CN108833353A - The quantum Byzantium Agreement Methods participated in based on tripartite - Google Patents

The quantum Byzantium Agreement Methods participated in based on tripartite Download PDF

Info

Publication number
CN108833353A
CN108833353A CN201810481043.4A CN201810481043A CN108833353A CN 108833353 A CN108833353 A CN 108833353A CN 201810481043 A CN201810481043 A CN 201810481043A CN 108833353 A CN108833353 A CN 108833353A
Authority
CN
China
Prior art keywords
recipient
byzantium
agreement
mode
quantum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810481043.4A
Other languages
Chinese (zh)
Other versions
CN108833353B (en
Inventor
郭迎
冯艳艳
施荣华
石金晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN201810481043.4A priority Critical patent/CN108833353B/en
Publication of CN108833353A publication Critical patent/CN108833353A/en
Application granted granted Critical
Publication of CN108833353B publication Critical patent/CN108833353B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1475Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Optical Communication System (AREA)

Abstract

The invention discloses a kind of quantum Byzantium Agreement Methods participated in based on tripartite, the distribution including tangling resource;Continuous variable quantum state information is sent to recipient A and B by broadcaster C;The signal message respectively received is sent to other side respectively by recipient A and B;Byzantium's agreement is judged;If Byzantium's agreement failure, the raw correlations of recipient A and B judgement between the two, therefore, it is determined that the identity of traitor.The present invention provides Byzantium's agreement using continuous variable quantum figure state, and solution is necessary tangles source, therefore the method for the present invention has the characteristics that high detection efficiency, high-repetition-rate and laboratory are easily realized, and it is highly-safe, it can also explain and present by intuitive legend.

Description

The quantum Byzantium Agreement Methods participated in based on tripartite
Technical field
The invention belongs to quantum distribution formula calculating fields, and in particular to a kind of quantum Byzantium agreement participated in based on tripartite Method.
Background technique
In recent years, extensive and complicated distributed system just quickly develops.In this case, guarantee high efficiency and High reliability becomes a main theme.In trouble-free distributed computing field, an old information reason is always existed By problem, i.e., famous Byzantium's agreement problem, it is a basic problem in distributed computing field.Nowadays it is in big data Epoch, occur it is discontinuous it is external update in the case where, this variation and most of how reaching an agreement between each server or processor The opinion being consistent eventually, so that it is guaranteed that the continuity and gracefulness of data, so that the technique study of this problem becomes more It is urgent.Byzantium's agreement problem that so-called tripartite participates in can be described as follows (as shown in Figure 1):Tripartite includes general C, and Two commanding officers A and B, general (are issued operation with data mode by determining to take action after observation and analysis enemy's situation To commanding officer A and B), it can only contact and communicate by courier between commanding officer (A and B), meanwhile, in general and commanding officer at most One people is traitor, and remaining people is then considered as loyal person, and the final result of Byzantium's agreement is:Commanding officer if (A and B) energy Reach an action plan, if general (C) is agreement loyal, that general (C) and commanding officer (A and B) can reach an agreement, i.e., Byzantium reaches an agreement on successfully;If the agreement that general (C) and commanding officer (A and B) can not reach an agreement, assert has one in three people is Traitor, Byzantium's agreement failure.
Currently, the quantum solution of Byzantium's agreement problem is widely studied.But current association of Byzantium What most of the quantum solution for determining problem was all made of is the solution under discrete scene, and detection efficiency is low, and communication passes It is defeated apart from relative close and discrete variable quantum state is not easy to realize laboratory preparation cost is high.
Summary of the invention
It visits and accounts for the purpose of the present invention is to provide the quantum of a kind of detection efficiency height, long transmission distance participated in based on tripartite Front yard Agreement Methods.
This quantum Byzantium Agreement Methods participated in based on tripartite provided by the invention, are included the following steps:
S1. the distribution of resource is tangled;
S2. continuous variable quantum state information is sent to recipient A and B by broadcaster C;
S3. the signal respectively received is sent to other side respectively by recipient A and B;
S4. Byzantium's agreement is judged using following rule:
If the signal that recipient A or B judgement other side are sent to itself is consistent from broadcaster's C received signal with itself, and Broadcaster (C) be it is loyal, then determine Byzantium agreement set up;
If recipient A or B determine that other side is sent to the signal of itself and itself is inconsistent from broadcaster's C received signal, The certain failure of Byzantium's agreement at this time;
If S5. Byzantium's agreement failure, the raw correlations of recipient A and B judgement between the two, therefore, it is determined that traitor Identity.
The described quantum Byzantium Agreement Methods participated in based on tripartite are received after the signal in all steps receives Person needs to be distributed the integrity detection of Entangled State.
The distribution that resource is tangled described in step S1, is specially distributed using following steps:
(1) broadcaster C and recipient A and B share the continuous variable quantum of three modes as represented by following formula not Weighted graph state:
WhereinFor the quadrature amplitude of i-th of mode, erIndicate that the fluctuating of respective component thereafter is amplified,For The quadrature amplitude of i-th of mode vacuum state,For the quadrature phase component of i-th of mode, e-rIndicate corresponding thereafter point Amount, which rises and falls, to be compressed,For the quadrature phase component of i-th of mode vacuum state, r is compressibility factor and value is just greater than 0 Number, e indicate index, and (0) indicates vacuum state, and i indicates a, b or c.;
(2) mode c is sent to broadcaster C, and mode a is sent to recipient A, and mode b is sent to recipient B.
The judgement raw correlations between the two of recipient A and B described in step S5 therefore, it is determined that traitor identity, specifically To be determined using following steps:
1) the original figure state of tangling between A and B is continuously become using the two-mode that inverse Fourier transform obtains following form Measure quantum not weighted graph state:
In formulaQuadrature amplitude after being acted on for Fourier transformation,For the orthorhombic phase after Fourier transformation effect Position component, j indicate a or b;
2) the mode a that step 1) obtains is sent to recipient A, the mode b that step 1) obtains is sent to recipient B;
3) recipient A or B executes local rotation transformation to the mode of oneself, obtains new quadrature component pair, and notice pair Side;
4) other side receives new quadrature component to rear, executes equivalent corresponding operation to the mode of oneself, and tested Card:
If being verified, assert that the tangling property between recipient A and B has not been changed, determines that recipient A and B are loyal, hair The person of sending C is traitor;
If verifying does not pass through, assert has one between recipient A and B be traitor, and another one and sender C are loyalty 's.
The whether equal operation of agreement information is judged involved in above-mentioned steps, specially using the beam splitter of balance Judged.
This quantum Byzantium Agreement Methods participated in based on tripartite provided by the invention, using continuous variable quantum figure state Providing Byzantium's agreement, solution is necessary tangles source, compared to discrete variable quantum state, the quantum based on continuous variable State experimentally have the characteristics that easily obtain, easily preparation, easily measurement and it is easy to handle, so design scheme have high detection effect The characteristics of rate, high-repetition-rate and laboratory are easily realized;Secondly as quantum uncertainty principle and quantum non-clone principle, extensively Broadcast information to continuous variable quantum entanglement figure state be it is relevant, it has the theoretic Unconditional security of quantum cryptography, therefore This feature ensures the impossibilities that the passive attack of external attacker is such as forged;Finally, due to continuous variable quantum figure State can be stated with the non-directed graph in mathematics, and Byzantium's agreement problem can be explained and be presented by intuitive legend.
Detailed description of the invention
Fig. 1 is the schematic diagram for Byzantium's agreement problem that the tripartite in the present invention participates in.
Fig. 2 is the method flow diagram of the method for the present invention.
Fig. 3 is the schematic diagram judged using the beam splitter of balance of the method for the present invention.
Specific embodiment
It is illustrated in figure 2 the method flow diagram of the method for the present invention:This quantum participated in based on tripartite provided by the invention Byzantium's Agreement Methods, specifically comprise the following steps:
As shown in Figure 1, three participant C (broadcaster), A and B (being recipient) share three mode continuous variable quantum Not weighted graph state, broadcaster is by information | αc>It is sent to recipient A and B, the information that A and B are received is | αac>With | αbc>, then The two recipients intercourse the information that the sender that they receive sends over, and are compared, and transmit under final confirmation The accuracy and authenticity of breath:
Broadcaster C, recipient A and B share the continuous variable quantum not weighted graph state of three modes, are expressed as follows:
WhereinFor the quadrature amplitude of i-th of mode, erIndicate that respective component fluctuating thereafter is amplified,It is The quadrature amplitude of i mode vacuum state,For the quadrature phase component of i-th of mode, e-rIndicate respective component thereafter Fluctuating is compressed,For the quadrature phase component of i-th of mode vacuum state, r is compressibility factor and value is just greater than 0 Number, e indicate index, and (0) indicates vacuum state, and i indicates a, b or c;R → ∞ under ideal conditions, available following eigenstate Equilibrium relationships This three mode does not weight The adjacency matrix of quantum figure state is 3 × 3 symmetrical matrixes, is expressed as follows:
Wherein 1 indicate two between vertex or mode there are side, 0 indicate two between vertex or mode there is no side and not Consider the relationship on vertex itself.This adjacency matrix can relevance between clearer displaying mode.Then mode c, a and b It is sent separately to broadcaster C, recipient A and B;
Firstly, sender C sends continuous variable quantum state information | αc>Recipient A and B are given, this transmission can make an uproar in nothing It is completed in the quantum channel of sound and the classical authenticated channel of auxiliary;The quantum state information that recipient A and B are received is used respectively | αac>With | αbc>It indicates;Quantum state information | αc>The quadrature amplitude x and quadrature phase component p in the figure state of distribution can be used It indicates;Further, since three participants share between quantum figure state it is special tangle, the illegal behaviour of any pair of broadcast message Work will cause to disturb, and will be found by honest participant;
After recipient A and B receive quantum state information, need to be distributed the integrity detection of Entangled State, purpose It is to guarantee that degree of entanglement remains unchanged, and destroys it without malicious operation and tangle;In the specific implementation, the letter in all steps Number receive after, recipient must be distributed the integrity detection of Entangled State;
Then, the signal respectively received is sent to other side, i.e. recipient X transmission of signal information respectively by recipient A and B | αXY>(X ≠ Y=a, b) gives another recipient Y, it is therefore an objective to which recipient X tells the information that oneself is received from broadcaster C Give recipient Y;
In Byzantium's agreement problem that tripartite participates in, at most having a participant is traitor:If broadcaster is traitor, Broadcaster may send different information to recipient;If one of recipient is traitor, broadcaster can send identical information To two recipients, loyal recipient is sent to traitor recipient for the information that the broadcaster that receives is sent is intact, And traitor recipient is then forwarded to loyal recipient after being then modified the information that the broadcaster received is sent;
Again, it carries out discussed below:
If broadcaster C is traitor, most probable strategy is exactly to transmit the different information with broadcast quantum state information to give Two recipients A and B, for example, by change phase angle obtain-| αc>;So, two loyal recipient A and B are in order to confirm C Identity, it is assumed that A and B exchange signal message | αab>With | αba>It is transmitted in a manner of certification, if judgement | αab>≠|αba>, then Two recipients assert that broadcaster C is traitor;At this point, Byzantium's agreement failure;
If broadcaster C is loyal, therefore its information that will completely broadcast is sent to A and B;At this point, if | αab>=| αba>, then broadcaster C, recipient A and B are loyalty, and Byzantium's agreement at this time is reached;
If broadcaster C is loyal, therefore its information that will completely broadcast is sent to A and B;At this point, if | αab>≠| αba>, then assert has a people in recipient A and B be traitor, because there are following situations:Traitor recipient X, which has sent, is different from hair The signal message for the protocol information that the person of sending C is sent gives another loyal recipient Y;It is assumed that loyalty recipient Y is recipient A, institute With recipient A to the information received from C | αac>With the signal message for being sent to B | αab>It remains unchanged;Due to broadcaster C To be loyal, for the raw correlations between recipient A and B, using an inverse Fourier transform:The two-mode continuous variable quantum of available following form not weighted graph state:
Equally, under ideal conditions, r → ∞, eigenstate equation areWithAbove formula Mode a and mode b be sent respectively to recipient A and B, for recipient B in order to thoroughly believe the loyalty of A, B executes a local Rotation transformationWithIn the mode b of oneself, it is assumed that local transformationIt is applied to mode b, just Hand over component pairIt can be obtained, then B passes through being transformed to for classical authenticated channel notice A execution
After A receives the notice of B, equivalent operation is executedIn the mode a of oneself, obtain as a result just Hand over component pairIt is then assumed that source is tangled in the offer of continuous variable quantum entanglement figure state, A and B can be sent respectively Person and recipient, | αab>With | αba>It is transmitted by way of quantum teleportation.Then, A is calculated and positional eigenstate is It is no to meet equationIf satisfied, then assert that the tangling property between A and B has not been changed, B, which is not carried out, some has enemy The operation of meaning, then A assert that B is loyal, signal message of the reception from B | αba>, all three participants are to broadcast message Reach an agreement;Otherwise, assert byzantine agreement failure.
During above-mentioned, signal message each time is received, and requires the integrity detection for being distributed Entangled State, It detects whether to meet and realizes that the minimum of Agreement Methods requirement is tangled, its object is to detect whether the Entangled State of application is destroyed, It includes two layers of meaning, one is degree of entanglement should remain unchanged;It is tangled the second is destroying it without malicious operation.
It is illustrated in figure 3 the schematic diagram judged using the beam splitter of balance of the method for the present invention:Quantum state letter Breath | αab>With | αba>Meet equationWithWhereinWithBe respectively with The relevant annihilations operator of electromagnetic field mode, they are input to the beam splitter of a balance, and the quantum state of generation isWithThe beam splitter relationship for wherein outputting and inputting creation operator can To be described as:
In formulaFor the creation operator of incident mode a,For the creation operator of output mode a,For incident mode b Creation operator,For the creation operator of output mode b;
Using upper relation of plane, available following formula:
As can be seen from the above equation, work as αabbaWhen, output port b is vacuum state, and therefore, photon detector can be answered For detecting the photon number of port b.If b detects the photon of non-zero number, α in portabAnd αbaIt is unlikely to be Equal;Otherwise, it may be considered that they are equal.
Communication between broadcaster C, recipient A and recipient B specifically can substantially be divided into following form and be communicated:
If needing to carry out the transmission or receiving of quantum state information between broadcaster C, recipient A and B, will lead between three Cross the interaction that muting quantum channel carries out data;
If needing to carry out the hair of classical information (information in addition to quantum state information) between broadcaster C, recipient A and B It send or receives, then can carry out the interaction of data between three by muting quantum channel, the warp of auxiliary can also be passed through The interaction of allusion quotation authenticated channel (such as phone or short message etc.) progress data.

Claims (5)

1. a kind of quantum Byzantium Agreement Methods participated in based on tripartite, are included the following steps:
S1. the distribution of resource is tangled;
S2. continuous variable quantum state information is sent to recipient A and B by broadcaster C;
S3. the signal respectively received is sent to other side respectively by recipient A and B;
S4. Byzantium's agreement is judged using following rule:
If the signal that recipient A or B judgement other side are sent to itself is consistent from broadcaster's C received signal with itself, and broadcasts Person (C) be it is loyal, then determine Byzantium agreement set up;
If recipient A or B determine that other side is sent to the signal of itself and itself is inconsistent from broadcaster's C received signal, at this time Byzantium's agreement failure;
If S5. Byzantium's agreement failure, the raw correlations of recipient A and B judgement between the two, therefore, it is determined that the body of traitor Part.
2. the quantum Byzantium Agreement Methods according to claim 1 participated in based on tripartite, it is characterised in that all steps After signal in rapid receives, recipient must be distributed the integrity detection of Entangled State.
3. the quantum Byzantium Agreement Methods according to claim 1 or 2 participated in based on tripartite, it is characterised in that step S1 The distribution for tangling resource, is specially distributed using following steps:
(1) the continuous variable quantum that broadcaster C and recipient A and B share three modes as represented by following formula does not weight Figure state:
WhereinFor the quadrature amplitude of i-th of mode, erIndicate that respective component fluctuating thereafter is amplified,For i-th of mould The quadrature amplitude of formula vacuum state,For the quadrature phase component of i-th of mode, e-rIndicate the quilt of respective component fluctuating thereafter Compression,The quadrature phase component of i-th of mode vacuum state, r is compressibility factor and value is the positive number greater than 0, and e expression refers to Number, (0) indicate vacuum state, and i indicates a, b or c;
(2) mode c is sent to broadcaster C, and mode a is sent to recipient A, and mode b is sent to recipient B.
4. the quantum Byzantium Agreement Methods according to claim 3 participated in based on tripartite, it is characterised in that step S5 institute Recipient A and B the judgement raw correlations between the two stated therefore, it is determined that traitor identity, specially using following steps into Row determines:
1) the original figure state of tangling between A and B uses inverse Fourier transform to obtain the two-mode continuous variable amount of following form Sub not weighted graph state:
In formulaQuadrature amplitude after being acted on for Fourier transformation,For the quadrature phase point after Fourier transformation effect Amount, j indicate a or b;
2) the mode a that step 1) obtains is sent to recipient A, the mode b that step 1) obtains is sent to recipient B;
3) recipient A or B executes local rotation transformation in the mode of oneself, obtains quadrature component pair, and notify other side;
4) after other side receives notice, equivalent operation is executed in the mode of oneself, and verified:
If being verified, assert that the tangling property between recipient A and B has not been changed, determines that recipient A and B are loyal, sender C is traitor;
If verifying does not pass through, assert has one between recipient A and B be traitor, and another one and sender C are loyal.
5. the quantum Byzantium Agreement Methods according to claim 4 participated in based on tripartite, it is characterised in that above-mentioned steps Involved in the operation for judging whether agreement information equal, specially using balance beam splitter judged.
CN201810481043.4A 2018-05-18 2018-05-18 Quantum Byzantine agreement method based on three-party participation Expired - Fee Related CN108833353B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810481043.4A CN108833353B (en) 2018-05-18 2018-05-18 Quantum Byzantine agreement method based on three-party participation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810481043.4A CN108833353B (en) 2018-05-18 2018-05-18 Quantum Byzantine agreement method based on three-party participation

Publications (2)

Publication Number Publication Date
CN108833353A true CN108833353A (en) 2018-11-16
CN108833353B CN108833353B (en) 2020-10-30

Family

ID=64148091

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810481043.4A Expired - Fee Related CN108833353B (en) 2018-05-18 2018-05-18 Quantum Byzantine agreement method based on three-party participation

Country Status (1)

Country Link
CN (1) CN108833353B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602077A (en) * 2019-09-03 2019-12-20 成都信息工程大学 Quantum block chain network anonymous election method and system based on trust evaluation
CN111914378A (en) * 2019-04-22 2020-11-10 合肥本源量子计算科技有限责任公司 Single-amplitude quantum computation simulation method
CN111931939A (en) * 2019-05-13 2020-11-13 合肥本源量子计算科技有限责任公司 Single-amplitude quantum computation simulation method
CN112953955A (en) * 2021-03-03 2021-06-11 南京航空航天大学 Multi-party quantum Byzantine consensus optimization protocol
CN113361717A (en) * 2021-05-28 2021-09-07 北京百度网讯科技有限公司 Training method and device of quantum state data processing model, electronic equipment and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187487A (en) * 2015-07-31 2015-12-23 华南理工大学 Copying state machine modular framework design method oriented to cloud storage
US20160362522A1 (en) * 2015-06-13 2016-12-15 The Pen True nanoscale one and two-dimensional organometals
CN107423961A (en) * 2017-07-11 2017-12-01 北京泛融科技有限公司 A kind of optimization common recognition method based on random correlation analysis

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160362522A1 (en) * 2015-06-13 2016-12-15 The Pen True nanoscale one and two-dimensional organometals
CN105187487A (en) * 2015-07-31 2015-12-23 华南理工大学 Copying state machine modular framework design method oriented to cloud storage
CN107423961A (en) * 2017-07-11 2017-12-01 北京泛融科技有限公司 A kind of optimization common recognition method based on random correlation analysis

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHIA-HUNG CHIEN等: "《Quantum circuit and byzantine generals problem》", 《2012 12TH IEEE-NANO THE INTERNATIONAL CONFERENCE CENTRE BIRMINGHAM》 *
李哲奎: "《基于纠缠变换的三方量子安全直接通信》", 《延边大学学报》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111914378A (en) * 2019-04-22 2020-11-10 合肥本源量子计算科技有限责任公司 Single-amplitude quantum computation simulation method
CN111914378B (en) * 2019-04-22 2024-05-07 本源量子计算科技(合肥)股份有限公司 Single-amplitude quantum computing simulation method and device
CN111931939A (en) * 2019-05-13 2020-11-13 合肥本源量子计算科技有限责任公司 Single-amplitude quantum computation simulation method
CN111931939B (en) * 2019-05-13 2024-02-09 本源量子计算科技(合肥)股份有限公司 Single-amplitude quantum computing simulation method
CN110602077A (en) * 2019-09-03 2019-12-20 成都信息工程大学 Quantum block chain network anonymous election method and system based on trust evaluation
CN112953955A (en) * 2021-03-03 2021-06-11 南京航空航天大学 Multi-party quantum Byzantine consensus optimization protocol
CN113361717A (en) * 2021-05-28 2021-09-07 北京百度网讯科技有限公司 Training method and device of quantum state data processing model, electronic equipment and medium

Also Published As

Publication number Publication date
CN108833353B (en) 2020-10-30

Similar Documents

Publication Publication Date Title
CN108833353A (en) The quantum Byzantium Agreement Methods participated in based on tripartite
Guan et al. Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach
JP6234607B2 (en) Method and apparatus for verifying processed data
EP3616356B1 (en) Preventing misrepresentation of input data by participants in a secure multi-party computation
CN110213059A (en) A kind of generation method of random number, generating means and storage medium
CN106682825A (en) System and method for evaluating credit of Social Internet of Things based on block chain
US20200136797A1 (en) Secured computing
Kourtellis et al. Prometheus: User-controlled p2p social data management for socially-aware applications
CN106161415B (en) A kind of information processing method and mobile gunz perception application platform
Yuan et al. Research on a new signature scheme on blockchain
DE112016007301T5 (en) TECHNOLOGIES FOR AUTHENTICATING MULTIPLE DEVICES IN A HETEROGENIC NETWORK
CN115795518B (en) Block chain-based federal learning privacy protection method
Zhu et al. Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain
CN112261137A (en) Model training method and system based on joint learning
Thapa et al. SPA: A secure and private auction framework for decentralized online social networks
Deuber et al. Sok: Assumptions underlying cryptocurrency deanonymizations
Wang et al. A hybrid blockchain-based identity authentication scheme for Mobile Crowd Sensing
Babu et al. Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks
Shi et al. Anonymous quantum voting protocol based on Chinese remainder theorem
JP6526299B1 (en) INFORMATION PROCESSING METHOD, INFORMATION PROCESSING DEVICE, AND PROGRAM
US11469905B2 (en) Device and method for processing public key of user in communication system that includes a plurality of nodes
CN117036005A (en) Loan risk assessment method and device based on privacy intersection and electronic equipment
Xiang Multipartite quantum cryptography based on the violation of Svetlichny’s inequality
TW202040967A (en) Computer-implemented system and method for determining or verifying location
CN116342249A (en) Loan risk assessment method and device based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201030