CN108512659A - A kind of quantum secret information sharing method and system suitable for company property management - Google Patents

A kind of quantum secret information sharing method and system suitable for company property management Download PDF

Info

Publication number
CN108512659A
CN108512659A CN201810205048.4A CN201810205048A CN108512659A CN 108512659 A CN108512659 A CN 108512659A CN 201810205048 A CN201810205048 A CN 201810205048A CN 108512659 A CN108512659 A CN 108512659A
Authority
CN
China
Prior art keywords
user
particle
manager
secret information
measurement result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810205048.4A
Other languages
Chinese (zh)
Other versions
CN108512659B (en
Inventor
邵婷婷
张仕斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Longtutem Information Technology Co ltd
Top Technology (Beijing) Co.,Ltd.
Original Assignee
Chengdu University of Information Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu University of Information Technology filed Critical Chengdu University of Information Technology
Priority to CN201810205048.4A priority Critical patent/CN108512659B/en
Publication of CN108512659A publication Critical patent/CN108512659A/en
Application granted granted Critical
Publication of CN108512659B publication Critical patent/CN108512659B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Optical Communication System (AREA)

Abstract

The invention belongs to technical field of data processing, disclose a kind of quantum secret information sharing method and system suitable for company property management, tangle particle and all prepared by manager;When carrying out eavesdropping detection, manager merges the first user, second user, measurement result disclosed in third user and the local operations coding information of oneself and compares, if it is inconsistent, stopping agreement operation;A kind of quantum secret information shared system for company property management is disclosed simultaneously.The present invention can prevent from external eavesdropping and internaling attack, it is ensured that the safety of secret information is shared, if it is desired to expand to more participants, it is only necessary to which prepared by sender corresponding number of tangles particle.

Description

A kind of quantum secret information sharing method and system suitable for company property management
Technical field
The invention belongs to technical field of data processing more particularly to a kind of quantum secret letters suitable for company property management Cease sharing method and system.
Background technology
Currently, the prior art commonly used in the trade is such:
Under existing market economic condition, the administering of property of company is most important to the operation and development of company.If property Mismanagement, enterprise may can be by loss difficult to the appraisal, therefore, enterprise is to sustainable development, it is necessary to have rational wealth Produce the method for resource-sharing management.The manager of some major companies abuses company property in order to avoid individual, and huge property is added It is close to be placed on bank, key is then distributed to multiple believable office workers, only multiple office workers cooperate, and can just recover huge The key of property obtains the money.
In conclusion problem of the existing technology is:
(1) previous secret information secret sharing majority all defines the number of succedaneum, has ignored multi-user's secret letter Breath is shared.In order to adapt to changeable external environment, the number of succedaneum may change at any time, and previous scheme can not just fit With.
(2) with the research of quantum secret sharing agreement, many people propose the quantum secret sharing side based on GHZ states Case, but it is still relatively difficult to the preparation and measurement of GHZ states at present.
(3) without sufficient safety analysis in many secret information secret sharings, external attacker may attempt to obtain Effective information, dishonest participant can provide deceptive information in the implementation procedure of scheme and cheat.
Solve the difficulty and meaning of above-mentioned technical problem:
The present invention devises a kind of (3,3) quantum secret sharing scheme based on Bell state, by analysis it is found that can be to prevent It is only external to eavesdrop and internal attack, it is ensured that the safety of secret information is shared, and can expand to more multi-player.
Invention content
In view of the problems of the existing technology, the present invention provides a kind of quantum secret letters suitable for company property management Cease sharing method and system.
The invention is realized in this way a kind of quantum secret information sharing method suitable for company property management, described Quantum secret information sharing method suitable for company property management includes:
Particle is tangled all to be prepared by manager;When carrying out eavesdropping detection, manager merges the first user, the second use Measurement result disclosed in family, third user is compared with the local operations coding information of oneself, if it is inconsistent, stopping agreement behaviour Make;
Expression formula is as follows:
Further, manager carries out in local operations coding information, including:
Define four Bell states
It is rightBeta particle carry out following four local operations:
These four local operations are encoded:
σ00→"00"、σ01→"01"、σ10→"10"、σ11→"11"。
Further, it is assumed that AB, CD, EF tri- are to tangling particle pair for sender of the message's preparation, all in | Ψ->State is right | Ψ- >ABThe beta particle of state obtains after carrying out a certain behaviour in four kinds of local operations | Ψ->、|Φ->、|Φ+>、|Ψ+>A certain state; Random detection particle is inserted into later to be distributed the new particle that tangles;
Specifically distribute and includes:
After particle distribution, the first user, second user, third user receive particle (A, F), (B, C), (D, E) respectively, Then each personal Bell bases measure the particle in oneself hand, merge the measurement result of three, it is known that sender of the message do which Kind local operations, and then obtain sender of the message's key message to be transmitted.
Further, the quantum secret information sharing method suitable for company property management, including:
1) it initializes
The first step:Manager prepares 3N to being in Ψ->State tangles particle pair, is denoted as: Referred to as S1;
Second step:Manager by key information be converted into binary bits string M (1), M (2) ... M (N) }, wherein EachCorresponding 2 bits, right according to the coding rule of local operations | Ψ->ABThe beta particle of state implements four kinds of local operations In a kind of operation, formed and new tangle particle string, referred to as S2;Radom insertion 3Q is to being in S2 | Ψ->The particle of state is made To detect particle, referred to as S3, wherein the position being inserted into only has manager to know.
2) distribution of particle
Particle (A, F) is sent to the first user by manager, and particle (B, C) is sent to second user, by particle (D, E) It is sent to third user;
3) channel safety detects
After manager confirms that the first user, second user, third user three receive particle, the position of detection particle is announced It sets, the first user, second user, third user three will extract for the particle of detection and use Bell bases to measure certainly respectively Then particle in own hand announces the measurement result of oneself simultaneously;
Manager merges the measurement result of three, if the first user, second user, the measurement result of third user announcement Measurement result is consistent when being encoded to " 00 " with local operations, illustrates that channel is safe, otherwise there may be eavesdroppings;
4), the merging of message
After acknowledgement channel safety, if the first user, second user, third user want using the property for being stored in bank, The N respectively possessed measures particle Bell bases respectively;If the first user, second user, third user are legal possess The people for the key that manager sends obtains that office that manager does beta particle by merging the Bell base measurement results of three Domain operates, and then obtains the asset keys for being stored in bank.
Another object of the present invention is to provide the quantum secret informations for being suitable for company property management described in a kind of realize The computer program of sharing method.
Another object of the present invention is to provide the quantum secret informations for being suitable for company property management described in a kind of realize The information data processing terminal of sharing method.
Another object of the present invention is to provide a kind of computer readable storage mediums, including instruction, when it is in computer When upper operation so that computer executes the quantum secret information sharing method suitable for company property management.
Another object of the present invention is to provide a kind of quantum secret information shared systems suitable for company property management Including:
Initialization unit prepares 3N to being in for manager | Ψ->State tangles particle pair, is denoted as:
Manager by key information be converted into binary bits string M (1), M (2) ... M (N) }, wherein eachCorresponding 2 bits, right according to the coding rule of local operations | Ψ->ABThe beta particle of state implements one in four kinds of local operations Kind of operation forms and new tangles particle string;Radom insertion 3Q is to being in new particle string | Ψ->The particle of state is as detection Particle, wherein the position being inserted into only has manager to know;
Particle (A, F) is sent to the first user for manager, particle (B, C) is sent to by the Dispatching Unit of particle Particle (D, E) is sent to third user by second user;
Safety detection unit, it is public after manager confirms that the first user, second user, third user three receive particle Cloth detects the position of particle, and the first user, second user, third user three will extract and distinguish for the particle of detection The particle in oneself hand is measured with Bell bases, then announces the measurement result of oneself simultaneously;Manager merges the measurement knot of three Fruit, if measurement result when the first user, second user, the measurement result of third user announcement and local operations are encoded to " 00 " Unanimously, illustrate that channel is safe, otherwise there may be eavesdroppings;
The combining unit of message, if wanting using the wealth for being stored in bank for the first user, second user, third user Production respectively measures particle Bell bases the N respectively possessed;If the first user, second user, third user are legal gather around There is the people of the key of manager's transmission to obtain the local that manager does beta particle by merging the Bell base measurement results of three Operation, and then obtain the key for the huge property for being stored in bank.
Another object of the present invention is to provide a kind of equipped with the quantum secret letter suitable for company property management Cease the information data processing terminal of shared system.
In conclusion advantages of the present invention and good effect are
It tangles particle all to be prepared by manager, rather than is prepared respectively by the first user, second user, third user. If tangling particle to be prepared by the first user, second user, third user, tricker may not prepare and be in as requested | Ψ- >The particle of state, and select to prepare other Bell states, the result that such entanglement transfer measurement obtains will be mistake.It tangles Particle is all prepared by manager and improves safety.Carry out eavesdropping detection when, manager merge three measurement result with The local operations coding information comparison of oneself, if it is inconsistent, transmitting bank's refusal opens huge property.
When channel is dangerous, it is understood that there may be external attack.For example attacker Eve wants intercepting and capturing manager and is sent to first User, second user and third user particle, it is desirable to secret result is obtained by intercepting and capturing/multi-sending attack.Assuming that Eve is intercepted and captured Manager is sent to the particle C of second user and measures, it will destroys the Entanglement of original CD particles;If Eve is cut Particle C is obtained without measuring, but sends new particle to second user, can equally be found in the detection.
Manager's radom insertion some particles when carrying out particle distribution are detected for eavesdropping, and listener-in is into row information The particle which is for detection is not aware that when eavesdropping, randomly select code segment for eavesdrop detect can ensure to disappear The safety of breath.If finding the first user, second user, measurement result and manager disclosed in third user in detection process The local operations coding information done is inconsistent, illustrates there may be attack, and manager transmitting bank refuses anyone opening and deposits The property put.Therefore, which can effectively resist external attack.
The present invention can be resisted effectively and be internaled attack.If second user is tricker, second user interception is sent to the The particle D of three users abandons particle C and particle D, then prepares a pair of new stateThis Entangled State Particle is C* and D*, and D* is sent to third user, and third user is not aware that is oneself received is the particle of mistake, needs the The just common Bell bases of third user measure the particle in oneself hand when one user, second user, third user announce measurement result And announce measurement result.The expression formula of this process is as follows:
With formula
Compare and understand that the result that the first user, second user, third user have eighth possibility to announce is | Ψ+>AF| Φ->BC+>DE、|Ψ+>AF->BC+>DE, if there is 6 pairs of particles, then the possibility for obtaining correct result isIt is almost nil.Therefore second user is wanted to obtain secret information in this way to be irrealizable.Even if second The particle that user's interception is sent to third user can not also deduce final encrypted message.
The present invention can prevent external eavesdropping and internal attack, it is ensured that the safety of secret information is shared, if it is desired to expand Open up more participants, it is only necessary to which prepared by sender corresponding number of tangles particle.
Compared with previous secret information is shared, the privacy sharing side proposed by the present invention applied in business property management Key is distributed to believable office worker by case, and can increase or decrease participant, and previous scheme is mostly used GHZ states and prepares and survey Amount, but the preparation and measurement of GHZ states is relatively difficult at present, the present invention uses the secret sharing scheme based on Bel states.
Description of the drawings
Fig. 1 be present example provide tangle particle distribution procedure figure.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with example, to the present invention into Row is further described.It should be appreciated that specific implementation described herein is only used to explain the present invention, it is not used to limit The present invention.
Previous secret information secret sharing majority all defines the number of succedaneum, and it is total to have ignored multi-user's secret information It enjoys.In order to adapt to changeable external environment, the number of succedaneum may change at any time, and previous scheme can not be just applicable in.
With the research of quantum secret sharing agreement, many people propose the quantum secret sharing scheme based on GHZ states, but It is still relatively difficult to the preparation and measurement of GHZ states at present.
Without sufficient safety analysis in many secret information secret sharings, external attacker may attempt to obtain effective Information, dishonest participant can provide deceptive information in the implementation procedure of scheme and cheat.
The quantum secret information sharing method suitable for company property management that present example provides,
Define four Bell states
It is rightBeta particle carry out following four local operations:
These four local operations are encoded:
σ00→"00"、σ01→"01"、σ10→"10"、σ11→"11"。
Assuming that sender of the message prepares AB, CD, EF tri- to tangling particle pair, all in | Ψ->State is right | Ψ->ABThe B of state Particle can obtain after carrying out a certain behaviour in four kinds of local operations | Ψ->、|Φ->、|Φ+>、|Ψ+>A certain state;Then Particle will be tangled to be distributed.
Specific distribution procedure is as shown in Figure 1.
In fig. 1, it is assumed that after particle distribution, the first user, second user, third user receive respectively particle (A, F), (B, C), (D, E), then each personal Bell bases measure the particle in oneself hand, their measurement result is compared, it is known that disappearing Any local operations that breath sender does, and then obtain sender of the message's key message to be transmitted.
Such as:AB, CD, EF tri- are to tangling particle pair for sender of the message's preparation, all in | Ψ->State, then sender is to B Particle is encoded to the local operations of " 01 ", i.e. σ01->AB=| Φ->AB, the then distribution of progress particle, the first user, Second user, third user measure particle (A, F), (B, C), (D, E) in oneself hand, the table of this process with Bell bases respectively It is as follows up to formula:
Assuming that the measurement result of the first user is | Ψ+>AF, the measurement result of second user is | Φ+>BC, third user's Measurement result is | Ψ->DE, " 01 " operation has been carried out according to 1 sender of the message of table.
The quantum secret information sharing method suitable for company property management that present example provides, including:
It tangles particle all to be prepared by manager, rather than is prepared respectively by the first user, second user, third user. If tangling particle to be prepared by the first user, second user, third user, tricker may not be prepared into as requested | Ψ-> The particle of state, and select to prepare other Bell states, the result that such entanglement transfer measurement obtains will be mistake.Tangle grain Son is all prepared by manager and improves safety.Carry out eavesdropping detection when, manager merge three measurement result with from Oneself local operations coding information comparison, if it is inconsistent, transmitting bank's refusal opens huge property.
When channel is dangerous, it is understood that there may be external attack.For example attacker Eve wants intercepting and capturing manager and is sent to first User, second user and third user particle, it is desirable to secret result is obtained by intercepting and capturing/multi-sending attack.Assuming that Eve is intercepted and captured Manager is sent to the particle C of second user and measures, it will destroys the Entanglement of original CD particles;If Eve is cut Particle C is obtained without measuring, but sends new particle to second user, can equally be found in the detection.
Manager randomly selected when carrying out particle distribution some particles for eavesdrop detection, and listener-in is into row information The particle which is for detection is not aware that when eavesdropping, randomly select code segment for eavesdrop detect can ensure to disappear The safety of breath.If finding the first user, second user, measurement result and manager disclosed in third user in detection process The local operations coding information done is inconsistent, illustrates there may be attack, and manager transmitting bank refuses anyone opening and deposits The property put.Therefore, which can effectively resist external attack.
The present invention can be resisted effectively and be internaled attack.If second user is tricker, second user interception is sent to the The particle D of three users abandons particle C and particle D, then prepares a pair of new stateThis Entangled State Particle is C* and D*, and D* is sent to third user, and third user is not aware that is oneself received is the particle of mistake, needs the When one user, second user, third user announce measurement result
The just common Bell bases of third user measure the particle in oneself hand and announce measurement result.The expression formula of this process It is as follows:
With formula
Compare and understand that the result that the first user, second user, third user have eighth possibility to announce is | Ψ+>AF| Φ->BC+>DE、|Ψ+>AF->BC+>DE, if there is 6 pairs of particles, then the possibility for obtaining correct result is It is almost nil.Therefore second user is wanted to obtain secret information in this way to be irrealizable.Even if second user is cut Take the particle for being sent to third user that can not also deduce final encrypted message.
The quantum secret information shared system suitable for company property management that present example provides, including:
Initialization unit prepares 3N to being in Ψ-for manager>State tangles particle pair, is denoted as:
Manager by key information be converted into binary bits string M (1), M (2) ... M (N) }, wherein eachCorresponding 2 bits, right according to the coding rule of local operations | Ψ->ABThe beta particle of state implements one in four kinds of local operations Kind of operation forms and new tangles particle string;Radom insertion 3Q is to being in new particle string | Ψ->The particle of state is as detection Particle, wherein the position being inserted into only has manager to know;
Particle (A, F) is sent to the first user for manager, particle (B, C) is sent to by the Dispatching Unit of particle Particle (D, E) is sent to third user by second user;
Safety detection unit, it is public after manager confirms that the first user, second user, third user three receive particle Cloth detects the position of particle, and the first user, second user, third user three will extract and distinguish for the particle of detection The particle in oneself hand is measured with Bell bases, then announces the measurement result of oneself simultaneously;Manager merges the measurement knot of three Fruit, if measurement result when the first user, second user, the measurement result of third user announcement and local operations are encoded to " 00 " Unanimously, illustrate that channel is safe, otherwise there may be eavesdroppings;
The combining unit of message, if wanting using the wealth for being stored in bank for the first user, second user, third user Production respectively measures particle Bell bases the N respectively possessed;If the first user, second user, third user are legal gather around There is the people of the key of manager's transmission to obtain the local that manager does beta particle by merging the Bell base measurement results of three Operation, and then obtain the key for the huge property for being stored in bank.
With reference to specific embodiment, the invention will be further described.
The quantum secret information sharing method suitable for company property management that present example provides, including:
1) it initializes
The first step:Manager prepares 3N to being in | Ψ->State tangles particle pair, is denoted as: Referred to as S1;
Second step:Manager by key information be converted into binary bits string M (1), M (2) ... M (N) }, wherein EachCorresponding 2 bits, right according to the coding rule of local operations | Ψ->ABThe beta particle of state implements four kinds of local operations In a kind of operation, formed and new tangle particle string, referred to as S2;Radom insertion 3Q is to being in S2 | Ψ->The particle of state is made To detect particle, referred to as S3, wherein the position being inserted into only has manager to know.
2) distribution of particle
Particle (A, F) is sent to the first user by manager, and particle (B, C) is sent to second user, by particle (D, E) It is sent to third user;
3) channel safety detects
After manager confirms that the first user, second user, third user three receive particle, the position of detection particle is announced It sets, the first user, second user, third user three will extract for the particle of detection and use Bell bases to measure certainly respectively Then particle in own hand announces the measurement result of oneself simultaneously;
Manager merges the measurement result of three, if the first user, second user, the measurement result of third user announcement Measurement result is consistent when being encoded to " 00 " with local operations, illustrates that channel is safe, otherwise there may be eavesdroppings;
4), the merging of message
After acknowledgement channel safety, if the first user, second user, third user want using the property for being stored in bank, The N respectively possessed measures particle Bell bases respectively;If the first user, second user, third user are legal possess The people for the key that manager sends obtains that office that manager does beta particle by merging the Bell base measurement results of three Domain operates, and then obtains the asset keys for being stored in bank.
The operation of 1 sender of the message of table and the first user, the correspondence of second user, third user's measurement result
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its arbitrary combination real It is existing.When using entirely or partly realizing in the form of a computer program product, the computer program product include one or Multiple computer instructions.When loading on computers or executing the computer program instructions, entirely or partly generate according to Flow described in the embodiment of the present invention or function.The computer can be all-purpose computer, special purpose computer, computer network Network or other programmable devices.The computer instruction can store in a computer-readable storage medium, or from one Computer readable storage medium is transmitted to another computer readable storage medium, for example, the computer instruction can be from one A web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL) Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center Transmission).The computer read/write memory medium can be that any usable medium that computer can access either includes one The data storage devices such as a or multiple usable mediums integrated server, data center.The usable medium can be magnetic Jie Matter, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state disk Solid State Disk (SSD)) etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.

Claims (9)

1. a kind of quantum secret information sharing method suitable for company property management, which is characterized in that described to be suitable for company The quantum secret information sharing method of administering of property includes:
Particle is tangled all to be prepared by manager;When carrying out eavesdropping detection, manager merges the first user, second user, the Measurement result disclosed in three users is compared with the local operations coding information of oneself, if it is inconsistent, stopping agreement operation;
Expression formula is as follows:
2. being suitable for the quantum secret information sharing method of company property management as described in claim 1, which is characterized in that pipe Reason person carries out in local operations coding information, including:
Define four Bell states
It is rightBeta particle carry out following four local operations:
These four local operations are encoded:
σ00→"00"、σ01→"01"、σ10→"10"、σ11→"11"。
3. being suitable for the quantum secret information sharing method of company property management as claimed in claim 2, which is characterized in that
Assuming that sender of the message prepares AB, CD, EF tri- to tangling particle pair, all in | Ψ->State is right | Ψ->ABThe beta particle of state into Obtained after a certain behaviour in four kinds of local operations of row | Ψ->、|Φ->、|Φ+>、|Ψ+>A certain state;Then particle will be tangled It is distributed;
Specifically distribute and includes:
After postulated particle distribution, the first user, second user, third user receive particle (A, F), (B, C), (D, E) respectively, Then each personal Bell bases measure the particle in oneself hand, compare the measurement result of oneself, it is known that sender of the message do which Kind local operations, obtain sender of the message's key message to be transmitted.
4. being suitable for the quantum secret information sharing method of company property management as described in claim 1, which is characterized in that institute The quantum secret information sharing method suitable for company property management stated, including:
1) it initializes
The first step:Manager prepares 3N to being in | Ψ->State tangles particle pair, is denoted as S1:
Second step:Manager by key information be converted into binary bits string M (1), M (2) ... M (N) }, wherein each It is aCorresponding 2 bits, right according to the coding rule of local operations | Ψ->ABThe beta particle of state is implemented in four kinds of local operations A kind of operation forms and new tangles particle string S2;Radom insertion 3Q is to being in S2 | Ψ->The particle of state is as detection particle Only have manager to know in the position of S3, insertion;
2) distribution of particle
Particle (A, F) is sent to the first user by manager, and particle (B, C) is sent to second user, and particle (D, E) is sent Give third user;
3) channel safety detects
After manager confirms that the first user, second user, third user three receive particle, the position of detection particle is announced, the One user, second user, third user three will extract for the particle of detection and measure oneself hand with Bell bases respectively In particle, then simultaneously announce the measurement result of oneself;
Manager merges the measurement result of three, and the measurement result and local that the first user, second user, third user announce are grasped Measurement result is consistent when being encoded to 00, and channel is safe, otherwise there is eavesdropping;
4), the merging of message
After acknowledgement channel safety, if the first user, second user, third user want using the property for being stored in bank, respectively The N respectively possessed measures particle Bell bases;If the first user, second user, third user are legal to possess management The people for the key that person sends obtains the local operations that manager does beta particle by the Bell base measurement results of merging three, Obtain the asset keys for being stored in bank.
5. a kind of shared side of the quantum secret information realized described in Claims 1 to 4 any one suitable for company property management The computer program of method.
6. a kind of shared side of the quantum secret information realized described in Claims 1 to 4 any one suitable for company property management The information data processing terminal of method.
7. a kind of computer readable storage medium, including instruction, when run on a computer so that computer is executed as weighed Profit requires the quantum secret information sharing method suitable for company property management described in 1-4 any one.
8. a kind of quantum secret information sharing method as described in claim 1 suitable for company property management is suitable for public affairs Take charge of the quantum secret information shared system of administering of property, which is characterized in that the quantum suitable for company property management is secret Information sharing system includes:
Initialization unit prepares 3N to being in for manager | Ψ->State tangles particle pair, is denoted as S1:
Manager by key information be converted into binary bits string M (1), M (2) ... M (N) }, wherein eachIt is right 2 bits are answered, right according to the coding rule of local operations | Ψ->ABThe beta particle of state implements a kind of behaviour in four kinds of local operations Make, is formed and new tangle particle string S2;Radom insertion 3Q is to being in new particle string S2 | Ψ->The particle of state is as detection Only have manager to know in the position of particle S3, insertion;
Particle (A, F) is sent to the first user for manager, particle (B, C) is sent to second by the Dispatching Unit of particle Particle (D, E) is sent to third user by user;
Safety detection unit announces inspection after manager confirms that the first user, second user, third user three receive particle The position of particle is surveyed, the first user, second user, third user three will extract for the particle of detection and use respectively Bell bases measure the particle in oneself hand, then announce the measurement result of oneself simultaneously;Manager merges the measurement result of three, Measurement result is consistent when the measurement result that first user, second user, third user announce is encoded to 00 with local operations, channel It is safe, otherwise there is eavesdropping;
The combining unit of message obtains the key for the property for being stored in bank for the first user, second user, third user, The N respectively possessed measures particle Bell bases respectively;If the first user, second user, third user are legal possess The people for the key that manager sends show that manager grasps the local that beta particle is done by merging the Bell base measurement results of three Make, and then obtains the key for the huge property for being stored in bank.
9. a kind of Information Number equipped with the quantum secret information shared system for being suitable for company property management described in claim 8 According to processing terminal.
CN201810205048.4A 2018-03-13 2018-03-13 Quantum secret information sharing method and system suitable for company property management Active CN108512659B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810205048.4A CN108512659B (en) 2018-03-13 2018-03-13 Quantum secret information sharing method and system suitable for company property management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810205048.4A CN108512659B (en) 2018-03-13 2018-03-13 Quantum secret information sharing method and system suitable for company property management

Publications (2)

Publication Number Publication Date
CN108512659A true CN108512659A (en) 2018-09-07
CN108512659B CN108512659B (en) 2020-10-27

Family

ID=63377673

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810205048.4A Active CN108512659B (en) 2018-03-13 2018-03-13 Quantum secret information sharing method and system suitable for company property management

Country Status (1)

Country Link
CN (1) CN108512659B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711932A (en) * 2018-12-18 2019-05-03 成都信息工程大学 A kind of multigroup e-commerce endorsement method based on quantum teleportation

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100251049A1 (en) * 2009-03-27 2010-09-30 Kabushiki Kaisha Toshiba Quantum computing method and a quantum computer
CN103338187A (en) * 2013-06-03 2013-10-02 浙江工商大学 Information leakage-free bidirectional quantum secure direct communication protocol based on any two gigahertz (GHZ) state/entanglement exchange result collection codes
CN103414536A (en) * 2013-08-05 2013-11-27 北京航空航天大学 High-fidelity quantum network coding method based on controlled teleportation
CN106685659A (en) * 2017-04-01 2017-05-17 成都信息工程大学 Quantum secret sharing method capable of resisting intercept-resend attack, man-in-the-middle attack and entanglement attack
CN106712945A (en) * 2017-01-22 2017-05-24 安徽大学 Quantum secret sharing method based on Bell state
CN107070664A (en) * 2017-04-01 2017-08-18 成都信息工程大学 A kind of quantum authorization management method based on EPR pairs and entanglement transfer

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100251049A1 (en) * 2009-03-27 2010-09-30 Kabushiki Kaisha Toshiba Quantum computing method and a quantum computer
CN103338187A (en) * 2013-06-03 2013-10-02 浙江工商大学 Information leakage-free bidirectional quantum secure direct communication protocol based on any two gigahertz (GHZ) state/entanglement exchange result collection codes
CN103414536A (en) * 2013-08-05 2013-11-27 北京航空航天大学 High-fidelity quantum network coding method based on controlled teleportation
CN106712945A (en) * 2017-01-22 2017-05-24 安徽大学 Quantum secret sharing method based on Bell state
CN106685659A (en) * 2017-04-01 2017-05-17 成都信息工程大学 Quantum secret sharing method capable of resisting intercept-resend attack, man-in-the-middle attack and entanglement attack
CN107070664A (en) * 2017-04-01 2017-08-18 成都信息工程大学 A kind of quantum authorization management method based on EPR pairs and entanglement transfer

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨璐: "基于量子隐形传态的量子保密通信方案", 《物理学报》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711932A (en) * 2018-12-18 2019-05-03 成都信息工程大学 A kind of multigroup e-commerce endorsement method based on quantum teleportation

Also Published As

Publication number Publication date
CN108512659B (en) 2020-10-27

Similar Documents

Publication Publication Date Title
CN108768641B (en) Quantum privacy comparison method and system based on GHZ state
CN110225016A (en) A kind of data hiding transmission method based on block chain network
US9577996B2 (en) Computer system and method for encrypted remote storage
CN106104562A (en) Safety of secret data stores and recovery system and method
CN101345753B (en) Resource-oriented trust appraisement method in P2P network
Elishar et al. Organizational intrusion: Organization mining using socialbots
CN110445609A (en) A kind of quantum secret sharing method and shared system based on quantum walking
CN109257108A (en) A kind of multiplicate controlling quantum communications protocol implementing method and system
CN108365955A (en) A kind of device-independent high channel capacity quantum communication system and method
Liu et al. Same initial states attack in Yang et al.’s quantum private comparison protocol and the improvement
Yadav et al. Enhancing data security in cloud using blockchain
CN108512659A (en) A kind of quantum secret information sharing method and system suitable for company property management
CN108206738A (en) A kind of quantum key output method and system
CN114363013A (en) Supervision-friendly block chain content privacy protection system, message sending method and query method
CN108173656A (en) Half resource-constrained quantum secret sharing method of quantum
Hou et al. Single-photon-based quantum secure protocol for the socialist millionaires’ problem
CN110247768A (en) Certificable semi-quantum secret sharing method and system based on GHZ state
CN116842557A (en) Image supervision platform and method based on privacy intersection and blockchain
CN109167663A (en) A kind of multi-user quantum cryptographic key distribution method and system based on dense coding
CN110247763A (en) A kind of quantum secure querying method for resisting combined measurement attack
Ahmadizadeh et al. An automated model to detect fake profiles and botnets in online social networks using steganography technique
Murali et al. Comparison of cryptographic algorithms in cloud and local environment using quantum cryptography
JP2002544690A (en) Systems, devices and methods for secure communication and access control
Zhiyong et al. Entropy based taxonomy of network convert channels
CN104113523B (en) Polymerizer and the method for aggregated data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230921

Address after: No.5 Jiutiao, Tiedong Street, Tiejianying Village, Houshayu District, Shunyi District, Beijing, 101300

Patentee after: Top Technology (Beijing) Co.,Ltd.

Address before: 230000 Anhui Hefei high tech Zone Innovation Industrial Park two phase J2 District C block 18 floor.

Patentee before: HEFEI LONGTUTEM INFORMATION TECHNOLOGY Co.,Ltd.

Effective date of registration: 20230921

Address after: 230000 Anhui Hefei high tech Zone Innovation Industrial Park two phase J2 District C block 18 floor.

Patentee after: HEFEI LONGTUTEM INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 610225, No. 24, Section 1, Xuefu Road, Southwest Economic Development Zone, Chengdu, Sichuan

Patentee before: CHENGDU University OF INFORMATION TECHNOLOGY