CN107493295B - A kind of different account number safety login method based on blind quantum calculation - Google Patents

A kind of different account number safety login method based on blind quantum calculation Download PDF

Info

Publication number
CN107493295B
CN107493295B CN201710793910.3A CN201710793910A CN107493295B CN 107493295 B CN107493295 B CN 107493295B CN 201710793910 A CN201710793910 A CN 201710793910A CN 107493295 B CN107493295 B CN 107493295B
Authority
CN
China
Prior art keywords
server
client
quantum
account information
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710793910.3A
Other languages
Chinese (zh)
Other versions
CN107493295A (en
Inventor
石金晶
陈慧
周芳
邓家明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN201710793910.3A priority Critical patent/CN107493295B/en
Publication of CN107493295A publication Critical patent/CN107493295A/en
Application granted granted Critical
Publication of CN107493295B publication Critical patent/CN107493295B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • General Business, Economics & Management (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of different account number safety login method based on blind quantum calculation, comprising: step 1: client sends account and password and carries out login authentication to first server;Step 2: after logining successfully, client issues access request to first server on the login interface of second server, and application uses account information of the client in first server;Step 3: the account information that first server sends client gives quantum server;Step 4: quantum server carries out blind quantum calculation to account information according to the blind quantum calculation agreement of single server classics client and handles the account information after being blinded, and is transmitted to second server;Step 5: second server is logged in after receiving the application access information that first server is sent using the account information after blinding, open applications are serviced to client after logging in successfully, the method through the invention, it realizes that account is shared and the secrecy of account information, improves the security level of account information.

Description

Different account number secure login method based on blind quantum computation
Technical Field
The invention relates to the technical field of quantum communication, in particular to a different account secure login method based on blind quantum computing.
Background
The society gets into the information-based era, and the internet develops day by day, and various application APP and website are more and more on the market, and if the APP of every different application or when the website all need apply for different account numbers, this can cause the trouble to a certain extent to the user, and too much account number password information is also difficult to remember moreover. The main difficulty of the problem is how to achieve account sharing while ensuring the confidentiality of user information.
Blind Quantum computing (Blind Quantum computing) refers to a Quantum computing model in which a client submits a Quantum task to a remote Quantum server for execution without sufficient Quantum capacity or Quantum computing capacity, but does not reveal its own input, output and algorithm. Blind quantum computing is in fact a combination of quantum cryptography concepts and quantum data processing. As is well known, classical cryptography is often based on a certain mathematical problem and can only achieve computational security. Theoretical studies show that unconditional security can be achieved by blind computing users. Due to limited quantum resources, in the future, only a few mechanisms may own a quantum computer for a long time, the quantum capability of a common user is very limited, and how to enable the common user to safely realize quantum computation is a problem which is faced for a long time. The appearance of blind quantum computing aims to solve the problem, users without quantum capacity or limited quantum capacity can realize quantum computing by means of a remote quantum computer, and meanwhile, the input and output data and algorithm safety of the users can be guaranteed. Therefore, blind quantum computing protocols are likely to be the first generation quantum computing model. Currently, blind quantum computing has moved from theoretical research to practical applications. According to different implementation modes, there are mainly a line-based mode and a quantum measurement mode, and measurement-based quantum computation is also called unidirectional quantum computation, and the two modes have the same computation capability. The blind quantum computing is implemented in a mode similar to cloud computing, so that an ordinary user is generally called a client, and a quantum computer is called a server.
At present, although a plurality of advanced quantum computing technologies and theories exist, practical application schemes of the quantum computing technologies are subject to variable numbers, and in order to solve the problem of trouble caused to users by a plurality of APP different accounts, account information confidentiality is guaranteed and account sharing is achieved on the basis of blind quantum computing.
Disclosure of Invention
In order to solve the problem of confusion caused by different APP accounts to users, it is actually necessary to provide a method for secure login of different accounts based on blind quantum computing, so that account sharing is realized and the security of user account information is also guaranteed.
The invention provides a different account number secure login method based on blind quantum computing, which comprises the following steps:
step 1: the client sends an account and a password to the first server for login verification;
step 2: after the login is successful, the client sends an access request to the first server on a login interface of a second server, and applies for using the account information of the client on the first server;
the account information at least comprises an account number and a password of the client on the first server;
and step 3: the first server sends the account information of the client to a quantum server through a trusted center;
and 4, step 4: the quantum server performs blind quantum computing processing on the account information according to a single-server classical client blind quantum computing protocol to obtain blinded account information, and forwards the account information to the second server through the trusted center;
and 5: and the second server uses the blinded account information to log in after receiving the access application information sent by the first server, and opens the application service to the client after successful log-in.
The account information after the blinding is subjected to quantum coding processing, the quantum coding processing is represented in a quantum form, but the quantum coding processing still belongs to account information, and the quantum coding processing can be directly used on a second server, the second server cannot acquire the specific content of the account information on a first server, and the second server provides application service according to the account number which is logged in by a client.
The client registers an account number on the first server and applies for accessing the second server by adopting the account number information of the first server so that the second server can open application service for the client, and the account number of the client on the first server is shared on the second server; the quantum server has quantum capacity and is responsible for carrying out blind quantum computing processing on account information of the client on the first server.
Preferably, the login verification in step 1 is performed as follows:
firstly, the client receives a quantum bit A sent by a trusted centerw、AuAnd from the received qubit Aw、AuIn the first service, a part of the qubits is selected and sent to the first serviceA first server for setting the received qubits into two groups of qubits in a reception order
Wherein the first group of qubitsA second set of qubits for the client's account numberIs the password of the client, s is more than or equal to 1i≤n,1≤tiN, i belongs to {1,2, ·, m }; n and m are positive integers, and m represents the number of each group of qubits;
the trust center prepares 2n Bell states and divides them into two groups of Bell states, wherein the first group of Bell states is | ψ0,0(B1w,Aw)>W 1,2, n, a second set of bell states | ψ0,0(B2u,Au)>N, n represents the number of bell states in each group of bell states;
wherein, B1wA first qubit representing a w-th Bell state of the first set of Bell states, AwA second qubit representing the w-th Bell state of the first set of Bell states, B2uA first qubit representing the u-th Bell state of the second set of Bell states, AuA second qubit representing a u-th bayer state of the second set of bayer states;
trusted center converts qubit B1wSending the quantum bit A to a second serverwAnd AuSending the quantum bit B2 to the clientuSending the data to a quantum server, wherein n is (2+ delta) m, and delta is a fixed parameter more than 0;
finally, the first server pairs all of the two groups of qubitsAndsequentially executing Bell state measurement to obtain m groups of measurement resultsAnd measuring the m groups of measurement resultsSending the data to the client;
if allMeasured result of (2)If the number of the client is (0,0), the account number and the password of the client are verified.
When the client sends the quantum bit to the first server, the quantum bit corresponding to the account is sent first, then the quantum bit corresponding to the password is sent, and part of the qubits selected by the client and sent to the first server are selected according to a preset rule, the preset rule is set according to the account registration of the client, the purpose is that a group of qubits corresponding to the account selected and sent by the client during the account login is the same as a group of qubits corresponding to the same account randomly set during the registration, a group of qubits corresponding to the password selected and sent by the client is the same as a group of qubits corresponding to the same password randomly set during the registration, and in addition, the qubits selected by the client from the qubits sent by the credible center during different accounts and passwords are different, and when the account number and the password are not matched, the two groups of quantum bits are subjected to Bell state measurement to obtain a measurement result.If the condition does not satisfy (0,0), the account number is checked inThe authentication fails, so that the client can effectively perform account login authentication based on Bell state measurement; the trusted center is a third party authority unrelated to network communication behaviors, is a trusted third party device, and establishes information links among the client, the second server and the quantum server through 2n Bell states prepared by the trusted center.
Preferably, the process of sending the access request in step 2 is as follows:
the client is based on entanglement swapping technology and depends on each measurement resultLearning qubitsIn the new combination stateAndandthe client will beAndsending the value of (a) to the first server;
wherein,andmeans for representing the client request to use the client on the first serverThe account number and the password are in the access request information of the account information.
The second server sends the quantum bit B1 distributed by the trusted centerwThe method can be used as the characteristic information of a login interface, and the client acquires the qubit according to the measurement resultIn the new combination stateTherefore, the access request for requesting the account information is sent to the first server on the login interface of the second server. In addition, when the account and the password of the client are verified on the first server, the access request can be sent to the first server on the login interface of the second server, and the first server can also send account information to the quantum server through the trusted center. If it is notIs (0,0), then the qubit can be usedIs shown asAndall have a value of 0.
Preferably, the process of blinding the account information by the quantum server in step 4 is as follows:
firstly, the quantum server acquires account information represented by classical information;
wherein the account information is
θkRandomly selecting from a set S, wherein S { (K pi)/4 | K { (K pi)/0, 1 ·,7 };
when k is equal to s1,s2,···,smZ in account informationk、xkObtained by the first server from the clientAnddetermination of the value of si∈{s1,s2,···,sm};
When k ∈ {1,2, ·, n } - { s ∈ {1,2, ·, n } - }1,s2,···,smAt this time, { z ] is randomly selectedk,xk}∈{0,1}2
Finally, the quantum server is used for obtaining account informationObtaining a measured base { + -. theta'kAt the measurement base { + -. theta'kMeasuring a quantum bit B2 sent by a credible center on the basis ofuObtaining a measurement result
Wherein the measurement resultAccount information that is blinded.
Has the advantages that:
the invention provides a blind quantum computation-based secure login method for different account numbers, which comprises the steps that after a client successfully logs in an account number on a first server, the client requests account information of the client on the first server on a login interface of a second server, the second server acquires the account information which is subjected to blind processing by a quantum server and the login account number which is applied for access by the first server, and further provides corresponding application service to the client, so that the account number on the first server is shared to the second server, the client does not need to register the account number again, meanwhile, the blind account information acquired by the second server is obtained by blind quantum computation, the specific content of the account information cannot be acquired, the confidentiality of the account information is further realized, the quantum advantages are fully utilized, and the quantum computation technology is applied to a brand-new practical application field, the practical application range of the quantum computing technology is expanded.
Drawings
Fig. 1 is a schematic flow chart of a different account secure login method based on blind quantum computing according to an embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the following specific examples.
The embodiment of the invention realizes account sharing and information confidentiality among different applications based on the theory of blind quanta.
In the invention, a client (Alice) registers an account number on a first Server (Server1), applies for accessing a second Server (Server2) by adopting account information of a Server1, and ensures that the account information of the Server1 is absolutely confidential to the Server 2.
The quantum server (Bob) has quantum capability and is responsible for performing blind quantum computing processing on the account information of Alice.
A Trusted Center (Trusted Center) is a third party authority that is not related to network communication behavior, and is a third party that must be Trusted.
The first Server (Server1) has Alice's account information, and when Alice requests access to the Server2, the Server1 is responsible for verifying Alice's account information and getting in touch with the Trusted Center.
The second Server (Server2) is used for the Server2 to feed back the result to the Server1 and open the application service to Alice when the trusted center sends Bob encrypted account information and the access request from the Server1 to the Server 2.
Based on the functions of the above 5 participants, as shown in fig. 1, the method for secure login of different accounts based on blind quantum computation in this embodiment includes the following steps:
step 11: the trusted center prepares 2n Bell states and sends the quantum bits to the client, the second server and the quantum server;
specifically, the 2n Bell states prepared by the trust center are respectively | psi0,0(B1w,Aw)>W 1,2, n and | ψ0,0(B2u,Au)>U is 1,2, n. First, n Bell states | ψ are prepared0,0(B1w,Aw)>W 1,2, n, as a first set of bell states, B1wA first qubit representing a w-th Bell state of the first set of Bell states, AwA second qubit representing the w-th of the first set of Bell states, and a qubit B1 thereinwTransmitted to a second server, qubit AwSending the data to a client; then, another n Bell states | ψ are prepared0,0(B2u,Au)>1,2, n, as a second set of bell states, B2uA first qubit representing the u-th Bell state of the second set of Bell states, AuA second qubit representing a u-th bayer state of the second set of bayer states; the quantum bit B2 in ituSending to quantum server, qubit AuAnd sending the data to the client. Where n is (2+ δ) m, δ > 0 is a fixed parameter, n is a positive integer, and n represents the number of bell states in each group of bell states.
Step 12: the client sends the account and the password to the first server for logging in.
The client performs account registration on a first server in advance, and the first server performs identity authentication on the client.
Specifically, the client receives a quantum bit A sent by the trusted centerw、AuAnd from the received qubit Aw、AuAnd selecting a part of the qubits to be sent to the first server.
When Alice receives any one qubit AwOr AuThe qubit is selected according to a preset rule for discarding or forwarding to the Server1, and the position of each qubit sent to the Server1 is recorded. The quantum bit sent to the first server by the client corresponds to the account and the password. The preset rule is set when the client registers the account, the client randomly sets a group of quantum bits corresponding to the account and a group of quantum bits corresponding to the password when the client registers the account, the value of the quantum bits is 1 or 0, and the preset rule is that when the client logs in the account on the first server, the group of quantum bits selected and sent by the client and corresponding to the account is the same as the group of quantum bits corresponding to the same account randomly set during registration; the group of qubits corresponding to the password and selected and sent by the client is the same as the group of qubits corresponding to the same password and randomly set during registration. It should be understood that when the client registers the account, the client also receives the qubits in the bell state prepared by the trust center, and randomly selects part of the qubits as the account and randomly selects part of other qubits as the password. For example, when the client registers, the value of a group of qubits corresponding to the account is {0,1,1,0,0,0,1}, and when the client logs in to the same account, the client receives any one qubit awOr AuAnd then discarding or forwarding to the first server, so that the value of a group of qubits corresponding to the account number, which is finally forwarded to the first server, should also be {0,1,1,0,0,0,1 }.
Step 13: the first server performs login authentication.
Specifically, after receiving the qubits, the first server stores the qubits in the quantum register according to a receiving order, and sets the received qubits to m qubits in the quantum register according to the receiving orderAnd m additional qubits set toWherein the first group of qubitsThe set of qubits corresponding to the account actually selected for sending by the client, which is a of the clientwAccount, second set of qubitsActually, a group of quantum bits corresponding to the password and selected and sent by the client is the password of the client, and s is more than or equal to 1i≤n,1≤tiN, i belongs to {1,2, ·, m }; then quantum bit is processed under the request of clientAndperforming Bell state measurements to obtain m sets of measurementsAnd measuring the m groups of measurement resultsSending the data to the client side, wherein the data is sent to the client side,if allMeasured result of (2)If the client account number and the password are both (0,0), the account number and the password of the client are verified to be passed, and if the client account number and the password exist, the account number and the password of the client are verified to be passedIf the measurement result of (1) is not (0,0), the account number and password authentication of the client are not passed.
WhereinAndinforming the first server of the position in the received qubit sequence by the client;respectively representAnd (6) measuring the result.
Step 14: after the login is successful, the client sends an access request to the first server on a login interface of the second server, and applies for using the account information of the client on the first server;
the account information includes an account number, a password, and information related to the account number, such as identity information of the client on the first server.
Specifically, the client is based on the entanglement swapping technique and depends on each measurement resultTo know the quantitySub-bitIn the new combination stateAndandthe client willAndis sent to the first server, wherein the qubitsThat is, in step 11 (B1)w,B2u)。
Wherein,andaccess request information representing a request by a client to use account information of the client on a first server. The second server sends the quantum bit B1 distributed by the trusted centerwThe method can be used as the characteristic information of a login interface, and the client acquires the qubit according to the measurement resultIn the new combination stateThereby realizingAnd sending an access request for requesting account information to the first server on a login interface of the second server.
Entanglement swapping techniques are shown below: four Bell states (Bell states) are chosen as entanglement resources, assuming two particles (a, b) are represented as:
wherein (z, x) is e {0,1}2,X=|0>b<1|+|1>b<0|,Z=|0>b<0|-|1>b<1| considering two particle pairs (a, b) and (a ', b'), their Bell-state forms are | ψ, respectivelyz,x(a,b)>And | ψz',x'(a',b')>Now, the particles b and b ' are jointly measured on the basis of the Bell states, and then the combined state of the particles a and a ' is reset to one of the four Bell states, which depends on the measurement results of the particles b and b ' Bell states.
Without loss of generality, assume that the state of particles a and b is | ψ0,0(a,b)>The state of the particles a 'and b' is | ψ0,0(a',b')>Thus, the composition of the four particles is:
it can also be rewritten as follows:
step 15: the first server sends the account information of the client to the quantum server through the trusted center;
the first server is represented in the form of classical informationAccount information, wherein the account information isθkRandomly selecting from a set S, wherein S { (K pi)/4 | K { (K pi)/0, 1 ·,7}, and when K ∈ { S ·1,s2,···,smZ in account informationk、xkObtained by a first server from a clientAndis determined, i.e. in step 14Anddetermination of the value of si∈{s1,s2,···,sm}; when k ∈ {1,2, ·, n } - { s ∈ {1,2, ·, n } - }1,s2,···,smAt this time, { z ] is randomly selectedk,xk}∈{0,1}2
Let { theta'1,θ′2,···,θ′nCompletely and uniformly distributed in the set S; because of the n classical informationIs sent by Server1 to Bob eventually, but because Bob does not knowA value of (a), andis randomly chosen by the Server1 in step 12, so Bob cannot know eitherThe value of (c).
Step 16: the quantum server performs blind quantum computing processing on the account information according to a single-server classical client blind quantum computing protocol to obtain the blinded account information, and forwards the account information to the second server and the first server through the trusted center.
Specifically, the quantum server is based on the account informationObtaining a measured base { + -. theta'kAt the measurement base { + -. theta'kMeasuring a quantum bit B2 sent by a credible center on the basis ofuObtaining a measurement resultWherein the measurement resultAccount information that is blinded.
Wherein the base { + -. theta'kIs of + theta'k、-θ′kTwo measurement bases.
And step 17: the second server receives the access application information sent by the first serverAnd then, logging in by using the blinded account information, and opening the application service to the client after successful logging in.
Wherein the first server receives the account information which is blindedThereafter, application access information expressed in the form of classical information is transmittedAnd the second server is used for indicating that the second server agrees to use the blinded account information, so that the second server receives the application access information of the first server and then uses the blinded account information for login.
The blinded account information is also account information, which can be used as an account by a second server through direct login authentication, so that the second server opens an application service to the client according to the account that the client has logged in.
According to the method, account number sharing among different application services is realized, the safety of the account information is guaranteed, and even if the account number is shared, the specific content of the account information is not shared.
The foregoing is merely a preferred embodiment of the invention, which is intended to be illustrative and not limiting. The skilled person will understand that many modifications may be made thereto within the scope of the invention as defined in the claims, but all will fall within the scope of the invention.

Claims (4)

1. A different account number secure login method based on blind quantum computation is characterized by comprising the following steps: the method comprises the following steps:
step 1: the client sends an account and a password to the first server for login verification;
step 2: after the login is successful, the client sends an access request to the first server on a login interface of a second server, and applies for using the account information of the client on the first server;
the account information at least comprises an account number and a password of the client on the first server;
and step 3: the first server sends the account information of the client to a quantum server through a trusted center;
and 4, step 4: the quantum server performs blind quantum computing processing on the account information according to a single-server classical client blind quantum computing protocol to obtain blinded account information, and forwards the account information to the second server through the trusted center;
and 5: and the second server uses the blinded account information to log in after receiving the access application information sent by the first server, and opens the application service to the client after successful log-in.
2. The method of claim 1, wherein: the login verification process in the step 1 is as follows:
firstly, the client receives a quantum bit A sent by a trusted centerw、AuAnd from the received qubit Aw、AuThe first server sets the received qubits into two groups of qubits according to the receiving order
Wherein the first group of qubitsA second set of qubits for the client's account numberIs the password of the client, s is more than or equal to 1i≤n,1≤tiN, i belongs to {1,2, ·, m }; n and m are positive integers, and m represents the number of each group of qubits;
the trust center prepares 2n Bell states and divides them into two groups of Bell states, the first group of Bell statesThe molar state is | psi0,0(B1w,Aw)>W 1,2, n, a second set of bell states | ψ0,0(B2u,Au)>N, n represents the number of bell states in each group of bell states;
wherein, B1wA first qubit representing a w-th Bell state of the first set of Bell states, AwA second qubit representing the w-th Bell state of the first set of Bell states, B2uA first qubit representing the u-th Bell state of the second set of Bell states, AuA second qubit representing a u-th bayer state of the second set of bayer states;
trusted center converts qubit B1wSending the quantum bit A to a second serverwAnd AuSending the quantum bit B2 to the clientuSending the data to a quantum server, wherein n is (2+ delta) m, and delta is a fixed parameter more than 0;
finally, the first server pairs all of the two groups of qubitsAndsequentially executing Bell state measurement to obtain m groups of measurement resultsAnd measuring the m groups of measurement resultsSending the data to the client;
if allMeasured result of (2)Are both (0,0), then the guestAnd the account number and the password of the client are verified.
3. The method of claim 2, wherein: the process of sending the access request in step 2 is as follows:
the client is based on entanglement swapping technology and depends on each measurement resultLearning qubitsIn the new combination stateAndandthe client will beAndsending the value of (a) to the first server;
wherein,andan account number and a password in the access request information representing that the client requests to use account information of the client on the first server.
4. The method of claim 3, wherein: the process of blinding the account information by the quantum server in the step 4 is as follows:
firstly, the quantum server acquires account information represented by classical information;
wherein the account information is
θkRandomly selecting from a set S, wherein S { (K pi)/4 | K { (K pi)/0, 1 ·,7 };
when k is equal to s1,s2,···,smZ in account informationk、xkObtained by the first server from the clientAnddetermination of the value of si∈{s1,s2,···,sm};
When k ∈ {1,2, ·, n } - { s ∈ {1,2, ·, n } - }1,s2,···,smAt this time, { z ] is randomly selectedk,xk}∈{0,1}2
Finally, the quantum server is used for obtaining account informationObtaining a measured base { + -. theta'kAt the measurement base { + -. theta'kMeasuring a quantum bit B2 sent by a credible center on the basis ofuObtaining a measurement result
Wherein the measurement resultAccount information that is blinded.
CN201710793910.3A 2017-09-06 2017-09-06 A kind of different account number safety login method based on blind quantum calculation Active CN107493295B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710793910.3A CN107493295B (en) 2017-09-06 2017-09-06 A kind of different account number safety login method based on blind quantum calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710793910.3A CN107493295B (en) 2017-09-06 2017-09-06 A kind of different account number safety login method based on blind quantum calculation

Publications (2)

Publication Number Publication Date
CN107493295A CN107493295A (en) 2017-12-19
CN107493295B true CN107493295B (en) 2019-09-24

Family

ID=60652232

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710793910.3A Active CN107493295B (en) 2017-09-06 2017-09-06 A kind of different account number safety login method based on blind quantum calculation

Country Status (1)

Country Link
CN (1) CN107493295B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108388946B (en) * 2018-01-29 2021-08-17 湘潭大学 Two-party quantum computing method based on blind quantum computing
FR3091384B1 (en) * 2018-12-26 2021-01-01 Veriqloud QUANTUM CALCULATION PROCESS AND DEVICE DELEGATED TO A QUANTUM SERVER BY A CLIENT FOR THE CREATION OF A QUANTUM STATE KNOWN TO THE CLIENT BUT HIDDEN FROM THE QUANTUM SERVER
CN113708926B (en) * 2021-08-25 2024-05-10 重庆邮电大学 Safe multiparty calculation method based on verifiable blind quantum calculation

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106972922B (en) * 2013-06-08 2019-06-14 科大国盾量子技术股份有限公司 A kind of mobile secret communication method based on quantum key distribution network
CN103795724B (en) * 2014-02-07 2017-01-25 陈珂 Method for protecting account security based on asynchronous dynamic password technology
US20150288517A1 (en) * 2014-04-04 2015-10-08 Ut-Battelle, Llc System and method for secured communication
CN104821874B (en) * 2015-05-15 2017-08-29 长春大学 A kind of method that quantum key is applied to Internet of Things data encrypted transmission

Also Published As

Publication number Publication date
CN107493295A (en) 2017-12-19

Similar Documents

Publication Publication Date Title
JP6606156B2 (en) Data security service
US10554420B2 (en) Wireless connections to a wireless access point
US9590954B2 (en) Transferring encrypted and unencrypted data between processing devices
CN106104562B (en) System and method for securely storing and recovering confidential data
US7379551B2 (en) Method and system for recovering password protected private data via a communication network without exposing the private data
US9021552B2 (en) User authentication for intermediate representational state transfer (REST) client via certificate authority
AU2016311166B2 (en) System and method for biometric protocol standards
CN110830255B (en) Bidirectional user authentication and secret information quantum communication transfer method
KR102028092B1 (en) Apparatus and method for reliable quantum signature
JP2016508699A (en) Data security service
CN107493295B (en) A kind of different account number safety login method based on blind quantum calculation
Vokorokos et al. Yet another attempt in user authentication
WO2017074953A1 (en) Method and system for dynamic password authentication based on quantum states
CN114175079A (en) System and method for biometric protocol standards
Chean et al. Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
CN110691068A (en) Cloud server login system, method and device
US8284938B2 (en) Techniques for data encryption and decryption
Chandran et al. An efficient secure authentication scheme for personalized healthcare system
Myrland Authentication and Authorization in Blind Data Miners
Amdie STRENGTHENING THE SECURITY OF MOBILE CLOUD COMPUTING USING HYBRID AUTHENTICATION TECHNIQUES
WO2021102172A1 (en) Transmission of secure information in a content distribution network
Varughese et al. Cryptographic Mutual Authentication System with HMAC for Networking Application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant