CN105391548B - The quantum method for evaluating trust trusted based on node - Google Patents

The quantum method for evaluating trust trusted based on node Download PDF

Info

Publication number
CN105391548B
CN105391548B CN201510836918.4A CN201510836918A CN105391548B CN 105391548 B CN105391548 B CN 105391548B CN 201510836918 A CN201510836918 A CN 201510836918A CN 105391548 B CN105391548 B CN 105391548B
Authority
CN
China
Prior art keywords
quantum
trust
ttp
node
factor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510836918.4A
Other languages
Chinese (zh)
Other versions
CN105391548A (en
Inventor
张仕斌
谢智海
昌燕
盛志伟
王海春
闫丽丽
黄源源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu University of Information Technology
Original Assignee
Chengdu University of Information Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu University of Information Technology filed Critical Chengdu University of Information Technology
Priority to CN201510836918.4A priority Critical patent/CN105391548B/en
Publication of CN105391548A publication Critical patent/CN105391548A/en
Application granted granted Critical
Publication of CN105391548B publication Critical patent/CN105391548B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0855Quantum cryptography involving additional nodes, e.g. quantum relays, repeaters, intermediate nodes or remote nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/70Photonic quantum communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/80Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups H04B10/03 - H04B10/70, e.g. optical power feeding or optical transmission through water
    • H04B10/85Protection from unauthorised access, e.g. eavesdrop protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Electromagnetism (AREA)
  • Computer Security & Cryptography (AREA)
  • Optics & Photonics (AREA)
  • Theoretical Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses the quantum method for evaluating trust trusted based on node, the method of modeling and quantum trust evaluation including quantum trust model, compared with prior art, the present invention is using the credible Quantum repeater network based on trusted node as research object, trust management is incorporated into quantum communication network, safe and reliable quantum communication network is built based on the trust value of evaluation node, and the whether believable foundation of each user in judge quantum communication network is used as using trust value;By means of monopolizing characteristics such as entangled quantum effect and quantum teleportations, the quantum method for evaluating trust trusted based on node is studied and proposed, the thinking and process of quantum trust evaluation are described in detail;Feasibility, reasonability and the security of the ultimate analysis quantum method for evaluating trust proposed by the present invention trusted based on node, this provides a kind of valuable new approaches and new method to establish safe and reliable quantum communication network.

Description

Quantum trust evaluation method based on node trust
Technical Field
The invention relates to a quantum trust evaluation method, in particular to a quantum trust evaluation method based on node trust.
Background
Quantum communication refers to a novel communication mode for information transmission by utilizing quantum coherent superposition, quantum entanglement effect and quantum invisible transmission state, and the existing quantum communication security protocols and technologies are implicitly related to trust, or a certain trust premise is presupposed, or the purpose is to create or obtain a certain trust relationship. Therefore, similar to classical networks, research into trust in quantum communication networks mainly discusses two interrelated trust relationships: (1) Objective trust (trust of guest nodes) is evidence-based trust and thus can be accurately described, inferred, and verified; (2) Subjective trust (trust of a subject node, which is an individual or a group consisting of a person or a mixture of a person and an object node) is a subjective belief as a cognitive phenomenon, and is subjective judgment of a specific characteristic or a specific level of behavior of the subject node, and the subjective judgment is independent of monitoring of the characteristic and the behavior of the subject. Subjective trust is an important premise and basis for objective trust, which is inherently belief-based, with large uncertainties (manifested as randomness, diversity, and ambiguity) that cannot be accurately described and verified. The main difficulty in formalizing research on subjective trust is also how to model this uncertainty.
Disclosure of Invention
The invention aims to provide a quantum trust evaluation method based on node trust in order to solve the problems.
The invention realizes the purpose through the following technical scheme:
the invention includes methods of modeling and quantum trust evaluation of quantum trust models,
modeling of a quantum trust model:
in quantum communication, a quantum state can be expressed as | ψ > = α |0>+β|1&In which alpha is 22 =1; meanwhile, uncertainty factors such as randomness, diversity, fuzziness and the like of trust in the quantum communication network are also considered, so that the membership degree of each node under a certain factor is described by means of the membership degree and non-membership degree theory of an intuitive fuzzy set;
definition 1: let U be a non-empty set, U i For an element in U, an intuitive fuzzy set on U is defined as:
A={<u iA (u i ),υ A (u i )>|u i ∈U}
definition 2: suppose the ith node u in a quantum communication network i Quantum state for j-th factor for evaluating confidence valueRepresenting; however, since each trust factor has different importance in practical application, a weighting factor t is added to each trust factor j (ii) a Thus, evaluating the trust value of the ith user may be expressed as:
cos according to definition 1 and in equation (1) 2 θ j Is u i Membership to jth Trust factor, sin 2 θ j Is u i Degree of non-membership to the jth factor, cos 2 θ j +sin 2 θ j =1;t j (j =1,2.. M) is a weight coefficient of each trust factor, and satisfies
Evaluating each node u in quantum communication network i All factors of the trust value are described by using the membership and the non-membership of a fuzzy intuition set theory, the modeling of the subjective trust of all nodes is completed, and the model is called as a quantum trust model;
the method for quantum trust evaluation comprises the following steps:
step 1: initialization phase
Suppose a priori u i Its information about trust has been stored at the TTP by means of registration, expressed in quantum states as:
in the formula (2), the weight coefficient t of each trust factor j Satisfy the requirement ofθ j Corresponding to the jth trust factor; gamma ray i Description of the synthetic Trust, cos, for the ith node 2 γ i Is u i Membership to j Trust factors, sin 2 γ i Is u i Degree of non-membership to j trust factors, cos 2 γ i +sin 2 γ i =1, where i =1,2, ·, n;
suppose TTP and each user u i Between which a pair of qubits in an entangled state is sharedWherein particles T are attributed to TTP and particles A are attributed to u i All, for the sake of example, u is set 3 Want to and u 1 Communication;
step 2: u. of 3 Sending hope and u to TTP through classical channel 1 A request for communication;
and step 3: the TTP receives the request and acknowledges that u 3 Then, and inform u 1 ,u 3 Want to communicate with him;
and 4, step 4: realizing the transfer of a trust value by means of quantum invisible transfer;
TTP to u 1 Trust value information pre-stored therein, prepared from TTP as u 1 Quantum state of trust valueSending to u through quantum channel 3 The specific process is as follows:
(1) TTP vs. quantum statesPerforming Bell-based combined measurement on the particles and the particles T to obtain a measurement result;
the method comprises the following steps: TTP quantum state prepared from itQuantum states in entangled state shared with themParticle T and particle A ofOperating to obtain a three-particle systemThe quantum state is:
in formula (3)Is the tensor product, | phi + > TA 、|φ - > TA 、|ψ + > TA And | ψ - > TA The four Bell states are respectively as follows:
(2) TTP sends the measurement result to u 3
③u 3 According to the received classical information, u is recovered by only carrying out corresponding operation on the particle A owned by the user 1 Original quantum state of trust value
Setting nodes to have agreed with TTP in advance: classical information 00, 01, 10 and 11 represent the measurement result | φ of TTP respectively + > TA 、|φ - > TA 、|ψ + > TA And | ψ - > TA . When u is 3 When the information 00, 01, 10 and 11 sent by the TTP is received, corresponding unitary operation is carried out, and u can be obtained 1 Quantum state of trust value
And 5: u. u 3 According to recoveredCalculate u 1 And judging whether to trust u according to the calculated trust value 1
The invention has the beneficial effects that:
the invention is a quantum trust evaluation method based on node trust, compared with the prior art, the invention takes a trusted quantum relay network based on trust nodes as a research object, introduces trust management into a quantum communication network, constructs a safe and trusted quantum communication network by taking the trust value of an evaluation node as a basis, and takes the trust value as a basis for judging whether each user in the quantum communication network is trusted; by means of the unique characteristics of quantum entanglement effect, quantum invisible transport state and the like, a quantum trust evaluation method based on node trust is researched and provided, and the thought and process of quantum trust evaluation are explained in detail; finally, the feasibility, the rationality and the safety of the quantum trust evaluation method based on the node trust are analyzed, and a valuable new thought and a new method are provided for establishing a safe and credible quantum communication network.
Drawings
FIG. 1 is a diagram of a quantum communication network architecture with a trusted third party TTP;
fig. 2 is a quantum trust evaluation flow diagram with a trusted third party TTP.
Detailed Description
The invention will be further described with reference to the accompanying drawings in which:
the idea of the quantum trust evaluation method based on node trust is as follows:
through analysis, it is found that in a trusted relay network based on trusted nodes, trust evaluation between nodes can be evaluated by means of a trusted third party TTP (trusted third party). If there are n nodes (users) u in the quantum communication network 1 ,u 2 ,...,u n When each node joins the quantum communication network, the node firstly needs to register in the TTP (such as submitting attributes of historical credibility, identity information and the like); when registering, describing the uncertainty of each node attribute by means of the membership degree and non-membership degree theory of an intuitionistic fuzzy set, and completing the quantitative description of subjective trust (namely the mathematical modeling of the subjective trust); before the safe communication is carried out among all nodes, information related to trust of a certain node is obtained by means of quantum entanglement state, quantum invisible transmission state and the like; and then, calculating the trust value of a certain node according to the trust value information of the acquired node, and evaluating whether the other side is trusted according to the calculated trust value.
Specific ideas of quantum trust evaluation based on node trust (as shown in fig. 1): suppose node u 3 Homing node u 1 Communication, however u 3 Is not aware of u 1 Whether or not to be trusted, in order to prevent u 1 Fraud u 3 ,u 3 Obtaining the relevant evaluation u from TTP 1 Information about trust, u 3 Calculating u by means of information provided by TTP 1 And evaluating u based on the trust value 1 Whether it is authentic. Note: in view of the clarity of the network structure diagram in FIG. 1, the TTP only marks u 1 、u 3 、u 3
As shown in fig. 2, the present invention includes a method of modeling and quantum trust evaluation of a quantum trust model,
modeling of a quantum trust model:
in quantum communication, a quantum state can be expressed as | ψ > = α |0>+β|1&In which alpha is 22 =1; meanwhile, the randomness and diversity of trust in the quantum communication network are consideredUncertainty factors such as sex and ambiguity, and the like, so the membership degree of each node which is subordinate to a certain factor is described by means of the membership degree and non-membership degree theory of the intuitive fuzzy set;
definition 1: let U be a non-empty set, U i (i =1,2.., n) is an element in U, and one intuitive blur set on U is defined as:
A={<u iA (u i ),υ A (u i )>|u i ∈U}
wherein, mu A :U→[0,1],υ A :U→[0,1],
For the0≤μ A (u i )+υ A (u i )≤1。
μ A (u i ) Represents u i Degree of membership, υ, to set A A (u i ) Represents u i Non-membership to set a.
Definition 2: as shown in FIG. 1, assume the ith node u in a quantum communication network i (i =1,2.. Once, n), the j (j =1,2.. Once, m) th factor whose confidence value is evaluated is quantum stateRepresents; however, since each trust factor has different importance in practical application, a weighting factor t is added to each trust factor j (j =1,2, ·, m); thus, evaluating the trust value of the ith user may be expressed as:
according to definitions 1 andcos in formula (1) 2 θ j Is u i Membership to the jth Trust factor, sin 2 θ j Is u i Degree of non-membership to jth factor, cos 2 θ j +sin 2 θ j =1;t j (j =1,2.. M) is a weight coefficient of each trust factor, and satisfies
Evaluating each node u in quantum communication network i (i =1,2., n) each factor of the trust value is described by the membership degree and the non-membership degree of the fuzzy intuition set theory, the actual condition of subjective trust (uncertainty of subjective trust) is objectively reflected, and the modeling of the subjective trust of each node is completed.
The method for quantum trust evaluation comprises the following steps:
step 1: initialization phase
Suppose a priori u i (i =1,2.., n) has its information about trust stored there by means of registration, expressed as quantum states (prepared by TTP before transmission) as:
in the formula (2), the weight coefficient t of each trust factor j Satisfy the requirement ofθ j Corresponding to the jth trust factor; gamma ray i Description of the synthetic Trust, cos, for the ith node 2 γ i Is u i Membership to j Trust factors, sin 2 γ i Is u i Degree of non-membership, cos, to j trust factors 2 γ i +sin 2 γ i =1, where i =1,2.
Suppose TTP and each user u i (i =1,2.., n) share a pair in an entangled state between themQuantum bitsWherein particles T (1 st qubit) are attributed to TTP and particles A (2 nd qubit) are attributed to u i (i =1,2,.., n). For convenience of example, we assume u 3 Want to and u 1 Communication (indicated by bold lines in fig. 1).
And 2, step: u. of 3 Sending hope and u to TTP through classical channel 1 A request for communication.
And step 3: TTP receives the request and acknowledges that u 3 Then, and inform u 1 ,u 3 Wants to communicate with him.
And 4, step 4: and the transfer of the trust value is realized by means of quantum invisible transfer.
TTP will be u 1 Trust value information pre-stored therein, prepared from TTP as u 1 Quantum state of trust value(i.e., quantum states whose states are to be hidden) are sent to u via a quantum channel 3 The specific process is as follows:
(1) TTP vs. quantum statesAnd (4) performing Bell-based joint measurement on the particles T to obtain a measurement result (classical information).
The method comprises the following steps: TTP quantum state prepared from itQuantum states in entangled state shared with themParticle T and particle A ofOperating to obtain a three-particle systemThe quantum state is:
in the formula (3)Is the tensor product, | phi + > TA 、|φ - > TA 、|ψ + > TA And | ψ - > TA Is in four Bell states, which are respectively:
(2) TTP sends the measurement result (classical information) to u 3
③u 3 According to the received classical information, only corresponding operation is needed to be carried out on the particle A owned by the user (as shown in the table 1), and the u is recovered 1 Original quantum state of trust value
Assume that a node has agreed with the TTP in advance: classical information 00, 01, 10 and 11 represent the measurement result | φ of TTP respectively + > TA 、|φ - > TA 、|ψ + > TA And | ψ - > TA . When u is 3 When classical information 00, 01, 10 and 11 sent by TTP is received, corresponding unitary operation is carried out to obtain u 1 Quantum state of trust value
TABLE 1 unitary operations corresponding to classical information 00, 01, 10, and 11
For example: as can be seen from Table 1, if TTP is previously compared with u 3 After appointment, do it when receiving 01Transform and recover u 1 Original quantum state ofThe specific transformations are:
and 5: u. of 3 According to recoveredCalculate u 1 And judging whether to trust u according to the calculated trust value 1
Feasibility analysis:
the quantum communication in a long distance is realized through quantum invisible state transfer and quantum entanglement distribution, and especially unknown quantum state transmission is an essential link for long distance quantum communication and a distributed quantum network. At present, quantum invisible state transfer and quantum entanglement distribution have been achieved in medium-distance optical fibers. The quantum trust evaluation method provided by the invention uses the characteristics of quantum invisible state transfer, quantum entanglement and the like, and is feasible in the application of future quantum communication networks. Specifically, it is expressed in the following two aspects:
(1) In the aspect of quantum invisible states, when representing u 1 The trust information is converted into TTP to be transmitted to u 3 In the original quantum state of (1), u is prepared from TTP 1 Quantum state of trust valueSent to u through quantum channel 3 (ii) a TTP then uses the quantum state with each user u i (i =1,2.., n) shared qubits in an entangled stateTo carry outOperation ofConversion to a Bell state (or | 0)&gt, state sum |1&gt, one of the states). This is explained whenWhen the quantum state is transferred to the particle A, u is described 3 Unknown quantum state that has received TTP transmitted over quantum channelTherefore, the invisible propagation state and the quantum unclonable theorem are not contradictory, and meanwhile, the method for realizing the transmission and the calculation of the trust value by means of the quantum invisible propagation state is feasible and is reasonable in future practical application.
(2) In terms of quantum entanglement, regardless of how far apart two parties sharing an entangled state are, as long as one party (TTP in the present invention) measures two particles in one's hand, the other party (u in the present invention) 3 ) The particles in the hand will phaseAnd (4) collapsing. In the present invention, u 3 According to the measurement result sent by TTP in classical channel, unknown quantum state sent by TTP through quantum channelBy doing the corresponding operation (as shown in Table 1), the corresponding TTP according to u is obtained 1 Original quantum state of trust information preparationTherefore, the invention is feasible to realize the transfer and calculation of the trust value by means of quantum entanglement and is reasonable in future practical application.
And (3) safety analysis:
the security of the quantum trust evaluation proposed by the present invention is analyzed, mainly from the prevention of fraud (communication parties (such as u of the present invention) 1 ) The other party spoofing the communication (e.g. u of the invention) 1 ) For example) and for preventing eavesdropping.
(1) Can prevent deception
In terms of preventing deception, u is a factor 3 Want to and u 1 Communication, u 3 Sending hope and u to TTP through classical channel 1 Request for communication, TTP receiving request and informing u 1 U prepared by the user after communicating with the user 1 Quantum state of trust valueDelivery to u via quantum channel 3 While the measurement result (classical information) is sent to u via the classical channel 3 ,u 3 Recovery from received measurementsAnd calculate u 1 The trust value of (c). Since TTP is u 1 And u 3 Trusted third parties that the TTP has told u before communication 1 ,u 3 Want to communicate with him; u. of 3 Is transferred by quantum invisible state according to TTP 1 Trust information, and accountingCalculate u 1 Is truly reliable, so u 1 And u 3 Both parties do not have the fraudulent problem.
(2) Anti-eavesdropping
Before analysis, firstly, an eavesdropper Eve (Eve can be an eavesdropper in the system (as shown in fig. 1) or outside the system) is assumed to exist in the communication process, and the eavesdropper wants to acquire TTP through eavesdropping and send the TTP to a user u 3 Original quantum state of
(1) If Eve is a peripheral eavesdropper
In the present invention, TTP and u 3 Sharing a pair of qubits in an entangled stateTTP has a particle T (1 st qubit), u 3 Possesses particle a (2 nd qubit) and attacker Eve does not have any qubit information in the qubits in the entangled state. If Eve intercepts TTP and sends the TTP to the user u through the classical channel 3 That is, eve obtained TTP measurements, but Eve does not have qubit information in the quantum entangled state, so even if he obtains classical information, he cannot recover the original quantum state by some operation (and Eve does not know what operation should be done)It is clear that in this case Eve cannot get any information available about unknown quantum states, so the trust model proposed by the present invention can prevent eavesdropping by a peripheral eavesdropper Eve.
(2) If Eve is a system internal eavesdropper
In the present invention, although TTP, u 3 Sharing a pair of qubits | φ in an entangled state with Eve + > TA If Eve intercepts the transmission to u 3 But Eve does not know what operation should be done, nor is he likely to recoverOut of the original quantum stateTherefore, the trust model provided by the invention can prevent the interception of an eavesdropper Eve in the system.
Furthermore, in the trust evaluation method of the present invention, u 1 Quantum state of trust value informationIs by TTP according to u 1 Is prepared and then sent to u through a quantum channel 3 It has certain authority. According to the principle of quantum inaccuracy in quantum mechanics and quantum unclonable theorem (quantum signals transmitted in quantum channels are inaccurate to be measured by any receiver), if an attacker (other users and peripheral users in the Baoton quantum network system) wishes to determine by measurementThen it results inIs not present after being measured. From this point of view, u is theoretically 3 Obtained by(provided by TTP, representing u 1 Quantum states of trust value information) May be absolutely safe.
The foregoing shows and describes the general principles and features of the present invention, together with the advantages thereof. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which fall within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (1)

1. A quantum trust evaluation method based on node trust is characterized in that: methods including modeling of quantum trust models and quantum trust evaluation,
modeling of a quantum trust model:
in quantum communication, a quantum state can be represented as | ψ > = α |0 > + β |1 >, where α > 22 =1; meanwhile, uncertainty factors of randomness, diversity and fuzziness are trusted in a quantum communication network, so that the membership degree of each node under a certain factor is described by means of the membership degree and non-membership degree theory of an intuitive fuzzy set;
definition 1: let U be a non-empty set, U i For an element in U, an intuitive fuzzy set on U is defined as:
A={<u iA (u i ),υ A (u i )>|u i ∈U}
definition 2: suppose the ith node u in a quantum communication network i Quantum state for j-th factor for evaluating confidence valueRepresents; however, since each trust factor has different importance in practical application, a weighting factor t is added to each trust factor j (ii) a Thus, evaluating the trust value of the ith user may be expressed as:
cos according to definition 1 and in equation (1) 2 θ j Is u i Membership to jth Trust factor, sin 2 θ j Is u i Degree of non-membership to jth factor, cos 2 θ j +sin 2 θ j =1;t j (j =1,2.. M) is a weight coefficient of each trust factor, and satisfies
Evaluating each node u in quantum communication network i All factors of the trust value are described by using the membership and the non-membership of a fuzzy intuition set theory, the modeling of the subjective trust of all nodes is completed, and the model is called as a quantum trust model;
the method for quantum trust evaluation comprises the following steps:
step 1: initialization phase
Suppose a priori u i Its information about trust has been stored at the TTP by means of registration, expressed in quantum states as:
in the formula (2), the weight coefficient t of each trust factor j Satisfy the requirements ofθ j Corresponding to the jth trust factor; gamma ray i Description of the synthetic Trust, cos, for the ith node 2 γ i Is u i Membership to j Trust factors, sin 2 γ i Is u i Degree of non-membership to j trust factors, cos 2 γ i +sin 2 γ i =1, where i =1,2, ·, n;
suppose TTP and each user u i Between which a pair of qubits in an entangled state is sharedWherein particles T are attributed to TTP and particles A are attributed to u i All, for the sake of example, u is set 3 Want to and u 1 Communication;
step 2: u. of 3 Transmitting wishes to TTP over classical channelAnd u 1 A request for communication;
and step 3: the TTP receives the request and acknowledges that u 3 Then, and inform u 1 ,u 3 Want to communicate with him;
and 4, step 4: realizing the transfer of a trust value by means of quantum invisible transfer;
TTP to u 1 Trust value information pre-stored therein, prepared from TTP as u 1 Quantum state of trust valueSent to u through quantum channel 3 The specific process is as follows:
(1) TTP vs. quantum statesPerforming Bell-based combined measurement on the particles and the particles T to obtain a measurement result;
the specific method comprises the following steps: TTP quantum state prepared from itQuantum states in entangled state shared with themParticle T and particle A ofCalculating to obtain a three-particle systemThe quantum state is:
in the formula (3)Is the tensor product, | phi +TA 、|φ -TA 、|ψ +TA And | ψ - > TA The four Bell states are respectively as follows:
(2) TTP sends the measurement result to u 3
③u 3 According to the received classical information, u is recovered by only carrying out corresponding operation on the particle A owned by the user 1 Original quantum state of trust value
Setting nodes to have agreed with TTP in advance: classical information 00, 01, 10 and 11 represent the measurement results | φ of TTP, respectively + > TA 、|φ - > TA 、|ψ +TA And | ψ -TA (ii) a When u is 3 When the information 00, 01, 10 and 11 sent by the TTP is received, corresponding unitary operation is carried out, and u can be obtained 1 Quantum state of trust value
And 5: u. of 3 According to recoveredCalculate u 1 And judging whether to trust u according to the calculated trust value 1
CN201510836918.4A 2015-11-26 2015-11-26 The quantum method for evaluating trust trusted based on node Active CN105391548B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510836918.4A CN105391548B (en) 2015-11-26 2015-11-26 The quantum method for evaluating trust trusted based on node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510836918.4A CN105391548B (en) 2015-11-26 2015-11-26 The quantum method for evaluating trust trusted based on node

Publications (2)

Publication Number Publication Date
CN105391548A CN105391548A (en) 2016-03-09
CN105391548B true CN105391548B (en) 2018-04-20

Family

ID=55423403

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510836918.4A Active CN105391548B (en) 2015-11-26 2015-11-26 The quantum method for evaluating trust trusted based on node

Country Status (1)

Country Link
CN (1) CN105391548B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789083B (en) * 2017-01-12 2019-12-17 成都信息工程大学 Annular quantum trust evaluation model based on trusted third party
CN109257166B (en) * 2018-08-31 2020-04-07 西安电子科技大学 Quantum error correction coding method for quantum repeater
CN109274420B (en) * 2018-11-16 2020-05-05 西安电子科技大学 Method for estimating transmission rate of entangled photon pair for satellite-ground downlink
CN110943833B (en) * 2019-12-05 2021-03-05 成都信息工程大学 Quantum trust model construction method and computer readable storage medium
CN110912695B (en) * 2019-12-05 2020-08-04 成都信息工程大学 Quantum arbitration signature method and system based on six-particle invisible transmission state

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101835158A (en) * 2010-04-12 2010-09-15 北京航空航天大学 Sensor network trust evaluation method based on node behaviors and D-S evidence theory
CN102244587A (en) * 2011-07-15 2011-11-16 杭州信雅达数码科技有限公司 Method for trust evaluation of nodes in network
CN102324982A (en) * 2011-07-21 2012-01-18 中国科学院上海技术物理研究所 Single photon far field distribution detection device for spatial quantum communication
CN202150859U (en) * 2011-08-17 2012-02-22 上海朗研光电科技有限公司 Remote quantum secret communication system
CN104601248A (en) * 2014-12-23 2015-05-06 上海电机学院 Multi-party combined remote quantum state preparation method based on single atom operations

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9838141B2 (en) * 2012-09-14 2017-12-05 The United States Of America, As Represented By The Secretary Of The Navy Adaptive quantum information processing
US9584319B2 (en) * 2012-11-01 2017-02-28 Nec Corporation Optical receiving device in optical communication system, control method and device of photon detector, and dark count evaluation method of photon detector

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101835158A (en) * 2010-04-12 2010-09-15 北京航空航天大学 Sensor network trust evaluation method based on node behaviors and D-S evidence theory
CN102244587A (en) * 2011-07-15 2011-11-16 杭州信雅达数码科技有限公司 Method for trust evaluation of nodes in network
CN102324982A (en) * 2011-07-21 2012-01-18 中国科学院上海技术物理研究所 Single photon far field distribution detection device for spatial quantum communication
CN202150859U (en) * 2011-08-17 2012-02-22 上海朗研光电科技有限公司 Remote quantum secret communication system
CN104601248A (en) * 2014-12-23 2015-05-06 上海电机学院 Multi-party combined remote quantum state preparation method based on single atom operations

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
Cryptanalysis of quantum;F Gao,SJ Qin,FZ Guo,QY Wen;《Chinese Physics Letters》;20110228;第28卷(第2期);全文 *
Experimental demonstration of graph-state quantum secret sharing;BA Bell,D Markham,DA Herreramartí,A Marin,WJ Wadsworth;《Nature Communications》;20141121;全文 *
Quantum Secure Direct Communication with Authentication Expansion Using Single;杨静,王川,张茹;《Chinese Science Bulletin》;20101115;第58卷(第36期);全文 *
基于三粒子W态蜜罐的受控量子安全直接通信协议;昌燕,张仕斌,闫丽丽,盛志伟;《电子科技大学学报》;20150131;第44卷(第1期);全文 *
基于云模型和信任链的信任评价模型研究;陈建钧,张仕斌;《计算机应用研究》;20150131;第32卷(第1期);全文 *
基于云模型的信任评估方法研究;张仕斌,许春香;《计算机学报》;20130228;第36卷(第2期);全文 *
基于网络的量子身份认证方案;龚晶,何敏,邓元庆,刘斌;《量子光学学报》;20091230;第15卷(第4期);全文 *
量子安全直接通信;龙桂鲁,王川,李岩松,邓富国;《中国科学:物理学 力学 天文学》;20110430;第41卷(第4期);全文 *

Also Published As

Publication number Publication date
CN105391548A (en) 2016-03-09

Similar Documents

Publication Publication Date Title
CN105391548B (en) The quantum method for evaluating trust trusted based on node
Kong et al. Privacy-preserving aggregation for federated learning-based navigation in vehicular fog
Li et al. Arbitrated quantum signature scheme using Bell states
Zhao et al. Preserving privacy in WiFi localization with plausible dummy locations
CN108964926A (en) User trust negotiation establishing method based on two-layer block chain in heterogeneous alliance system
CN110071814B (en) Quantum blind signature method and system based on Bell state entanglement exchange
WO2020177484A1 (en) Localized difference privacy urban sanitation data report and privacy calculation method
CN114363043B (en) Asynchronous federal learning method based on verifiable aggregation and differential privacy in peer-to-peer network
CN110166251B (en) Semi-quantum group signature method and system based on quantum walking
Hernández-Ramos et al. Protecting personal data in IoT platform scenarios through encryption-based selective disclosure
CN108959873B (en) Authentication method for remote medical system
CN108833353A (en) The quantum Byzantium Agreement Methods participated in based on tripartite
Din et al. ShareTrust: Centralized trust management mechanism for trustworthy resource sharing in industrial Internet of Things
CN112787809A (en) Efficient crowd sensing data stream privacy protection truth value discovery method
CN101242410B (en) Grid subjective trust processing method based on simple object access protocol
Li et al. Blind quantum signature with controlled four-particle cluster states
Ji et al. Survey of secure communications of internet of things with artificial intelligence
Zhang et al. Study on quantum trust model based on node trust evaluation
Saia Internet of entities (IoE): a blockchain-based distributed paradigm to security
Errapotu et al. Bid privacy preservation in matching-based multiradio multichannel spectrum trading
CN206341226U (en) A kind of quantum key distribution device
CN106789083B (en) Annular quantum trust evaluation model based on trusted third party
Li et al. PPBFL: A Privacy Protected Blockchain-based Federated Learning Model
Sharma et al. FoG computing based IoT in healthcare application
Haque et al. SSI− FL: Self-sovereign identity based privacy-preserving federated learning

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant