CN108833353A - The quantum Byzantium Agreement Methods participated in based on tripartite - Google Patents
The quantum Byzantium Agreement Methods participated in based on tripartite Download PDFInfo
- Publication number
- CN108833353A CN108833353A CN201810481043.4A CN201810481043A CN108833353A CN 108833353 A CN108833353 A CN 108833353A CN 201810481043 A CN201810481043 A CN 201810481043A CN 108833353 A CN108833353 A CN 108833353A
- Authority
- CN
- China
- Prior art keywords
- recipient
- byzantium
- agreement
- mode
- quantum
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1475—Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Optical Communication System (AREA)
Abstract
The invention discloses a kind of quantum Byzantium Agreement Methods participated in based on tripartite, the distribution including tangling resource;Continuous variable quantum state information is sent to recipient A and B by broadcaster C;The signal message respectively received is sent to other side respectively by recipient A and B;Byzantium's agreement is judged;If Byzantium's agreement failure, the raw correlations of recipient A and B judgement between the two, therefore, it is determined that the identity of traitor.The present invention provides Byzantium's agreement using continuous variable quantum figure state, and solution is necessary tangles source, therefore the method for the present invention has the characteristics that high detection efficiency, high-repetition-rate and laboratory are easily realized, and it is highly-safe, it can also explain and present by intuitive legend.
Description
Technical field
The invention belongs to quantum distribution formula calculating fields, and in particular to a kind of quantum Byzantium agreement participated in based on tripartite
Method.
Background technique
In recent years, extensive and complicated distributed system just quickly develops.In this case, guarantee high efficiency and
High reliability becomes a main theme.In trouble-free distributed computing field, an old information reason is always existed
By problem, i.e., famous Byzantium's agreement problem, it is a basic problem in distributed computing field.Nowadays it is in big data
Epoch, occur it is discontinuous it is external update in the case where, this variation and most of how reaching an agreement between each server or processor
The opinion being consistent eventually, so that it is guaranteed that the continuity and gracefulness of data, so that the technique study of this problem becomes more
It is urgent.Byzantium's agreement problem that so-called tripartite participates in can be described as follows (as shown in Figure 1):Tripartite includes general C, and
Two commanding officers A and B, general (are issued operation with data mode by determining to take action after observation and analysis enemy's situation
To commanding officer A and B), it can only contact and communicate by courier between commanding officer (A and B), meanwhile, in general and commanding officer at most
One people is traitor, and remaining people is then considered as loyal person, and the final result of Byzantium's agreement is:Commanding officer if (A and B) energy
Reach an action plan, if general (C) is agreement loyal, that general (C) and commanding officer (A and B) can reach an agreement, i.e.,
Byzantium reaches an agreement on successfully;If the agreement that general (C) and commanding officer (A and B) can not reach an agreement, assert has one in three people is
Traitor, Byzantium's agreement failure.
Currently, the quantum solution of Byzantium's agreement problem is widely studied.But current association of Byzantium
What most of the quantum solution for determining problem was all made of is the solution under discrete scene, and detection efficiency is low, and communication passes
It is defeated apart from relative close and discrete variable quantum state is not easy to realize laboratory preparation cost is high.
Summary of the invention
It visits and accounts for the purpose of the present invention is to provide the quantum of a kind of detection efficiency height, long transmission distance participated in based on tripartite
Front yard Agreement Methods.
This quantum Byzantium Agreement Methods participated in based on tripartite provided by the invention, are included the following steps:
S1. the distribution of resource is tangled;
S2. continuous variable quantum state information is sent to recipient A and B by broadcaster C;
S3. the signal respectively received is sent to other side respectively by recipient A and B;
S4. Byzantium's agreement is judged using following rule:
If the signal that recipient A or B judgement other side are sent to itself is consistent from broadcaster's C received signal with itself, and
Broadcaster (C) be it is loyal, then determine Byzantium agreement set up;
If recipient A or B determine that other side is sent to the signal of itself and itself is inconsistent from broadcaster's C received signal,
The certain failure of Byzantium's agreement at this time;
If S5. Byzantium's agreement failure, the raw correlations of recipient A and B judgement between the two, therefore, it is determined that traitor
Identity.
The described quantum Byzantium Agreement Methods participated in based on tripartite are received after the signal in all steps receives
Person needs to be distributed the integrity detection of Entangled State.
The distribution that resource is tangled described in step S1, is specially distributed using following steps:
(1) broadcaster C and recipient A and B share the continuous variable quantum of three modes as represented by following formula not
Weighted graph state:
WhereinFor the quadrature amplitude of i-th of mode, erIndicate that the fluctuating of respective component thereafter is amplified,For
The quadrature amplitude of i-th of mode vacuum state,For the quadrature phase component of i-th of mode, e-rIndicate corresponding thereafter point
Amount, which rises and falls, to be compressed,For the quadrature phase component of i-th of mode vacuum state, r is compressibility factor and value is just greater than 0
Number, e indicate index, and (0) indicates vacuum state, and i indicates a, b or c.;
(2) mode c is sent to broadcaster C, and mode a is sent to recipient A, and mode b is sent to recipient B.
The judgement raw correlations between the two of recipient A and B described in step S5 therefore, it is determined that traitor identity, specifically
To be determined using following steps:
1) the original figure state of tangling between A and B is continuously become using the two-mode that inverse Fourier transform obtains following form
Measure quantum not weighted graph state:
In formulaQuadrature amplitude after being acted on for Fourier transformation,For the orthorhombic phase after Fourier transformation effect
Position component, j indicate a or b;
2) the mode a that step 1) obtains is sent to recipient A, the mode b that step 1) obtains is sent to recipient B;
3) recipient A or B executes local rotation transformation to the mode of oneself, obtains new quadrature component pair, and notice pair
Side;
4) other side receives new quadrature component to rear, executes equivalent corresponding operation to the mode of oneself, and tested
Card:
If being verified, assert that the tangling property between recipient A and B has not been changed, determines that recipient A and B are loyal, hair
The person of sending C is traitor;
If verifying does not pass through, assert has one between recipient A and B be traitor, and another one and sender C are loyalty
's.
The whether equal operation of agreement information is judged involved in above-mentioned steps, specially using the beam splitter of balance
Judged.
This quantum Byzantium Agreement Methods participated in based on tripartite provided by the invention, using continuous variable quantum figure state
Providing Byzantium's agreement, solution is necessary tangles source, compared to discrete variable quantum state, the quantum based on continuous variable
State experimentally have the characteristics that easily obtain, easily preparation, easily measurement and it is easy to handle, so design scheme have high detection effect
The characteristics of rate, high-repetition-rate and laboratory are easily realized;Secondly as quantum uncertainty principle and quantum non-clone principle, extensively
Broadcast information to continuous variable quantum entanglement figure state be it is relevant, it has the theoretic Unconditional security of quantum cryptography, therefore
This feature ensures the impossibilities that the passive attack of external attacker is such as forged;Finally, due to continuous variable quantum figure
State can be stated with the non-directed graph in mathematics, and Byzantium's agreement problem can be explained and be presented by intuitive legend.
Detailed description of the invention
Fig. 1 is the schematic diagram for Byzantium's agreement problem that the tripartite in the present invention participates in.
Fig. 2 is the method flow diagram of the method for the present invention.
Fig. 3 is the schematic diagram judged using the beam splitter of balance of the method for the present invention.
Specific embodiment
It is illustrated in figure 2 the method flow diagram of the method for the present invention:This quantum participated in based on tripartite provided by the invention
Byzantium's Agreement Methods, specifically comprise the following steps:
As shown in Figure 1, three participant C (broadcaster), A and B (being recipient) share three mode continuous variable quantum
Not weighted graph state, broadcaster is by information | αc>It is sent to recipient A and B, the information that A and B are received is | αac>With | αbc>, then
The two recipients intercourse the information that the sender that they receive sends over, and are compared, and transmit under final confirmation
The accuracy and authenticity of breath:
Broadcaster C, recipient A and B share the continuous variable quantum not weighted graph state of three modes, are expressed as follows:
WhereinFor the quadrature amplitude of i-th of mode, erIndicate that respective component fluctuating thereafter is amplified,It is
The quadrature amplitude of i mode vacuum state,For the quadrature phase component of i-th of mode, e-rIndicate respective component thereafter
Fluctuating is compressed,For the quadrature phase component of i-th of mode vacuum state, r is compressibility factor and value is just greater than 0
Number, e indicate index, and (0) indicates vacuum state, and i indicates a, b or c;R → ∞ under ideal conditions, available following eigenstate
Equilibrium relationships This three mode does not weight
The adjacency matrix of quantum figure state is 3 × 3 symmetrical matrixes, is expressed as follows:
Wherein 1 indicate two between vertex or mode there are side, 0 indicate two between vertex or mode there is no side and not
Consider the relationship on vertex itself.This adjacency matrix can relevance between clearer displaying mode.Then mode c, a and b
It is sent separately to broadcaster C, recipient A and B;
Firstly, sender C sends continuous variable quantum state information | αc>Recipient A and B are given, this transmission can make an uproar in nothing
It is completed in the quantum channel of sound and the classical authenticated channel of auxiliary;The quantum state information that recipient A and B are received is used respectively |
αac>With | αbc>It indicates;Quantum state information | αc>The quadrature amplitude x and quadrature phase component p in the figure state of distribution can be used
It indicates;Further, since three participants share between quantum figure state it is special tangle, the illegal behaviour of any pair of broadcast message
Work will cause to disturb, and will be found by honest participant;
After recipient A and B receive quantum state information, need to be distributed the integrity detection of Entangled State, purpose
It is to guarantee that degree of entanglement remains unchanged, and destroys it without malicious operation and tangle;In the specific implementation, the letter in all steps
Number receive after, recipient must be distributed the integrity detection of Entangled State;
Then, the signal respectively received is sent to other side, i.e. recipient X transmission of signal information respectively by recipient A and B |
αXY>(X ≠ Y=a, b) gives another recipient Y, it is therefore an objective to which recipient X tells the information that oneself is received from broadcaster C
Give recipient Y;
In Byzantium's agreement problem that tripartite participates in, at most having a participant is traitor:If broadcaster is traitor,
Broadcaster may send different information to recipient;If one of recipient is traitor, broadcaster can send identical information
To two recipients, loyal recipient is sent to traitor recipient for the information that the broadcaster that receives is sent is intact,
And traitor recipient is then forwarded to loyal recipient after being then modified the information that the broadcaster received is sent;
Again, it carries out discussed below:
If broadcaster C is traitor, most probable strategy is exactly to transmit the different information with broadcast quantum state information to give
Two recipients A and B, for example, by change phase angle obtain-| αc>;So, two loyal recipient A and B are in order to confirm C
Identity, it is assumed that A and B exchange signal message | αab>With | αba>It is transmitted in a manner of certification, if judgement | αab>≠|αba>, then
Two recipients assert that broadcaster C is traitor;At this point, Byzantium's agreement failure;
If broadcaster C is loyal, therefore its information that will completely broadcast is sent to A and B;At this point, if | αab>=|
αba>, then broadcaster C, recipient A and B are loyalty, and Byzantium's agreement at this time is reached;
If broadcaster C is loyal, therefore its information that will completely broadcast is sent to A and B;At this point, if | αab>≠|
αba>, then assert has a people in recipient A and B be traitor, because there are following situations:Traitor recipient X, which has sent, is different from hair
The signal message for the protocol information that the person of sending C is sent gives another loyal recipient Y;It is assumed that loyalty recipient Y is recipient A, institute
With recipient A to the information received from C | αac>With the signal message for being sent to B | αab>It remains unchanged;Due to broadcaster C
To be loyal, for the raw correlations between recipient A and B, using an inverse Fourier transform:The two-mode continuous variable quantum of available following form not weighted graph state:
Equally, under ideal conditions, r → ∞, eigenstate equation areWithAbove formula
Mode a and mode b be sent respectively to recipient A and B, for recipient B in order to thoroughly believe the loyalty of A, B executes a local
Rotation transformationWithIn the mode b of oneself, it is assumed that local transformationIt is applied to mode b, just
Hand over component pairIt can be obtained, then B passes through being transformed to for classical authenticated channel notice A execution
After A receives the notice of B, equivalent operation is executedIn the mode a of oneself, obtain as a result just
Hand over component pairIt is then assumed that source is tangled in the offer of continuous variable quantum entanglement figure state, A and B can be sent respectively
Person and recipient, | αab>With | αba>It is transmitted by way of quantum teleportation.Then, A is calculated and positional eigenstate is
It is no to meet equationIf satisfied, then assert that the tangling property between A and B has not been changed, B, which is not carried out, some has enemy
The operation of meaning, then A assert that B is loyal, signal message of the reception from B | αba>, all three participants are to broadcast message
Reach an agreement;Otherwise, assert byzantine agreement failure.
During above-mentioned, signal message each time is received, and requires the integrity detection for being distributed Entangled State,
It detects whether to meet and realizes that the minimum of Agreement Methods requirement is tangled, its object is to detect whether the Entangled State of application is destroyed,
It includes two layers of meaning, one is degree of entanglement should remain unchanged;It is tangled the second is destroying it without malicious operation.
It is illustrated in figure 3 the schematic diagram judged using the beam splitter of balance of the method for the present invention:Quantum state letter
Breath | αab>With | αba>Meet equationWithWhereinWithBe respectively with
The relevant annihilations operator of electromagnetic field mode, they are input to the beam splitter of a balance, and the quantum state of generation isWithThe beam splitter relationship for wherein outputting and inputting creation operator can
To be described as:
In formulaFor the creation operator of incident mode a,For the creation operator of output mode a,For incident mode b
Creation operator,For the creation operator of output mode b;
Using upper relation of plane, available following formula:
As can be seen from the above equation, work as αab=αbaWhen, output port b is vacuum state, and therefore, photon detector can be answered
For detecting the photon number of port b.If b detects the photon of non-zero number, α in portabAnd αbaIt is unlikely to be
Equal;Otherwise, it may be considered that they are equal.
Communication between broadcaster C, recipient A and recipient B specifically can substantially be divided into following form and be communicated:
If needing to carry out the transmission or receiving of quantum state information between broadcaster C, recipient A and B, will lead between three
Cross the interaction that muting quantum channel carries out data;
If needing to carry out the hair of classical information (information in addition to quantum state information) between broadcaster C, recipient A and B
It send or receives, then can carry out the interaction of data between three by muting quantum channel, the warp of auxiliary can also be passed through
The interaction of allusion quotation authenticated channel (such as phone or short message etc.) progress data.
Claims (5)
1. a kind of quantum Byzantium Agreement Methods participated in based on tripartite, are included the following steps:
S1. the distribution of resource is tangled;
S2. continuous variable quantum state information is sent to recipient A and B by broadcaster C;
S3. the signal respectively received is sent to other side respectively by recipient A and B;
S4. Byzantium's agreement is judged using following rule:
If the signal that recipient A or B judgement other side are sent to itself is consistent from broadcaster's C received signal with itself, and broadcasts
Person (C) be it is loyal, then determine Byzantium agreement set up;
If recipient A or B determine that other side is sent to the signal of itself and itself is inconsistent from broadcaster's C received signal, at this time
Byzantium's agreement failure;
If S5. Byzantium's agreement failure, the raw correlations of recipient A and B judgement between the two, therefore, it is determined that the body of traitor
Part.
2. the quantum Byzantium Agreement Methods according to claim 1 participated in based on tripartite, it is characterised in that all steps
After signal in rapid receives, recipient must be distributed the integrity detection of Entangled State.
3. the quantum Byzantium Agreement Methods according to claim 1 or 2 participated in based on tripartite, it is characterised in that step S1
The distribution for tangling resource, is specially distributed using following steps:
(1) the continuous variable quantum that broadcaster C and recipient A and B share three modes as represented by following formula does not weight
Figure state:
WhereinFor the quadrature amplitude of i-th of mode, erIndicate that respective component fluctuating thereafter is amplified,For i-th of mould
The quadrature amplitude of formula vacuum state,For the quadrature phase component of i-th of mode, e-rIndicate the quilt of respective component fluctuating thereafter
Compression,The quadrature phase component of i-th of mode vacuum state, r is compressibility factor and value is the positive number greater than 0, and e expression refers to
Number, (0) indicate vacuum state, and i indicates a, b or c;
(2) mode c is sent to broadcaster C, and mode a is sent to recipient A, and mode b is sent to recipient B.
4. the quantum Byzantium Agreement Methods according to claim 3 participated in based on tripartite, it is characterised in that step S5 institute
Recipient A and B the judgement raw correlations between the two stated therefore, it is determined that traitor identity, specially using following steps into
Row determines:
1) the original figure state of tangling between A and B uses inverse Fourier transform to obtain the two-mode continuous variable amount of following form
Sub not weighted graph state:
In formulaQuadrature amplitude after being acted on for Fourier transformation,For the quadrature phase point after Fourier transformation effect
Amount, j indicate a or b;
2) the mode a that step 1) obtains is sent to recipient A, the mode b that step 1) obtains is sent to recipient B;
3) recipient A or B executes local rotation transformation in the mode of oneself, obtains quadrature component pair, and notify other side;
4) after other side receives notice, equivalent operation is executed in the mode of oneself, and verified:
If being verified, assert that the tangling property between recipient A and B has not been changed, determines that recipient A and B are loyal, sender
C is traitor;
If verifying does not pass through, assert has one between recipient A and B be traitor, and another one and sender C are loyal.
5. the quantum Byzantium Agreement Methods according to claim 4 participated in based on tripartite, it is characterised in that above-mentioned steps
Involved in the operation for judging whether agreement information equal, specially using balance beam splitter judged.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810481043.4A CN108833353B (en) | 2018-05-18 | 2018-05-18 | Quantum Byzantine agreement method based on three-party participation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810481043.4A CN108833353B (en) | 2018-05-18 | 2018-05-18 | Quantum Byzantine agreement method based on three-party participation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108833353A true CN108833353A (en) | 2018-11-16 |
CN108833353B CN108833353B (en) | 2020-10-30 |
Family
ID=64148091
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810481043.4A Expired - Fee Related CN108833353B (en) | 2018-05-18 | 2018-05-18 | Quantum Byzantine agreement method based on three-party participation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108833353B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110602077A (en) * | 2019-09-03 | 2019-12-20 | 成都信息工程大学 | Quantum block chain network anonymous election method and system based on trust evaluation |
CN111914378A (en) * | 2019-04-22 | 2020-11-10 | 合肥本源量子计算科技有限责任公司 | Single-amplitude quantum computation simulation method |
CN111931939A (en) * | 2019-05-13 | 2020-11-13 | 合肥本源量子计算科技有限责任公司 | Single-amplitude quantum computation simulation method |
CN112953955A (en) * | 2021-03-03 | 2021-06-11 | 南京航空航天大学 | Multi-party quantum Byzantine consensus optimization protocol |
CN113361717A (en) * | 2021-05-28 | 2021-09-07 | 北京百度网讯科技有限公司 | Training method and device of quantum state data processing model, electronic equipment and medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105187487A (en) * | 2015-07-31 | 2015-12-23 | 华南理工大学 | Copying state machine modular framework design method oriented to cloud storage |
US20160362522A1 (en) * | 2015-06-13 | 2016-12-15 | The Pen | True nanoscale one and two-dimensional organometals |
CN107423961A (en) * | 2017-07-11 | 2017-12-01 | 北京泛融科技有限公司 | A kind of optimization common recognition method based on random correlation analysis |
-
2018
- 2018-05-18 CN CN201810481043.4A patent/CN108833353B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160362522A1 (en) * | 2015-06-13 | 2016-12-15 | The Pen | True nanoscale one and two-dimensional organometals |
CN105187487A (en) * | 2015-07-31 | 2015-12-23 | 华南理工大学 | Copying state machine modular framework design method oriented to cloud storage |
CN107423961A (en) * | 2017-07-11 | 2017-12-01 | 北京泛融科技有限公司 | A kind of optimization common recognition method based on random correlation analysis |
Non-Patent Citations (2)
Title |
---|
CHIA-HUNG CHIEN等: "《Quantum circuit and byzantine generals problem》", 《2012 12TH IEEE-NANO THE INTERNATIONAL CONFERENCE CENTRE BIRMINGHAM》 * |
李哲奎: "《基于纠缠变换的三方量子安全直接通信》", 《延边大学学报》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111914378A (en) * | 2019-04-22 | 2020-11-10 | 合肥本源量子计算科技有限责任公司 | Single-amplitude quantum computation simulation method |
CN111914378B (en) * | 2019-04-22 | 2024-05-07 | 本源量子计算科技(合肥)股份有限公司 | Single-amplitude quantum computing simulation method and device |
CN111931939A (en) * | 2019-05-13 | 2020-11-13 | 合肥本源量子计算科技有限责任公司 | Single-amplitude quantum computation simulation method |
CN111931939B (en) * | 2019-05-13 | 2024-02-09 | 本源量子计算科技(合肥)股份有限公司 | Single-amplitude quantum computing simulation method |
CN110602077A (en) * | 2019-09-03 | 2019-12-20 | 成都信息工程大学 | Quantum block chain network anonymous election method and system based on trust evaluation |
CN112953955A (en) * | 2021-03-03 | 2021-06-11 | 南京航空航天大学 | Multi-party quantum Byzantine consensus optimization protocol |
CN113361717A (en) * | 2021-05-28 | 2021-09-07 | 北京百度网讯科技有限公司 | Training method and device of quantum state data processing model, electronic equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN108833353B (en) | 2020-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108833353A (en) | The quantum Byzantium Agreement Methods participated in based on tripartite | |
Guan et al. | Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach | |
JP6234607B2 (en) | Method and apparatus for verifying processed data | |
EP3616356B1 (en) | Preventing misrepresentation of input data by participants in a secure multi-party computation | |
CN110213059A (en) | A kind of generation method of random number, generating means and storage medium | |
CN106682825A (en) | System and method for evaluating credit of Social Internet of Things based on block chain | |
US20200136797A1 (en) | Secured computing | |
Kourtellis et al. | Prometheus: User-controlled p2p social data management for socially-aware applications | |
CN106161415B (en) | A kind of information processing method and mobile gunz perception application platform | |
Yuan et al. | Research on a new signature scheme on blockchain | |
DE112016007301T5 (en) | TECHNOLOGIES FOR AUTHENTICATING MULTIPLE DEVICES IN A HETEROGENIC NETWORK | |
CN115795518B (en) | Block chain-based federal learning privacy protection method | |
Zhu et al. | Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain | |
CN112261137A (en) | Model training method and system based on joint learning | |
Thapa et al. | SPA: A secure and private auction framework for decentralized online social networks | |
Deuber et al. | Sok: Assumptions underlying cryptocurrency deanonymizations | |
Wang et al. | A hybrid blockchain-based identity authentication scheme for Mobile Crowd Sensing | |
Babu et al. | Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks | |
Shi et al. | Anonymous quantum voting protocol based on Chinese remainder theorem | |
JP6526299B1 (en) | INFORMATION PROCESSING METHOD, INFORMATION PROCESSING DEVICE, AND PROGRAM | |
US11469905B2 (en) | Device and method for processing public key of user in communication system that includes a plurality of nodes | |
CN117036005A (en) | Loan risk assessment method and device based on privacy intersection and electronic equipment | |
Xiang | Multipartite quantum cryptography based on the violation of Svetlichny’s inequality | |
TW202040967A (en) | Computer-implemented system and method for determining or verifying location | |
CN116342249A (en) | Loan risk assessment method and device based on blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201030 |