A kind of quantum secret information sharing method and system suitable for company property management
Technical field
The invention belongs to technical field of data processing more particularly to a kind of quantum secret letters suitable for company property management
Cease sharing method and system.
Background technology
Currently, the prior art commonly used in the trade is such:
Under existing market economic condition, the administering of property of company is most important to the operation and development of company.If property
Mismanagement, enterprise may can be by loss difficult to the appraisal, therefore, enterprise is to sustainable development, it is necessary to have rational wealth
Produce the method for resource-sharing management.The manager of some major companies abuses company property in order to avoid individual, and huge property is added
It is close to be placed on bank, key is then distributed to multiple believable office workers, only multiple office workers cooperate, and can just recover huge
The key of property obtains the money.
In conclusion problem of the existing technology is:
(1) previous secret information secret sharing majority all defines the number of succedaneum, has ignored multi-user's secret letter
Breath is shared.In order to adapt to changeable external environment, the number of succedaneum may change at any time, and previous scheme can not just fit
With.
(2) with the research of quantum secret sharing agreement, many people propose the quantum secret sharing side based on GHZ states
Case, but it is still relatively difficult to the preparation and measurement of GHZ states at present.
(3) without sufficient safety analysis in many secret information secret sharings, external attacker may attempt to obtain
Effective information, dishonest participant can provide deceptive information in the implementation procedure of scheme and cheat.
Solve the difficulty and meaning of above-mentioned technical problem:
The present invention devises a kind of (3,3) quantum secret sharing scheme based on Bell state, by analysis it is found that can be to prevent
It is only external to eavesdrop and internal attack, it is ensured that the safety of secret information is shared, and can expand to more multi-player.
Invention content
In view of the problems of the existing technology, the present invention provides a kind of quantum secret letters suitable for company property management
Cease sharing method and system.
The invention is realized in this way a kind of quantum secret information sharing method suitable for company property management, described
Quantum secret information sharing method suitable for company property management includes:
Particle is tangled all to be prepared by manager;When carrying out eavesdropping detection, manager merges the first user, the second use
Measurement result disclosed in family, third user is compared with the local operations coding information of oneself, if it is inconsistent, stopping agreement behaviour
Make;
Expression formula is as follows:
Further, manager carries out in local operations coding information, including:
Define four Bell states
It is rightBeta particle carry out following four local operations:
These four local operations are encoded:
σ00→"00"、σ01→"01"、σ10→"10"、σ11→"11"。
Further, it is assumed that AB, CD, EF tri- are to tangling particle pair for sender of the message's preparation, all in | Ψ->State is right | Ψ-
>ABThe beta particle of state obtains after carrying out a certain behaviour in four kinds of local operations | Ψ->、|Φ->、|Φ+>、|Ψ+>A certain state;
Random detection particle is inserted into later to be distributed the new particle that tangles;
Specifically distribute and includes:
After particle distribution, the first user, second user, third user receive particle (A, F), (B, C), (D, E) respectively,
Then each personal Bell bases measure the particle in oneself hand, merge the measurement result of three, it is known that sender of the message do which
Kind local operations, and then obtain sender of the message's key message to be transmitted.
Further, the quantum secret information sharing method suitable for company property management, including:
1) it initializes
The first step:Manager prepares 3N to being in Ψ->State tangles particle pair, is denoted as: Referred to as S1;
Second step:Manager by key information be converted into binary bits string M (1), M (2) ... M (N) }, wherein
EachCorresponding 2 bits, right according to the coding rule of local operations | Ψ->ABThe beta particle of state implements four kinds of local operations
In a kind of operation, formed and new tangle particle string, referred to as S2;Radom insertion 3Q is to being in S2 | Ψ->The particle of state is made
To detect particle, referred to as S3, wherein the position being inserted into only has manager to know.
2) distribution of particle
Particle (A, F) is sent to the first user by manager, and particle (B, C) is sent to second user, by particle (D, E)
It is sent to third user;
3) channel safety detects
After manager confirms that the first user, second user, third user three receive particle, the position of detection particle is announced
It sets, the first user, second user, third user three will extract for the particle of detection and use Bell bases to measure certainly respectively
Then particle in own hand announces the measurement result of oneself simultaneously;
Manager merges the measurement result of three, if the first user, second user, the measurement result of third user announcement
Measurement result is consistent when being encoded to " 00 " with local operations, illustrates that channel is safe, otherwise there may be eavesdroppings;
4), the merging of message
After acknowledgement channel safety, if the first user, second user, third user want using the property for being stored in bank,
The N respectively possessed measures particle Bell bases respectively;If the first user, second user, third user are legal possess
The people for the key that manager sends obtains that office that manager does beta particle by merging the Bell base measurement results of three
Domain operates, and then obtains the asset keys for being stored in bank.
Another object of the present invention is to provide the quantum secret informations for being suitable for company property management described in a kind of realize
The computer program of sharing method.
Another object of the present invention is to provide the quantum secret informations for being suitable for company property management described in a kind of realize
The information data processing terminal of sharing method.
Another object of the present invention is to provide a kind of computer readable storage mediums, including instruction, when it is in computer
When upper operation so that computer executes the quantum secret information sharing method suitable for company property management.
Another object of the present invention is to provide a kind of quantum secret information shared systems suitable for company property management
Including:
Initialization unit prepares 3N to being in for manager | Ψ->State tangles particle pair, is denoted as:
Manager by key information be converted into binary bits string M (1), M (2) ... M (N) }, wherein eachCorresponding 2 bits, right according to the coding rule of local operations | Ψ->ABThe beta particle of state implements one in four kinds of local operations
Kind of operation forms and new tangles particle string;Radom insertion 3Q is to being in new particle string | Ψ->The particle of state is as detection
Particle, wherein the position being inserted into only has manager to know;
Particle (A, F) is sent to the first user for manager, particle (B, C) is sent to by the Dispatching Unit of particle
Particle (D, E) is sent to third user by second user;
Safety detection unit, it is public after manager confirms that the first user, second user, third user three receive particle
Cloth detects the position of particle, and the first user, second user, third user three will extract and distinguish for the particle of detection
The particle in oneself hand is measured with Bell bases, then announces the measurement result of oneself simultaneously;Manager merges the measurement knot of three
Fruit, if measurement result when the first user, second user, the measurement result of third user announcement and local operations are encoded to " 00 "
Unanimously, illustrate that channel is safe, otherwise there may be eavesdroppings;
The combining unit of message, if wanting using the wealth for being stored in bank for the first user, second user, third user
Production respectively measures particle Bell bases the N respectively possessed;If the first user, second user, third user are legal gather around
There is the people of the key of manager's transmission to obtain the local that manager does beta particle by merging the Bell base measurement results of three
Operation, and then obtain the key for the huge property for being stored in bank.
Another object of the present invention is to provide a kind of equipped with the quantum secret letter suitable for company property management
Cease the information data processing terminal of shared system.
In conclusion advantages of the present invention and good effect are:
It tangles particle all to be prepared by manager, rather than is prepared respectively by the first user, second user, third user.
If tangling particle to be prepared by the first user, second user, third user, tricker may not prepare and be in as requested | Ψ-
>The particle of state, and select to prepare other Bell states, the result that such entanglement transfer measurement obtains will be mistake.It tangles
Particle is all prepared by manager and improves safety.Carry out eavesdropping detection when, manager merge three measurement result with
The local operations coding information comparison of oneself, if it is inconsistent, transmitting bank's refusal opens huge property.
When channel is dangerous, it is understood that there may be external attack.For example attacker Eve wants intercepting and capturing manager and is sent to first
User, second user and third user particle, it is desirable to secret result is obtained by intercepting and capturing/multi-sending attack.Assuming that Eve is intercepted and captured
Manager is sent to the particle C of second user and measures, it will destroys the Entanglement of original CD particles;If Eve is cut
Particle C is obtained without measuring, but sends new particle to second user, can equally be found in the detection.
Manager's radom insertion some particles when carrying out particle distribution are detected for eavesdropping, and listener-in is into row information
The particle which is for detection is not aware that when eavesdropping, randomly select code segment for eavesdrop detect can ensure to disappear
The safety of breath.If finding the first user, second user, measurement result and manager disclosed in third user in detection process
The local operations coding information done is inconsistent, illustrates there may be attack, and manager transmitting bank refuses anyone opening and deposits
The property put.Therefore, which can effectively resist external attack.
The present invention can be resisted effectively and be internaled attack.If second user is tricker, second user interception is sent to the
The particle D of three users abandons particle C and particle D, then prepares a pair of new stateThis Entangled State
Particle is C* and D*, and D* is sent to third user, and third user is not aware that is oneself received is the particle of mistake, needs the
The just common Bell bases of third user measure the particle in oneself hand when one user, second user, third user announce measurement result
And announce measurement result.The expression formula of this process is as follows:
With formula
Compare and understand that the result that the first user, second user, third user have eighth possibility to announce is | Ψ+>AF|
Φ->BC|Ψ+>DE、|Ψ+>AF|Ψ->BC|Φ+>DE, if there is 6 pairs of particles, then the possibility for obtaining correct result isIt is almost nil.Therefore second user is wanted to obtain secret information in this way to be irrealizable.Even if second
The particle that user's interception is sent to third user can not also deduce final encrypted message.
The present invention can prevent external eavesdropping and internal attack, it is ensured that the safety of secret information is shared, if it is desired to expand
Open up more participants, it is only necessary to which prepared by sender corresponding number of tangles particle.
Compared with previous secret information is shared, the privacy sharing side proposed by the present invention applied in business property management
Key is distributed to believable office worker by case, and can increase or decrease participant, and previous scheme is mostly used GHZ states and prepares and survey
Amount, but the preparation and measurement of GHZ states is relatively difficult at present, the present invention uses the secret sharing scheme based on Bel states.
Description of the drawings
Fig. 1 be present example provide tangle particle distribution procedure figure.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with example, to the present invention into
Row is further described.It should be appreciated that specific implementation described herein is only used to explain the present invention, it is not used to limit
The present invention.
Previous secret information secret sharing majority all defines the number of succedaneum, and it is total to have ignored multi-user's secret information
It enjoys.In order to adapt to changeable external environment, the number of succedaneum may change at any time, and previous scheme can not be just applicable in.
With the research of quantum secret sharing agreement, many people propose the quantum secret sharing scheme based on GHZ states, but
It is still relatively difficult to the preparation and measurement of GHZ states at present.
Without sufficient safety analysis in many secret information secret sharings, external attacker may attempt to obtain effective
Information, dishonest participant can provide deceptive information in the implementation procedure of scheme and cheat.
The quantum secret information sharing method suitable for company property management that present example provides,
Define four Bell states
It is rightBeta particle carry out following four local operations:
These four local operations are encoded:
σ00→"00"、σ01→"01"、σ10→"10"、σ11→"11"。
Assuming that sender of the message prepares AB, CD, EF tri- to tangling particle pair, all in | Ψ->State is right | Ψ->ABThe B of state
Particle can obtain after carrying out a certain behaviour in four kinds of local operations | Ψ->、|Φ->、|Φ+>、|Ψ+>A certain state;Then
Particle will be tangled to be distributed.
Specific distribution procedure is as shown in Figure 1.
In fig. 1, it is assumed that after particle distribution, the first user, second user, third user receive respectively particle (A, F),
(B, C), (D, E), then each personal Bell bases measure the particle in oneself hand, their measurement result is compared, it is known that disappearing
Any local operations that breath sender does, and then obtain sender of the message's key message to be transmitted.
Such as:AB, CD, EF tri- are to tangling particle pair for sender of the message's preparation, all in | Ψ->State, then sender is to B
Particle is encoded to the local operations of " 01 ", i.e. σ01|Ψ->AB=| Φ->AB, the then distribution of progress particle, the first user,
Second user, third user measure particle (A, F), (B, C), (D, E) in oneself hand, the table of this process with Bell bases respectively
It is as follows up to formula:
Assuming that the measurement result of the first user is | Ψ+>AF, the measurement result of second user is | Φ+>BC, third user's
Measurement result is | Ψ->DE, " 01 " operation has been carried out according to 1 sender of the message of table.
The quantum secret information sharing method suitable for company property management that present example provides, including:
It tangles particle all to be prepared by manager, rather than is prepared respectively by the first user, second user, third user.
If tangling particle to be prepared by the first user, second user, third user, tricker may not be prepared into as requested | Ψ->
The particle of state, and select to prepare other Bell states, the result that such entanglement transfer measurement obtains will be mistake.Tangle grain
Son is all prepared by manager and improves safety.Carry out eavesdropping detection when, manager merge three measurement result with from
Oneself local operations coding information comparison, if it is inconsistent, transmitting bank's refusal opens huge property.
When channel is dangerous, it is understood that there may be external attack.For example attacker Eve wants intercepting and capturing manager and is sent to first
User, second user and third user particle, it is desirable to secret result is obtained by intercepting and capturing/multi-sending attack.Assuming that Eve is intercepted and captured
Manager is sent to the particle C of second user and measures, it will destroys the Entanglement of original CD particles;If Eve is cut
Particle C is obtained without measuring, but sends new particle to second user, can equally be found in the detection.
Manager randomly selected when carrying out particle distribution some particles for eavesdrop detection, and listener-in is into row information
The particle which is for detection is not aware that when eavesdropping, randomly select code segment for eavesdrop detect can ensure to disappear
The safety of breath.If finding the first user, second user, measurement result and manager disclosed in third user in detection process
The local operations coding information done is inconsistent, illustrates there may be attack, and manager transmitting bank refuses anyone opening and deposits
The property put.Therefore, which can effectively resist external attack.
The present invention can be resisted effectively and be internaled attack.If second user is tricker, second user interception is sent to the
The particle D of three users abandons particle C and particle D, then prepares a pair of new stateThis Entangled State
Particle is C* and D*, and D* is sent to third user, and third user is not aware that is oneself received is the particle of mistake, needs the
When one user, second user, third user announce measurement result
The just common Bell bases of third user measure the particle in oneself hand and announce measurement result.The expression formula of this process
It is as follows:
With formula
Compare and understand that the result that the first user, second user, third user have eighth possibility to announce is | Ψ+>AF|
Φ->BC|Ψ+>DE、|Ψ+>AF|Ψ->BC|Φ+>DE, if there is 6 pairs of particles, then the possibility for obtaining correct result is
It is almost nil.Therefore second user is wanted to obtain secret information in this way to be irrealizable.Even if second user is cut
Take the particle for being sent to third user that can not also deduce final encrypted message.
The quantum secret information shared system suitable for company property management that present example provides, including:
Initialization unit prepares 3N to being in Ψ-for manager>State tangles particle pair, is denoted as:
Manager by key information be converted into binary bits string M (1), M (2) ... M (N) }, wherein eachCorresponding 2 bits, right according to the coding rule of local operations | Ψ->ABThe beta particle of state implements one in four kinds of local operations
Kind of operation forms and new tangles particle string;Radom insertion 3Q is to being in new particle string | Ψ->The particle of state is as detection
Particle, wherein the position being inserted into only has manager to know;
Particle (A, F) is sent to the first user for manager, particle (B, C) is sent to by the Dispatching Unit of particle
Particle (D, E) is sent to third user by second user;
Safety detection unit, it is public after manager confirms that the first user, second user, third user three receive particle
Cloth detects the position of particle, and the first user, second user, third user three will extract and distinguish for the particle of detection
The particle in oneself hand is measured with Bell bases, then announces the measurement result of oneself simultaneously;Manager merges the measurement knot of three
Fruit, if measurement result when the first user, second user, the measurement result of third user announcement and local operations are encoded to " 00 "
Unanimously, illustrate that channel is safe, otherwise there may be eavesdroppings;
The combining unit of message, if wanting using the wealth for being stored in bank for the first user, second user, third user
Production respectively measures particle Bell bases the N respectively possessed;If the first user, second user, third user are legal gather around
There is the people of the key of manager's transmission to obtain the local that manager does beta particle by merging the Bell base measurement results of three
Operation, and then obtain the key for the huge property for being stored in bank.
With reference to specific embodiment, the invention will be further described.
The quantum secret information sharing method suitable for company property management that present example provides, including:
1) it initializes
The first step:Manager prepares 3N to being in | Ψ->State tangles particle pair, is denoted as: Referred to as S1;
Second step:Manager by key information be converted into binary bits string M (1), M (2) ... M (N) }, wherein
EachCorresponding 2 bits, right according to the coding rule of local operations | Ψ->ABThe beta particle of state implements four kinds of local operations
In a kind of operation, formed and new tangle particle string, referred to as S2;Radom insertion 3Q is to being in S2 | Ψ->The particle of state is made
To detect particle, referred to as S3, wherein the position being inserted into only has manager to know.
2) distribution of particle
Particle (A, F) is sent to the first user by manager, and particle (B, C) is sent to second user, by particle (D, E)
It is sent to third user;
3) channel safety detects
After manager confirms that the first user, second user, third user three receive particle, the position of detection particle is announced
It sets, the first user, second user, third user three will extract for the particle of detection and use Bell bases to measure certainly respectively
Then particle in own hand announces the measurement result of oneself simultaneously;
Manager merges the measurement result of three, if the first user, second user, the measurement result of third user announcement
Measurement result is consistent when being encoded to " 00 " with local operations, illustrates that channel is safe, otherwise there may be eavesdroppings;
4), the merging of message
After acknowledgement channel safety, if the first user, second user, third user want using the property for being stored in bank,
The N respectively possessed measures particle Bell bases respectively;If the first user, second user, third user are legal possess
The people for the key that manager sends obtains that office that manager does beta particle by merging the Bell base measurement results of three
Domain operates, and then obtains the asset keys for being stored in bank.
The operation of 1 sender of the message of table and the first user, the correspondence of second user, third user's measurement result
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its arbitrary combination real
It is existing.When using entirely or partly realizing in the form of a computer program product, the computer program product include one or
Multiple computer instructions.When loading on computers or executing the computer program instructions, entirely or partly generate according to
Flow described in the embodiment of the present invention or function.The computer can be all-purpose computer, special purpose computer, computer network
Network or other programmable devices.The computer instruction can store in a computer-readable storage medium, or from one
Computer readable storage medium is transmitted to another computer readable storage medium, for example, the computer instruction can be from one
A web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)
Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center
Transmission).The computer read/write memory medium can be that any usable medium that computer can access either includes one
The data storage devices such as a or multiple usable mediums integrated server, data center.The usable medium can be magnetic Jie
Matter, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state disk Solid
State Disk (SSD)) etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.