CN115473630A - Internet of things privacy query method and system based on quantum computing - Google Patents
Internet of things privacy query method and system based on quantum computing Download PDFInfo
- Publication number
- CN115473630A CN115473630A CN202210962130.8A CN202210962130A CN115473630A CN 115473630 A CN115473630 A CN 115473630A CN 202210962130 A CN202210962130 A CN 202210962130A CN 115473630 A CN115473630 A CN 115473630A
- Authority
- CN
- China
- Prior art keywords
- data
- client
- quantum
- privacy
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 230000006854 communication Effects 0.000 claims abstract description 20
- 238000004891 communication Methods 0.000 claims abstract description 17
- 230000008569 process Effects 0.000 claims abstract description 13
- 230000005540 biological transmission Effects 0.000 claims abstract description 10
- 238000005259 measurement Methods 0.000 claims description 7
- 239000002096 quantum dot Substances 0.000 claims description 6
- 238000010845 search algorithm Methods 0.000 claims description 6
- 238000009826 distribution Methods 0.000 claims description 5
- 230000002776 aggregation Effects 0.000 claims description 3
- 238000004220 aggregation Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 claims description 3
- 230000010354 integration Effects 0.000 claims description 2
- 230000006855 networking Effects 0.000 claims 1
- 238000005516 engineering process Methods 0.000 description 5
- 238000011160 research Methods 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 238000011282 treatment Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Abstract
The invention provides an Internet of things privacy query method based on quantum computing, which is characterized in that a privacy query system model is set, wherein four entities are respectively a client, a data provider, edge equipment and terminal Internet of things equipment; after a data provider owns data which meets the requirement of a client to inquire, when a user owning index address information inquires a data item through the data provider, the data provider encrypts and quantizes a data set after knowing that a client needs to inquire the data, and sends the data set to the client; after receiving the encrypted data set, the client decrypts to obtain target data; in the process, the client privacy information-index address cannot be disclosed, and the server privacy data except the query data item also cannot be disclosed. The invention only needs one round of data transmission in the data transmission process, and simultaneously, the communication cost only needs the linear communication complexity; the method has high safety in the communication process.
Description
Technical Field
The invention belongs to the field of quantum cryptography and privacy protection under the Internet of things, relates to the field of quantum computing, information security technology and the Internet of things, and particularly relates to an Internet of things privacy query scheme based on quantum computing.
Background
The internet of things originates from the field of media and is the third revolution of the information technology industry. The internet of things is that any object is connected with a network through information sensing equipment according to an agreed protocol, and the object performs information exchange and communication through an information transmission medium so as to realize functions of intelligent identification, positioning, tracking, supervision and the like. The rapid development of the Internet of things brings huge prospects for various industries and lays a foundation for the soaring of various industries. In the application research report of the internet of things industry in 2018, the internet of things relates to a plurality of fields such as logistics, traffic, security, energy, medical treatment, construction, manufacturing, home furnishing, retail and agriculture. However, when the internet of things is generated and applied with a large amount of data, the large amount of data is abused and leaked, and further serious harm is brought to material wealth of people and even life and property. At present, a large number of cases show that the leakage of data privacy brings serious consequences to the country and people, so that privacy security is also important in the environment of the internet of things. Database query in the internet of things is almost an operation which is not executed in any application at all times, and the operation also has the risk of privacy disclosure. Fortunately, the privacy query protocol is used as a basic protocol in cryptography, and can effectively ensure the privacy information of the user and the server in the query process. With the continuous proposal of privacy query protocols in the classical field, the security requirements can be basically met.
However, with the continuous and deep understanding of the quantum field, the privacy query protocol in many classical fields may not be able to protect the data privacy and security. Compared with the classical technology, quantum computing has high-efficiency computing power. There are already articles that show the breaking of some classical security protocols by means of quantum computing. In the classical field, most of the protocols of the privacy query at present are based on the mathematical problem of computational difficulty, and the protocols may have failure hidden dangers in the future, so that the long-term safety cannot be ensured. In addition, in the quantum field, there has been some research work on quantum privacy inquiry. But some working safety still has certain hidden trouble, and some efficiency is not very high-efficient.
Disclosure of Invention
In view of this, the present invention provides a privacy query scheme for the internet of things based on quantum computing, so that a client (i.e., a user) can perform secure communication with a data provider (i.e., a server) on the premise of ensuring efficiency and security.
In order to achieve the purpose, the technical scheme of the invention provides an internet of things privacy query method based on quantum computing, which comprises the steps of setting a privacy query system model, wherein four entities are respectively a client, a data provider, edge equipment and terminal internet of things equipment in the privacy query system model;
the client is used as a query object of a user for target data in a database of a data provider; the client side is provided with terminal electronic equipment and a quantum device and can perform quantum bit operation;
the data provider is used for storing a large amount of data information; the data provider has a server and a quantum device capable of performing qubit operations;
the edge device is used for receiving data information uploaded by the terminal Internet of things device, then carrying out integration and aggregation locally, and finally uploading the processed data information to a data provider;
the terminal Internet of things equipment is used for collecting data information and then uploading the data information to the edge equipment;
after a data provider owns data which meets the requirement of a client to inquire, when a user owning index address information inquires a data item through the data provider, the data provider encrypts and quantizes a data set after knowing that a client needs to inquire the data, and sends the data set to the client; after receiving the encrypted data set, the client decrypts the data set to obtain target data; in the process, the client privacy information-index address cannot be disclosed, and the server privacy data except the query data item also cannot be disclosed.
Moreover, the privacy inquiry is carried out based on the privacy inquiry system model, the implementation process comprises the following steps,
s1, initializing a system, including data provider collection data, and client registration to obtain an index address;
s2, generating a secret key, including generating a shared secret key, a private secret key and a private random number;
s3, the data provider transmits the ciphertext, wherein the ciphertext comprises a quantum superposition state with encrypted data provided for the client;
and S4, protecting the privacy information and simultaneously acquiring query data by the client.
Moreover, the implementation manner of the step 1 is that the client registers and obtains the index address information of the index data; and the data provider receives the aggregated data information uploaded by the edge equipment, wherein the uploaded data information of the edge equipment is obtained after being processed and aggregated after receiving the information uploaded by the terminal Internet of things equipment.
Moreover, the implementation of step 2 comprises the following sub-steps,
s2.1, the client and the data provider obtain a shared key through quantum key distribution;
s2.2, the client generates a private random key;
s2.3, the client generates a random private integer.
Furthermore, the implementation of step 3 comprises the following sub-steps,
s3.1, encrypting the original data by the data provider by using a shared key;
s3.2, the data provider quantizes the encrypted original data by using the quantum memory, so that a quantum superposition state of the encrypted data is obtained;
and S3.3, the data provider sends the quantum superposition state to the client.
Furthermore, the implementation of step 4 comprises the following sub-steps,
s4.1, the client side carries out quantum one-time pad encryption on the first register-index superposition state in the quantum superposition state by using the private random key;
s4.2, the client encrypts the second bit register-encrypted data superposition state in the quantum superposition state by using the random private integer;
s4.3, adding a mark superposition state for searching a target state on the whole quantum superposition state by the client;
s4.4, the client carries out a quantum search algorithm on the whole quantum superposition state, and then measures the whole quantum superposition state, so that encrypted target data are obtained;
s4.5, the client decrypts the measurement data by using the private random number;
and S4.6, the client further decrypts the measurement data by using the shared secret key so as to obtain the target data.
On the other hand, the invention also provides an internet of things privacy query system based on quantum computing, which is used for realizing the internet of things privacy query method based on quantum computing.
And, including the following modules,
the system initialization module is used for system initialization, and comprises the steps of collecting data by a data provider, storing the data and registering a client so as to obtain index address information;
the key generation module is used for encrypting original data by a data provider to improve communication security and encrypting quantum state protection privacy data information by a client;
the data provider transmission ciphertext module is used for encrypting original data by using a shared secret key by the data provider, quantizing the original data by using a quantum random access memory, and sending a quantum state to the client, so that the client can obtain target data finally; in the process, the privacy information of the data provider cannot be leaked;
the client-side obtaining query data module is used for helping the client-side obtain target data without revealing privacy information; the client side firstly conducts a series of encryption on the received quantum state so as to ensure that the risk of revealing privacy information of the client side does not exist in the subsequent operation, and then the client side obtains target data through searching, measuring and decrypting operations.
Compared with the prior art, the invention has the advantages and beneficial effects that,
(1) The invention has information theory safety under the condition of ensuring correctness. Compared with some current researches, the method has higher safety, and can effectively ensure that the privacy information of the client (user) and the data provider (server) is not leaked.
(2) The invention has high communication efficiency. Compared with some current researches, the invention only needs linear communication complexity, and only needs 1 round when data information is transmitted.
(3) The invention has certain robustness and expansibility, and the key security generated by using the quantum key distribution protocol in the invention is information theory security and is a symmetric key. Therefore, the key can be repeatedly used within a certain time to reduce the cost, and meanwhile, the key can be applied to a wide range of scenes. Therefore, the invention is more suitable for the requirement of taking privacy inquiry as a basic component in the actual environment.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is to be understood that the embodiments described herein are merely illustrative and explanatory of the invention and are not restrictive thereof.
FIG. 1 is a diagram of a system model according to an embodiment of the present invention;
FIG. 2 is a flow chart of an embodiment of the present invention;
FIG. 3 is a data query interaction diagram of an embodiment of the present invention;
FIG. 4 is a flowchart of a method according to an embodiment of the present invention.
Detailed Description
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following description will be made with reference to the accompanying drawings. It is obvious that the drawings in the following description are only some examples of the invention, and that for a person skilled in the art, other drawings and embodiments can be derived from them without inventive effort. For the sake of simplicity, the drawings only schematically show the parts relevant to the present invention, and they do not represent the actual structure as a product.
The invention realizes a privacy query method under the Internet of things by means of quantum technologies including quantum key generation, quantum one-time pad and quantum random access memory. The embodiment client can efficiently communicate with the data provider, and only one round of data transmission is needed in the data transmission process. While the communication cost in the overall embodiment requires only linear communication complexity. Secondly, the invention has information theory level security in the communication process. Due to the quantum characteristic, once the communication data is intercepted and measured by an external enemy, the communication data cannot be restored again, and whether an external enemy obtains a dishonest data provider or not can be effectively judged.
The invention provides a privacy query system model under the Internet of things based on quantum computing. It is assumed that four entities, a client, a data provider, edge equipment and terminal internet-of-things equipment exist in the model. In the invention, the condition of multiple clients is basically consistent with the condition of a single client, and the multiple clients can be generated by combining a plurality of single clients. For convenience, it is assumed that there is only one client for serving as a query object of a user for target data in a database of a data provider. The client has terminal electronics and a quantum device capable of qubit operation. The multiple data provider scenario is substantially identical to the single data provider scenario, and multiple data provider scenarios may be generated by multiple single data providers in combination. Also for convenience, it is assumed that there is only one data provider, which may own one or more servers. He can store a large amount of data information. In addition, data providers also have quantum devices that are capable of qubit operation. It is assumed that one or more edge devices exist, which can receive data information uploaded by the terminal internet of things device and then integrate and aggregate the data information locally. Eventually they upload the processed data information to the data provider. The edge device can effectively reduce the communication efficiency during data uploading, and the edge device can be formed by devices such as a fog node. It is assumed that there are one or more terminal internet of things devices, which may exist in various forms including a mobile phone, a computer, a watch, and the like. The terminal Internet of things equipment has the main function of collecting data information and uploading the data information to the edge equipment.
Referring to fig. 1, an embodiment of the present invention provides a privacy query system model supported by quantum technology under the Internet of Things based on the method, which includes four entity units, specifically, a terminal Internet of Things device (Internet of Things devices, which is hereinafter abbreviated as IoT-Ds), an edge device (edge devices, which is hereinafter abbreviated as ED), a data provider (server provider, which is abbreviated as SP), and a client (the client).
Suppose that there are m terminal internet of things devices IoT-Ds in an area, which are deployed around different users respectively, and collecting data information of the users includes behaviors and physical conditions. After collection, the IoT-Ds device uploads it to the ED. The ED is not present in only one but may be present in plural. They receive the data sent by different IoT-Ds, respectively. Each edge device ED, after receiving the data sent by the IoT-Ds, first performs local processing and aggregation to obtain preprocessed data. The ED then sends the pre-processed data to the data provider SP. Through the auxiliary uploading of data of EDs, SP can collect data information more efficiently, and communication efficiency is improved. This process is only one way for the SP to collect data to obtain database information and is not the focus of the present invention. The present invention does not take into account the safety in this process.
After the SP has data satisfying the client's desire to query, it is assumed that the user having the index address information wants to query one data item through the SP. For convenience, it is assumed that there is a user making a private data query for the SP using a client platform. After knowing that a client needs to inquire data, the SP encrypts and quantizes the data set and sends the data set to the client. And after receiving the encrypted data set, the client decrypts the encrypted data set to obtain the target data. In the process, the client privacy information-index address is not disclosed, and the server privacy data (except the query data item) is also not disclosed.
Referring to fig. 2, fig. 3 and fig. 4, the invention provides a quantum computing-based internet of things privacy query method, which mainly comprises four parts, namely system initialization, key generation, cryptograph transmission by a data provider and query data acquisition by a client.
System initialization includes step 1 in fig. 2.
Step 1, data providers collect data, and clients register to obtain index addresses.
The client registers and obtains index address information of the index data; and the data provider receives the aggregated data information uploaded by the edge device, wherein the uploaded data information of the edge device is obtained after being processed and aggregated after receiving the information uploaded by the terminal Internet of things device.
For convenience of explanation in the following, the embodiment assumes that the data provider has an original data set S = { S = } S 0 ,s 1 ,...,s N-1 Each data item s therein 0 ,s 1 ,...,s N-1 Are all located at Z 2 ={0,1},Z 2 Indicating that the data value is 0 or 1 and the total number of data items N =2 n And N represents a value having a specific mathematical relationship with the total number N of data items for providing parameters for a later step. Assume that the client has obtained the index address x.
Key generation see step 2 in fig. 2.
And 2, generating a shared key, a private key and a private random number.
Step 2 in the examples is preferably implemented using sub-steps,
step 2.1, the data provider and the client obtain an equal-length N-bit shared key K = { K } through a quantum key distribution protocol (taking B92 protocol as an example) 0 ,k 1 ,...,k N-1 Where each key data item k 0 ,k 1 ,...,k N-1 All can get rid ofIs 0 or 1.
Step 2.2, the client randomly generates a private key KAB = (ka, kb) = { ka = (ka, kb) = 0 ,ka 1 ,...,ka n-1 ,kb 0 ,kb 1 ,...,kb n-1 Denotes that the content in the private key KAB is ka 0 ,ka 1 ,...,ka n-1 Kb represents that the content in the private key KAB is kb 0 ,kb 1 ,...,kb n-1 The partial private key string of (1). kb 0 ,kb 1 ,...,kb n-1 And ka 0 ,ka 1 ,...,ka n-1 A specific key item representing a private key, wherein each item has a value of either 0 or 1 at random.
And 2.3, the client generates a random private integer, namely a private random number r is in the range of 0,1.
The data provider transport key is shown in step 3 of fig. 2.
And 3, providing the quantum superposition state with the encrypted data to the client by the data provider. Step 3 in the examples is preferably implemented using sub-steps,
step 3.1, data provider utilizes shared secret key K = { K = { K = } 0 ,k 1 ,...,k N-1 For database data S = { S = } 0 ,s 1 ,...,s N-1 Get the encrypted data by encrypting(Is an exclusive or operation). Wherein, ks 0 ,ks 1 ,...,ks N-1 To encrypt the data item.
Step 3.2, the data provider prepares a Quantum Random Access Memory (QRAM) in which the address register of the QRAM contains a Quantum superposition StateCorrespondingly, each data register stores a basis state | ks (i)>. That is, the QRAM outputs a quantum superposition state,
wherein | i>A quantum representation representing the ith bit of address data.Representing the quantum stacking state of the index address,representing the quantum superposition state of the encrypted data. For ease of explanation, we introduce c and d to represent the register storing the quantum superposition state of the address and the register storing the quantum superposition state of the encrypted data, respectively, such that i> c Can represent the quantum superposition state of index address, | ks i (i)> d A quantum superposition state of the encrypted data may be represented. Ks | (R) i (i)>Ks in (1) i Represents the ith item of the encrypted data KS, and (i) represents that he is at | data>Corresponding to the index value in the quantum superposition state.
And 3.3, the data provider sends the quantum superposition state | data > to the client.
The client obtaining the query data includes step 4 in fig. two.
And 4, protecting the privacy information and simultaneously acquiring query data by the client.
Step 4.1, the client side carries out quantum one-time pad encryption on the first register-index superposition state in the quantum superposition state by using the private random key:
the client receives the quantum superposition state | data>Then, a quantum superposition state | i of the index address is encrypted by using a private key KAB and through a quantum one-time pad encryption mode> c 。
Then, the client can get the quantum superposition state,
whereinPaoli-Z doorPaoli-X gate Called the tensor product in the quantum domain, for combining vector spaces together to form a larger vector space,indicating that some of the element tensors from 0 to n-1 are multiplied together.Ka for expressing Paly X door i The power of the first power of the image,kb representing the Pauli Z Gate i To the power of one. X ka Expressing the tensor product of n pauli X gates raised by the ka part of the private key, like X kb Meaning that n pauli Z gates raised by the kb portion of the private key are tensor multiplied. X ka And X kb And simultaneously, the method is used for encrypting the quantum bits used by the quantum superposition state of the index address according to bits. | i * >Represents the quantum state of the index address on the ith bit after encryption, | i * > c And representing the quantum superposition state of the encrypted index address. | ks i (i * )> d Representing the quantum superposition state of the encrypted data corresponding to the quantum superposition state of the encrypted index address, wherein i * And the index value representing the ith bit encryption is used for indicating the encrypted index value corresponding to each encrypted data in the quantum superposition state of the encrypted data.
Step 4.2, the client encrypts the second bit register-encrypted data superposition state in the quantum superposition state by using the random private integer:
the client randomly selects an integer r epsilon {0,1., N-1} and further executes an addition operatorActing on quantum superposition state | data A >To realize
After the random number adding operation is performed, the client can obtain the following quantum state,
whereinThe quantum superposition state representing the addition of random data r to the encrypted data in the quantum state is equivalent to the quantum superposition state of the encrypted data obtained by secondarily encrypting the original data. ks is the product of i * For encrypting data ks i The result after adding the random number r.
Step 4.3, the client adds a mark superposition state for searching a target state on the whole quantum superposition state:
client prepares an auxiliary quantum state |0>And executes an operator U mark To realize U mark :After this operation is performed, the client can get the quantum states,
wherein
The lower case x in the above formula is the privacy information-index address of the client.|0>Represents converting quantum state |0>Zhang Chengji in quantum superposition stateThe above. i.e. i * Representing data corresponding to quantum superposition state B >Of a certain encrypted index value, mark (i) * ) Indicating a value of a flag if the encrypted index address quantum overlaps state i * > c The quantum state of the ith bit satisfies | i * >=X ka Z kb |x>Then the corresponding mark (i) * ) The value is 1, otherwise labeled 0 for ease of explanation, e is introduced here to denote a register storing a quantum superposition of the information of the mark, such that | mark (i) * )> e A quantum superposition state of the tag information may be represented.
Step 4.4, the client carries out quantum search algorithm on the whole quantum superposition state, and then measures the quantum search algorithm, so as to obtain encrypted target data:
client side searches quantum superposition state | data by applying quantum search algorithm-Grover C >To find a target stateWhere | x * >=X ka Z kb |x>,
Where | x>Quantum form, | x, representing client target data index address * >Represents a pair | x>Quantum form, x, after one-time pad encryption * Representing the encrypted value of the target data index address x. ks is the product of x (x * ) Representing the median value of the quantum superposition state of the encrypted data as ks x The value of the corresponding index address quantum state of the encrypted data of (3) is x * 。
State | data when performing Grover iterations in a Grover search algorithm C >Second and third quantum stacking states ofAre considered to be oracle workspace quantum bits.
And 4.5, the client decrypts the measurement data by using the private random number:
client measures quantum state | data applying Grover search algorithm C >Thereby obtaining encrypted target data
Step 4.6, the client further decrypts the measurement data by using the shared key, thereby obtaining the target data:
the client firstly compares the measurement resultsSubtracting the random integer r to obtain the cryptographic value ks x . The client then passes K in the shared secret key K x Bit to decrypt encrypted value ks x Thereby obtaining target index data
According to the invention, through quantum key distribution, quantum one-time pad, addition of random numbers on quantum bits and other modes, the security of a client and a data provider in privacy query is improved, and the security of a privacy query protocol is ensured. The invention ensures that the communication process has information theory safety through the XOR encryption. Meanwhile, a data provider utilizes the quantum random access memory to enable classical data quanta to be superposed and attitude, and communication safety is further enhanced. In addition, the transmission data is in a quantum superposition state, so that the communication efficiency is greatly reduced.
In addition, the step numbers described herein only exemplarily show one possible execution sequence among the steps, and in some other embodiments, the steps may also be executed out of the numbering sequence, for example, two steps with different numbers are executed simultaneously, or two steps with different numbers are executed in a reverse order to the order shown in the figure, which is not limited by the embodiment of the present application.
In specific implementation, a person skilled in the art can implement the automatic operation process by using a computer software technology, and a system device for implementing the method, such as a computer-readable storage medium storing a corresponding computer program according to the technical solution of the present invention and a computer device including a corresponding computer program for operating the computer program, should also be within the scope of the present invention.
In some possible embodiments, a privacy query system of the internet of things based on quantum computing is provided, which comprises the following modules,
the system initialization module is used for system initialization, and comprises the steps of collecting data by a data provider, storing the data and registering a client so as to obtain index address information;
the key generation module is used for encrypting original data by a data provider to improve communication security and encrypting quantum state protection privacy data information by a client;
the data provider transmission ciphertext module is used for encrypting original data by using a shared secret key by a data provider, quantizing the original data by using a quantum random access memory, sending a quantum state to a client, and finally enabling the client to obtain target data; in the process, the privacy information of the data provider cannot be leaked;
the client-side obtaining query data module is used for helping the client-side obtain target data without revealing privacy information; the client side firstly conducts a series of encryption on the received quantum state so as to ensure that the risk of revealing privacy information of the client side does not exist in the subsequent operation, and then the client side obtains target data through searching, measuring and decrypting operations.
The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the present application should be included in the protection scope of the present application.
The foregoing is only a partial embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and embellishments can be made without departing from the principle of the present invention, and these should also be construed as the scope of the present invention.
Claims (8)
1. A quantum computation-based Internet of things privacy query method is characterized by comprising the following steps: setting a privacy query system model, wherein four entities exist in the privacy query system model, and are respectively a client, a data provider, edge equipment and terminal Internet of things equipment;
the client is used as a query object of a user for target data in a database of a data provider; the client side is provided with terminal electronic equipment and a quantum device and can carry out quantum bit operation;
the data provider is used for storing a large amount of data information; the data provider is provided with a server and a quantum device and can carry out quantum bit operation;
the edge device is used for receiving data information uploaded by the terminal Internet of things device, then carrying out integration and aggregation locally, and finally uploading the processed data information to a data provider;
the terminal Internet of things equipment is used for collecting data information and then uploading the data information to the edge equipment;
after a data provider owns data which meets the requirement of a client to inquire, when a user owning index address information inquires a data item through the data provider, the data provider encrypts and quantizes a data set after knowing that a client needs to inquire the data, and sends the data set to the client; after receiving the encrypted data set, the client decrypts the data set to obtain target data; in the process, the client privacy information-index address cannot be disclosed, and the server privacy data except the query data item also cannot be disclosed.
2. The privacy query method for the internet of things based on quantum computing as claimed in claim 1, wherein: the privacy inquiry is carried out based on the privacy inquiry system model, the implementation process comprises the following steps,
s1, initializing a system, including data provider collection data, and client registration to obtain an index address;
s2, generating a secret key, including generating a shared secret key, a private secret key and a private random number;
s3, the data provider transmits the ciphertext, wherein the ciphertext comprises a quantum superposition state with encrypted data provided for the client;
and S4, protecting the privacy information and simultaneously acquiring query data by the client.
3. The privacy query method for the internet of things based on quantum computing as claimed in claim 2, wherein: the implementation mode of the step 1 is that a client registers and obtains index address information of index data; and the data provider receives the aggregated data information uploaded by the edge device, wherein the uploaded data information of the edge device is obtained after being processed and aggregated after receiving the information uploaded by the terminal Internet of things device.
4. The privacy query method for the internet of things based on quantum computing as claimed in claim 2, wherein: the implementation of step 2 comprises the following sub-steps,
s2.1, the client and the data provider obtain a shared key through quantum key distribution;
s2.2, the client generates a private random key;
and S2.3, the client generates a random private integer.
5. The privacy query method for the internet of things based on quantum computing as claimed in claim 2, wherein: the implementation of step 3 comprises the following sub-steps,
s3.1, encrypting the original data by the data provider by using a shared key;
s3.2, the data provider quantizes the encrypted original data by using the quantum memory, so that a quantum superposition state of the encrypted data is obtained;
and S3.3, the data provider sends the quantum superposition state to the client.
6. The privacy query method for the internet of things based on quantum computing as claimed in claim 2, wherein: the implementation of step 4 comprises the following sub-steps,
s4.1, the client side carries out quantum one-time pad encryption on the first register-index superposition state in the quantum superposition state by using the private random key;
s4.2, the client encrypts the second bit register-encrypted data superposition state in the quantum superposition state by using the random private integer;
s4.3, adding a mark superposition state for searching a target state on the whole quantum superposition state by the client;
s4.4, the client carries out a quantum search algorithm on the whole quantum superposition state, and then measures the whole quantum superposition state, so that encrypted target data are obtained;
s4.5, the client decrypts the measurement data by using the private random number;
and S4.6, the client further decrypts the measurement data by using the shared secret key so as to obtain the target data.
7. The utility model provides a thing networking privacy inquiry system based on quantum computing which characterized in that: the method for realizing the privacy query of the internet of things based on quantum computing as claimed in any one of claims 1 to 6.
8. The privacy query system for internet of things based on quantum computing as claimed in claim 7, wherein: comprises the following modules which are used for realizing the functions of the system,
the system initialization module is used for system initialization, and comprises the steps of collecting data by a data provider, storing the data and registering a client so as to obtain index address information;
the key generation module is used for encrypting original data by a data provider to improve communication security and encrypting quantum state protection privacy data information by a client;
the data provider transmission ciphertext module is used for encrypting original data by using a shared secret key by the data provider, quantizing the original data by using a quantum random access memory, and sending a quantum state to the client, so that the client can obtain target data finally; in the process, the privacy information of the data provider cannot be revealed;
the client-side obtaining query data module is used for helping the client-side obtain target data without revealing privacy information; the client side firstly conducts a series of encryption on the received quantum state so as to ensure that the risk of revealing privacy information of the client side does not exist in the subsequent operation, and then the client side obtains target data through searching, measuring and decrypting operations.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210962130.8A CN115473630A (en) | 2022-08-11 | 2022-08-11 | Internet of things privacy query method and system based on quantum computing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210962130.8A CN115473630A (en) | 2022-08-11 | 2022-08-11 | Internet of things privacy query method and system based on quantum computing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115473630A true CN115473630A (en) | 2022-12-13 |
Family
ID=84367300
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210962130.8A Pending CN115473630A (en) | 2022-08-11 | 2022-08-11 | Internet of things privacy query method and system based on quantum computing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115473630A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102196431A (en) * | 2011-05-13 | 2011-09-21 | 南京邮电大学 | Internet of things application scene-based protection method of privacy query and private identity verification |
US20170243028A1 (en) * | 2013-11-01 | 2017-08-24 | Anonos Inc. | Systems and Methods for Enhancing Data Protection by Anonosizing Structured and Unstructured Data and Incorporating Machine Learning and Artificial Intelligence in Classical and Quantum Computing Environments |
CN110572370A (en) * | 2019-08-16 | 2019-12-13 | 湖北工业大学 | Agent re-encryption system and method for resisting quantum attack |
CN112332987A (en) * | 2021-01-06 | 2021-02-05 | 成都信息工程大学 | Cloud quantum privacy query method based on user agent |
CN112865967A (en) * | 2021-02-05 | 2021-05-28 | 安徽华典大数据科技有限公司 | Mobile data memory based on quantum key encryption |
CN113179154A (en) * | 2021-03-25 | 2021-07-27 | 北京邮电大学 | Resource joint distribution method in quantum key distribution Internet of things and related equipment |
CN114297714A (en) * | 2021-12-30 | 2022-04-08 | 电子科技大学广东电子信息工程研究院 | Method for data privacy protection and safe search in cloud environment |
-
2022
- 2022-08-11 CN CN202210962130.8A patent/CN115473630A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102196431A (en) * | 2011-05-13 | 2011-09-21 | 南京邮电大学 | Internet of things application scene-based protection method of privacy query and private identity verification |
US20170243028A1 (en) * | 2013-11-01 | 2017-08-24 | Anonos Inc. | Systems and Methods for Enhancing Data Protection by Anonosizing Structured and Unstructured Data and Incorporating Machine Learning and Artificial Intelligence in Classical and Quantum Computing Environments |
CN110572370A (en) * | 2019-08-16 | 2019-12-13 | 湖北工业大学 | Agent re-encryption system and method for resisting quantum attack |
CN112332987A (en) * | 2021-01-06 | 2021-02-05 | 成都信息工程大学 | Cloud quantum privacy query method based on user agent |
CN112865967A (en) * | 2021-02-05 | 2021-05-28 | 安徽华典大数据科技有限公司 | Mobile data memory based on quantum key encryption |
CN113179154A (en) * | 2021-03-25 | 2021-07-27 | 北京邮电大学 | Resource joint distribution method in quantum key distribution Internet of things and related equipment |
CN114297714A (en) * | 2021-12-30 | 2022-04-08 | 电子科技大学广东电子信息工程研究院 | Method for data privacy protection and safe search in cloud environment |
Non-Patent Citations (2)
Title |
---|
BAI LIU ET AL.: "Quantum private set intersection cardinality based on bloom filter", SCIENTIFIC REPORTS, 30 August 2021 (2021-08-30) * |
BAI LIU ET AL: "SEPSI:A secure and efficient privacy-preserving set intersection with identity authentication in IOT", MATHEMATICS, 17 June 2022 (2022-06-17), pages 2 - 5 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xu et al. | Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber–physical system | |
Harbi et al. | A review of security in internet of things | |
Qi et al. | Cpds: Enabling compressed and private data sharing for industrial Internet of Things over blockchain | |
Zhang et al. | A privacy protection scheme for IoT big data based on time and frequency limitation | |
Liu et al. | Conditional anonymous remote healthcare data sharing over blockchain | |
Guo et al. | Enabling privacy-preserving geographic range query in fog-enhanced IoT services | |
CN113141247B (en) | Homomorphic encryption method, homomorphic encryption device, homomorphic encryption system and readable storage medium | |
Li et al. | An efficient blind filter: Location privacy protection and the access control in FinTech | |
Zheng et al. | Secure storage auditing with efficient key updates for cognitive industrial IoT environment | |
Mousavi et al. | Security of Internet of Things using RC4 and ECC algorithms (case study: smart irrigation systems) | |
Liu et al. | A quantum-based database query scheme for privacy preservation in cloud environment | |
Kuri et al. | Privacy preserving extreme learning machine using additively homomorphic encryption | |
CN114598472A (en) | Conditional-hidden searchable agent re-encryption method based on block chain and storage medium | |
Yang et al. | New publicly verifiable cloud data deletion scheme with efficient tracking | |
Tsou et al. | SER: Secure and efficient retrieval for anonymous range query in wireless sensor networks | |
Alamer | A secure anonymous tracing fog-assisted method for the Internet of Robotic Things | |
Halder et al. | Enabling secure time-series data sharing via homomorphic encryption in cloud-assisted IIoT | |
Zhang et al. | Ldvas: Lattice-based designated verifier auditing scheme for electronic medical data in cloud-assisted wbans | |
Qu et al. | QB-IMD: A secure medical data processing system with privacy protection based on quantum blockchain for IoMT | |
Zhang et al. | Post-quantum blockchain over lattice | |
Zhang et al. | Privacy-preserving multikey computing framework for encrypted data in the cloud | |
Tseng et al. | Quantum secret sharing based on quantum search algorithm | |
Xie et al. | Access-oblivious and privacy-preserving k nearest neighbors classification in dual clouds | |
Liu et al. | Lattice-based proxy-oriented public auditing scheme for electronic health record in cloud-assisted wbans | |
Cao et al. | A lightweight fine-grained search scheme over encrypted data in cloud-assisted wireless body area networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |