harbi et al. A review of security in internet of things
Qi et al. Cpds: Enabling compressed and private data sharing for industrial Internet of Things over blockchain
Zhang et al. A privacy protection scheme for IoT big data based on time and frequency limitation
Liu et al. Conditional anonymous remote healthcare data sharing over blockchain
Guo et al. Enabling privacy-preserving geographic range query in fog-enhanced IoT services
CN113141247B (en) Homomorphic encryption method, homomorphic encryption device, homomorphic encryption system and readable storage medium
Li et al. An efficient blind filter: Location privacy protection and the access control in FinTech
Zheng et al. Secure storage auditing with efficient key updates for cognitive industrial IoT environment
Mousavi et al. Security of Internet of Things using RC4 and ECC algorithms (case study: smart irrigation systems)
Liu et al. A quantum-based database query scheme for privacy preservation in cloud environment
Kuri et al. Privacy preserving extreme learning machine using additively homomorphic encryption
CN114598472A (en) Conditional-hidden searchable agent re-encryption method based on block chain and storage medium
Yang et al. New publicly verifiable cloud data deletion scheme with efficient tracking
Tsou et al. SER: Secure and efficient retrieval for anonymous range query in wireless sensor networks
Alamer A secure anonymous tracing fog-assisted method for the Internet of Robotic Things
Halder et al. Enabling secure time-series data sharing via homomorphic encryption in cloud-assisted IIoT
Zhang et al. Ldvas: Lattice-based designated verifier auditing scheme for electronic medical data in cloud-assisted wbans
Qu et al. QB-IMD: A secure medical data processing system with privacy protection based on quantum blockchain for IoMT
Zhang et al. Post-quantum blockchain over lattice
Zhang et al. Privacy-preserving multikey computing framework for encrypted data in the cloud
Tseng et al. Quantum secret sharing based on quantum search algorithm
Xie et al. Access-oblivious and privacy-preserving k nearest neighbors classification in dual clouds
Liu et al. Lattice-based proxy-oriented public auditing scheme for electronic health record in cloud-assisted wbans
Cao et al. A lightweight fine-grained search scheme over encrypted data in cloud-assisted wireless body area networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination