CN109711932A - A kind of multigroup e-commerce endorsement method based on quantum teleportation - Google Patents

A kind of multigroup e-commerce endorsement method based on quantum teleportation Download PDF

Info

Publication number
CN109711932A
CN109711932A CN201811547503.5A CN201811547503A CN109711932A CN 109711932 A CN109711932 A CN 109711932A CN 201811547503 A CN201811547503 A CN 201811547503A CN 109711932 A CN109711932 A CN 109711932A
Authority
CN
China
Prior art keywords
particle
information
group
commerce
multigroup
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811547503.5A
Other languages
Chinese (zh)
Other versions
CN109711932B (en
Inventor
张仕斌
代金鞘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Jicun Technology Co.,Ltd.
Original Assignee
Chengdu University of Information Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu University of Information Technology filed Critical Chengdu University of Information Technology
Priority to CN201811547503.5A priority Critical patent/CN109711932B/en
Publication of CN109711932A publication Critical patent/CN109711932A/en
Application granted granted Critical
Publication of CN109711932B publication Critical patent/CN109711932B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to electronic commerce information processing method technical fields, a kind of multigroup e-commerce endorsement method and system based on quantum teleportation is disclosed, the multigroup e-commerce endorsement method based on quantum teleportation includes: that the application user of the first group sends procurement information to the second group;To application user procurement information be hidden application subscriber identity information blind processing after, be sent to the first group audit center;After first group audit center receives application user's purchase information, purchase signal auditing is carried out;After second group audit center receives information, whether correct the payment information sended over is compared.The present invention uses Bell state particle and single photon, these particles are compared to other a small bundle of straw, etc. for silkworms to spin cocoons on states and multiple particle state is all relatively easy to realization;The present invention is for general intercepting and capturing multi-sending attack and tangles attack all with certain attack tolerant, while having certain non repudiation and unforgeable.

Description

A kind of multigroup e-commerce endorsement method based on quantum teleportation
Technical field
The invention belongs to electronic commerce information processing method technical fields more particularly to a kind of based on quantum teleportation Multigroup e-commerce endorsement method.
Background technique
Currently, the prior art commonly used in the trade is such that
Since Diffie and Hellman propose first digit signature agreement, digital signature in classical cryptoraphy and Very crucial effect is played in many other application scenarios (such as data integrity protection, authentication and authorization).However, The safety of classical digital signature depends on some unverified computational complexities it is assumed that these assume facing quantum calculation When be insecure.
Due to the property of quantum state, quantum signature causes the interest of many people, also proposed many quantum label in recent years Name scheme.First quantum signature scheme was proposed that the program is based on one-way function by Gottesman and Chuang in 2001 Quantum signature scheme.Then in 2002, Zeng and Keitel first proposed a kind of arbitration quantum signature using GHZ state (AQS) agreement.The scheme that Zeng and Keitel is proposed also overcomes infeasible theorem of the Barnum et al. about quantum signature.And In 2008, Yang and Wen were proposed and are acted on behalf of quantum group signature scheme more one, realized Threshold Shared Verification.They also exist Propose within 2010 the group ranking based on quantum teleportation, and during the eavesdropping after being transmitted by Qi et al. to it there may be The loophole of internal attacker is analyzed and has been improved.In the group ranking of Yang and Wen, they refer to e-payment, electricity Sub- government affairs, the practical application of e-commerce etc..
Meanwhile Wen and Nie propose a kind of electronic fare payment system based on quantum group and Proxy Signature, using two thirds Square trusted party rather than one enhance the robustness of system.After from this, many researchers are from Internal Quantum Proxy Blind label Name arrives the online shopping mechanism based on quantum communications, all uses and improve this practical application scene.Finally, in 2017 Zhang et al. proposes a kind of Third Party Payment System agreement based on quantum Group-blind signature using four quantum bit Entangled States.
In conclusion problem of the existing technology is:
(1) from above-mentioned background it is known that being now based on the e-commerce group signature scheme of quantum theory system mostly all Multiple particle state is used, but in existing technology, the preparation and storage of multiple particle state are all very difficult, so this A little schemes are all difficult among actual conditions mostly.In addition, most e-commerce group signature scheme all only sets up one A administrator, but among actual production and commercial situation, there is different administrators in different departments, most of important Confidential information cannot be known that administrator just has the power to modify to these confidential information by other in-company employees And authorization, while the transmission of confidential information can only also carry out between administrator.So based on above technical deficiency, this hair It is bright to propose a kind of multigroup e-commerce signature scheme based on quantum teleportation.
(2) current quantum Proxy Signature or other special signatures blind coding form used by treatment process, mostly It is measured to after Bell state particle measurement using different measurement bases, 0 represents the measurement of Z base, and 1 represents the measurement of X base, according to survey Amount result 0,1 ,+,-be separately encoded as { 00,01,10,11 }.But such coding form has very maximum probability exposure former Beginning information, such as, it is assumed that attacker extracts the first half of encoded infonnation, i.e., 0 is taken in 01, then all to all encoded informations Take such operation, so that it may restore original information, there are great hidden danger for the safety of such coding mode.Institute With based on above technical deficiency, the present invention improves the process for blinding processing.
(3) most of quantum signature protocol at this stage all lacks the safety to agreement process itself and carries out detailed point Analysis, many agreements have carried out simply both for the non repudiation of agreement, non-repudiation, unforgeable and traceability Verbal description, lack the analytic process for some specific attack strategies.So based on above technical deficiency, the present invention Most common intercepting and capturing/the multi-sending attack of detailed analysis and attack is tangled in safety analysis.
Solve the difficulty and meaning of above-mentioned technical problem:
Since the preparation process of multiparticle Entangled State is complex, it is possible to be carried out using Bell state particle or single photon Substitution can save many preparation costs during actually preparation in this way and save cost.
Multigroup group of the present invention-more administrators model foundation is also more in line with actual production and commercial situation.
Many quantum signatures blind process all blindnesses using the processing method in the above problem, protected in the privacy of user There are great security risks for shield aspect, this blinds processing and also needs to improve.
Be also for the safety analysis generally attacked it is important, this analysis can embody out the program Attack tolerant.
Summary of the invention
In view of the problems of the existing technology, the multigroup e-commerce based on quantum teleportation that the present invention provides a kind of Endorsement method.
The invention is realized in this way a kind of multigroup e-commerce endorsement method based on quantum teleportation, the base Include: in the multigroup e-commerce endorsement method of quantum teleportation
The application user of first group sends procurement information to the second group;The procurement information of application user is hidden Application subscriber identity information blind processing after, be sent to the first group audit center;
After first group audit center receives application user's purchase information, purchase signal auditing is carried out;If verifying The purchase information is sent to the second group audit center of the second group by success together with payment information;
After second group audit center receives information, whether correct the payment information sended over is compared;If correct, Purchase information is then sent to the delivery user of the second group;
Delivery user confirms information after receiving information;If it is confirmed that being the application user purchase of the first group Information then executes delivery of goods instruction.
Further, in the first group and the transmission of the second group message, the key used is using quantum key distribution agreement, packet Include BB84 agreement;Quantum key distribution agreement is not only the transmission of single photon or Bel state particle, is to have a series of key point Hair process (such as most classic BB84 agreement, an exactly key distribution protocol) is by mature key distribution association here View is directly applied, and ensure that the unconditional safety of key distribution.
Blinding processing includes: that application user buys information by surveying to Bell state particle using different measurement bases Amount, then encodes.
Further, include: in the first group and the transmission of the second group message
Four kinds of Pauli doors:
By four kinds of Pauli gate actions in uncertain particle state | Ψ >T=(α | 0 >+β | 1 >)TOn, | Ψ >TAs a result such as Under:
σ00|Ψ>T=(α | 0 >+β | 1 >)T01|Ψ>T=(α | 1 >+β | 0 >)T
σ10|Ψ>T=(α | 0 >-β | 1 >)T11|Ψ>T=(α | 1 >-β | 0 >)T
To uncertain particle | Ψ >TPauli operation is carried out, application user is bought into application and is loaded by Pauli operation | Ψ >TOn particle;
The classical information that four kinds of different Pauli doors represent is respectively: 00 represents01 represents10 represent 11 represent
Further, quantum key distribution agreement further comprises:
Four kinds of Bell state particles are respectively:
First group audit center is right | and Ψ >TParticle and | φ+>12In 1 particle carry out Bell combined measurement, the knot of measurement State after fruit and 2 particles are collapsed is as follows:
By after Bell combined measurement, 2 particles can be collapsed to { (α | 0 >+β | 1 >) at random2、(α|0>-β|1>)2、(α| 1>+β|0>)2、(α|1>-β|0>)2One of four kinds of Bell state particle states;
Then, 2 particles are sent to the second group audit center by the first group audit center, and the second group audit center will 2 particles and | φ+>34In 3 particles carry out Bell combined measurement, measurement result is as follows:
After carrying out Bell combined measurement to 2,3 particles, 4 particles can be collapsed to { (α | 0 >+β | 1 >) at random4、(α|0>- β|1>)4、(α|1>+β|0>)4、(α|1>-β|0>)4One of four kinds of Bell state particle states.
Another object of the present invention is to provide the multigroup e-commerce label described in a kind of realize based on quantum teleportation The computer program of name method.
Another object of the present invention is to provide a kind of terminal, it is described based on Quantum Teleportation that the terminal at least carries realization Pass the processor of the multigroup e-commerce endorsement method of state.
Another object of the present invention is to provide a kind of computer readable storage mediums, including instruction, when it is in computer When upper operation, so that computer executes the multigroup e-commerce endorsement method based on quantum teleportation.
Another object of the present invention is to provide the multigroup e-commerce label described in a kind of realize based on quantum teleportation The multigroup e-commerce signature network service platform based on quantum teleportation of name method.
In conclusion advantages of the present invention and good effect are as follows:
In the present invention, it is assumed that by Liang Ge group: company 1 and company 2, each company have oneself Finance Department T1 and T2, each employee require to submit purchase application to Finance Department if necessary to buying raw material.It is more accorded in the foundation of model Close practical application scene.
Meanwhile key used in message transmitting procedure uses quantum key distribution agreement, this ensure that entirely Unconditional security in protocol message transmission process.Secondly, the purchase information comprising individual privacy can be carried out first using key Then exclusive or processing, is then encoded by being measured to Bell state particle using different measurement bases, so that after coding, Original purchase information will not be known by the potential attacker of other employees and outside, ensure that buyer's privacy information Safety.In addition, the transmission process of message uses Bell state particle and single photon, these particles are compared to other a small bundle of straw, etc. for silkworms to spin cocoons ons State and multiple particle state are all relatively easy to realization.Finally, illustrating this programme for general intercepting and capturing by safety analysis It multi-sending attack and tangles attack all there is certain attack tolerant, while there is certain non repudiation and unforgeable.
Detailed description of the invention
Fig. 1 is the multigroup e-commerce endorsement method flow chart provided in an embodiment of the present invention based on quantum teleportation.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to Limit the present invention.
The e-commerce group signature scheme for being now based on quantum theory system all uses multiple particle state mostly, but It is existing technically, the preparation of multiple particle state and storage be all it is very difficult, so these schemes be all difficult with mostly in Among actual conditions.In addition, most e-commerce group signature scheme all only sets up an administrator, but in actual life It produces among commercial situation, there is different administrators in different departments, and most of important confidential information are cannot be by company What other employees in portion knew, administrator just has the power that these confidential information are modified and authorized, while confidential information Transmission can only also carry out between administrator.So it is hidden based on quantum that the invention proposes one kind based on above technical deficiency The multigroup e-commerce signature scheme of shape biography state.
Application of the invention is further described below with reference to concrete analysis.
The present invention is based on actual application scenarios, propose a kind of group ranking model based on e-commerce.Assuming that company 1 Employee Alice need the raw material of Acquisition Company 2 because of work production.Alice needs to mention to the Finance Department T1 of oneself company A application material is handed over, including the raw material information (title, price, quantity of raw material etc.) and purchase information for needing to buy. Only Finance Department just has the power to carry out financial transaction.But due to including the privacy of Alice personal identification in purchase information Information, so purchase information carries out blinding processing.Blind other employees and external irrelevant personnel for handling and being intended to company 1 The identity of buyer is hidden, they can only know this raw material of someone's purchase, but not know it is whose application purchase.In this way, Just protect the identity security of Alice.
Then, T1 can audit raw material information and pricing information after receiving purchase application, if agreed to buy, These message are just sent to the Finance Department T2 of company 2 together with payment amount.T2 is received to compare after information and be sended over Payment amount whether be consistent with the price of the material of needs, if met, information will be bought and be sent to the deliveryman of company 2 Bob, Bob finally confirm message after receiving information, if it have been confirmed that being people's purchase of company 1 then by the delivery of goods To company 1.So far, a complete process of exchange just completes.Detailed process is as shown in Figure 1.
In the present invention, the theoretical knowledge for needing to use includes:
Four kinds of Pauli doors:
If by these four Pauli gate actions in a uncertain particle state | Ψ >T=(α | 0 >+β | 1 >)TOn, | Ψ >T The result of presentation is as follows:
σ00|Ψ>T=(α | 0 >+β | 1 >)T01|Ψ>T=(α | 1 >+β | 0 >)T
σ10|Ψ>T=(α | 0 >-β | 1 >)T11|Ψ>T=(α | 1 >-β | 0 >)T(2)
In fact, to uncertain particle | Ψ >TThe process for carrying out Pauli operation is exactly that the purchase application of Alice is passed through Pauli Operation is loaded into | and Ψ >TOn particle.The classical information that four kinds of different Pauli doors represent is respectively: 00 represents01 represents10 represent11 represent
Four kinds of Bell state particles are also needed simultaneously, they are respectively:
Assuming that Finance Department T1 is right | Ψ >TParticle and | φ+>12In 1 particle carry out Bell combined measurement, then measuring As a result the state after collapsing with 2 particles is as follows:
What the process of this measurement indicated is after T1 audit is applied by purchase, to agree to the operation traded.By (7) it can be concluded that, by after Bell combined measurement, 2 particles can be collapsed to { (α | 0 >+β | 1 >) at random2、(α|0>-β|1>)2、 (α|1>+β|0>)2、(α|1>-β|0>)2One of these four states.Then, 2 particles are sent to the Finance Department of company 2 by T1 T2, then T2 can by 2 particles and | φ+>34In 3 particles carry out Bell combined measurement, measurement result is as follows:
Likewise, 4 particles can be collapsed to { (α | 0 >+β | 1 >) at random after carrying out Bell combined measurement to 2,3 particles4、 (α|0>-β|1>)4、(α|1>+β|0>)4、(α|1>-β|0>)4This one of state in 4.As long as can be released from above-mentioned formula According to the measurement result of 2,3 particles, 4 particles can operate the state for being converted into 2 particles by reverse Pauli, in addition, converting it Particle afterwards can also be converted into the state of original T particle according to the measurement result of T, 1 particle.So if necessary to transmission T The message for including in son does not need a T particle and is sent to T2, but can be operated by reverse Pauli by the state of 4 particles It is converted into the state of T particle, has just achieved the purpose that transmit message.
Application of the invention is further described combined with specific embodiments below.
Multigroup e-commerce endorsement method provided in an embodiment of the present invention based on quantum teleportation, comprising:
Initialize the application stage:
(I1) the employee Alice of company 1 is by the key K of oneselfAT1It is shared with Finance Department T1, the deliveryman Bob of company 2 By the key K of oneselfAT2It is shared with Finance Department T2, T1 and T2 and shares a string of key KT1T2.These keys are all by QKD agreement It is distributed.
(I2) T1 prepares n to Bell state particleI=1,2,3 ..., n.Then T1 is by the A of every centeringiParticle It is sent to Alice, oneself retains TiParticle.
(I3) Alice provides merchandise news M1With purchase information M2=(m2(1),m2(2),···,m2(i),···, m2(n)) is in order to blind the privacy information of Alice to other employees and external potential attacker.Firstly, Alice is according to oneself Key KAT1, by m2(i) and the i-th bit of the key of oneself carries out xor operation.If KAT1Length ratio i it is small, then Alice Just by m2(i) and KAT1Jth position carry out exclusive or, wherein j=i (mod (KAT1Length)).Then, M has just been obtained2'=(m2’ (1),m2’(2),···,m2’(i),···,m2’(n))。
Before xor operation has been advanceed to measurement, by calculating, such xor operation is just meaningful.
Next, Alice is according to M2' to AiParticle measures, if m2' (i)=0, Alice selection | 0 >, | 1 > } base To AiParticle measures, if m2' (i)=1, then select |+>, | -> base measures.In Alice to AiParticle is surveyed After amount, according to the Entanglement of Bell state particle, different bases is selected to measure, TiParticle can be collapsed into different at random State (state after collapsing be | 0 >, | 1 >, |+>, | ->, concrete outcome can be derived from by (3) (4) (5) (6)). Measurement result is denoted as m2' (i), the method encoded to measurement result is as follows:
| 0 > → 00, | 1 > → 01, |+> → 10, | -> → 11 (12)
Therefore, it can be obtained from above, the purchase information M after signing2' (2n-bits)=(m2’(1),m2’(2),···, m2’(i),···,m2' (n)) just it has been encoded into M2" (2n-bits)=(m2”(1),m2”(2),···,m2” (i),···,m2"(n)).Then, then, Alice is to M by Alice1And M2" backed up, and by M1And M2" use key KAT1Into Row encryption, is denoted as EKAT1{M1,M2", it is then sent to T1.
(I4) encryption message EK is received in T1AT1{M1,M2" after, first use key KAT1It is decrypted, then according to m2”(i) Prepare n;
To Bell state particlem2" (i) andPreparation relationship it is as follows:
For in each pair of Bell state particle prepared, T1 is by 1iParticle is sent to Alice, oneself retains 2iParticle.Finally T2 prepares n pairsParticle, i=1,2,3 ..., n.
Signature transactional stage
(S1) Alice buys message m according to the signature of oneself2" (i) to 1iCarry out Pauli operation, be denoted as Then by 1i' particle is sent to T1.m2" (i) and selection Pauli door relationship as shown in Table 1, no matter in factParticle is most initially any state, 1iAfter operating by Pauli, it can be all converted intoThe particle of state.
Table 1.m2" relationship between (i) and Pauli door
(S2) T1 receives 1i' after particle, T1 is to TiParticle and 1i' particle carries out Bell combined measurement, measurement result is denoted as βA, then T1 key KT1T2To βA、M1With payment amount MFIt is encrypted, is as a result denoted as ST1T2=EKT1T2A,M1,MF}.It connects T1 get off for ST1T2With 2iParticle is sent to T2.
(S3) when T2 receives ST1T2With 2iAfter particle, first by ST1T2Use key KT1T2It is decrypted, to obtain MFWith M1.Then M is auditedFWhether and M1In pricing information match, if it does not match, this transaction can be cancelled.By auditing it Afterwards, T2 can be to 2iWith 3iParticle carries out Bell combined measurement, and measurement result is denoted as βB.Then T2 key KT2BBy (βAB) plus It is close, it is denoted as ST2B=EKT2BAB, later by ST2BWith 4iParticle is sent to Bob.
Verify the delivery stage
(V1) Bob receives ST2BWith 4iAfter particle, key K is first usedT2BBy ST2BIt is decrypted, obtains measurement result (βAB)。 Then Bob is according to measurement result βBFirst to 4iParticle carries out reverse Pauli operation, such Bob available 2iThe state of particle, Then further according to measurement result βAContinue to 4iParticle carries out reverse Pauli operation, may finally restore TiThe state of particle.It is inverse To Pauli operation and measurement result (βAB) relationship it is as shown in table 2:
The operation of the reverse Pauli of table 2. and measurement result (βAB) relationship
(V2) in fact, the T restorediThe state of particle just contains the message m blinded2" (i), so Bob can be with Finally deduce complete signature purchase information M2", the message M that this is derived2" it is denoted as MT".Therefore, it is known that M2” Bob can be inferred that initial T1 preparationThe state of particle.
(V3) due to mentioning before, no matter initiallyHow is the state of particle, and Alice is to 1 in (S1) stepiInto After the operation of row Pauli, these particles can all becomeThe particle of state, so Bob can be according to the conversion of this state As a result which kind of Pauli door derives that Alice has been used has selected carry out Pauli operation, and because the Pauli door of Alice selection represents Alice think transmitting purchase information, so Bob can be inferred to according to this result Alice signature purchase information M2", the message M that this is derived2" it is denoted as MA".The information that two kinds are derived is compared by last Bob, if MT” =MA", then illustrating that this signature purchase information is legal effective, and cargo is sent to company 1.Otherwise Bob sends out refusal Goods.
The invention will be further described combined with specific embodiments below.
For the detailed process for illustrating scheme, specific experimentation is simulated.Assuming that the employee of group 1, name A, Work number is 1, and (name and work number are message M2).(unit price and quantity of router are to disappear to the router device of application purchase group 2 Cease M1).Due to M1Transmission and review process be essentially the transmission and audit of classical information, mostly by current equipment and existing Some computer programs may be implemented.
Initial phase:
Because buying information M2In include employee A oneself privacy information, so employee A according to solution processes to oneself Purchase information carries out blinding processing, and generation blinds signature M2", detailed process is as shown in table 3:
3. initialization procedure of table
Signature transactional stage
According to the Entanglement of Bell state particle, TiThe result of collapsing of particle can be derived.Then T1 is by TiParticle with 1 particle oneself generated carries out Bell combined measurement, obtains measurement result βA.Next by 2 particles and measurement result βAIt is sent to 2 particles and 3 particles oneself generated are carried out Bell combined measurement by T2, T2, obtain measurement result βB, finally by 4 particles and survey Measure result (βAB) it is sent to deliveryman Bob together.
Specific measurement result is as shown in table 4:
The signature process of exchange of table 4.
Verify the delivery stage
After Bob receives 4 particles, according to measurement result (βAB) and table 2, select corresponding Pauli door, to 4 particles into Row reverse Pauli operation twice, obtains the end-state of 4 particles, then deduces MA", further according to MA" it is inferred to initial T1 preparation 'sThe state of particle, withAfter being compared, thus it is speculated that go out Pauli door used in employee A, finally deduce MT" detailed process is as shown in table 5:
Table 5. verifies delivery process of exchange
According to above-mentioned detailed process, last available MT"=MA", it is legal to sign, and article will be sent to employee A, this Process of exchange terminates.
Meanwhile simulation attack and corresponding safety analysis are carried out to the transaction flow of scheme.
Intercepting and capturing/multi-sending attack:
Assuming that when T1 sends 2 to T2iDuring particle, external attacker Eve attempts to initiate intercepting and capturing/multi-sending attack.Eve is attacked The main means hit are 2 intercepted and captured each from T1iParticle, and with the measurement base chosen in advance to 2iParticle measures, then root A new particle is prepared according to measurement result and is sent to T2.But since Eve is not aware that TiThe original state of particle, so working as TiWith 1iAfter particle has carried out Bell combined measurement, Eve can not naturally also can know that 2i, the state of particle.So Eve can only Randomly choose one group of measurement base (| 0 >, | 1 > } or |+>, | ->).According to quantum uncertainty principle, if Eve has selected mistake Measurement base measure, then 2iParticle will be collapsed into and original different state.Assuming that 2iThe original state of particle isState, and Eve selection be |+>, | -> base measures, then 2iParticle can be collapsed at random |+> state or | -> state, no matter 2iWhich kind of state particle is collapsed into, and this abnormality can all be detected in Qualify Phase (V3) by Bob.So Eve thinks Correct measurement is wanted to obtain 2iThe shape probability of state of particle is 1/2, and the final probability for obtaining complete correctly signature purchase information is 1/2nIf n is sufficiently large, Bob can be readily detected eavesdropping behavior.If Eve wants through modification pricing information It come the audit for bypassing T2 is also infeasible with the data of payment amount, because Eve in this way must be known by sharing between T1 and T2 Key KT1T2, but this key is distributed by QKD agreement, the protocol procedures of QKD key distribution have been proved to It is unconditional security.So Eve can not be decrypted by KT1T2The information of encryption.
In addition, if wanting to steal Alice by intercepting and capturing/multi-sending attack there are a certain employee Charlie inside company 1 Signature buy information.But since Charlie is not aware that initial Alice 1iWhich kind of Pauli operation what is carried out on particle is, So 1iParticle is for Charlie
It is unknown, it is desirable to correctly obtain 1iThe attack strategies of the information that particle is contained, Charlie are also identical with Eve. Likewise, this attack is also to be easy to be detected by Bob according to quantum uncertainty principle.Finally, if Charlie is intended to By in Alice to AiParticle carries out intercepting and capturing A after Pauli operationiParticle buys information to obtain signature, and this mode is also not It is feasible.Because of AiParticle is forwarded to other people after Alice is received never again, so Charlie cannot be to AiParticle It is intercepted and captured, can not naturally also pass through AiParticle buys information to obtain the signature of Alice.
Tangle attack:
Assuming that when T1 sends 2 to T2iDuring particle, external attacker Eve attempts to initiate to tangle attack.Eve is cut first Obtain each 2 from T1iParticle, then by 2iParticle is tangled with an additional particles.It is assumed that additional particle is gi, just Primary state is | 0 > state.When Eve intercepts and captures 2iAfter particle, he passes through controlled-not gate (CNOT) for 2iParticle and giParticle is tangled, In 2iParticle is control bit, giParticle is controlled bit, then additional particles to tangle procedural representation as follows:
From formula (13) as can be seen that when control bit is | the state of 0 > when, controlled bit are constant;When control bit is | 1 > when, controlled bit will be from | and 0 > state becomes | 1 > state.But since Eve does not know 2iThe particular state of particle, so Eve is considered 2iThe state of particle then includes | 0 >, | 1 >, |+>, and | -> tetra- kinds of states, as Eve giParticle is to being in |+> state or | -> When the particle of state is tangled, it is as follows to tangle procedural representation:
As long as 2iThe state of particle is in |+> state or | -> state, according to formula (15) (16), the state of particle has been converted into Bell state.Therefore, in next signature and Qualify Phase, when T2 is to 2iParticle and 3iParticle carries out Bell combined measurement When, due to 2iThe state of particle and it is converted into | φ+> or | φ-> state, measurement result indicate as follows:
From formula (17) (18) as can be seen that 4iThe state of particle will be collapsed at random | φ+>、|φ->、|ψ+>、|ψ->} One of four kinds of states.No matter which kind of state be collapsed into, in Qualify Phase, in order to speculate signature purchase information, Bob can be according to measurement As a result to 4iParticle carries out Pauli operation, after progress Pauli operation, it is desirable to obtain the information contained in particle, it is necessary to measurement Base | 0 >, | 1 > } or |+>, | -> particle is measured, but due to 4iParticle and from |+> state or | -> state is converted to | φ+>、|φ->、|ψ+>or|ψ-> state is not inconsistent so finally deducing the signing messages come and can buy information with original signature, So Bob can easily have found this eavesdropping behavior very much.
Non repudiation:
If Alice want deny, do not recognize he signed this purchase information, according to initial phase (I2), Alice When submitting purchase application to T1, key K has been usedAT1It is encrypted, this key is to be difficult to be stolen for other people 's.So if disagreed between Alice and Bob, Finance Department T1 only need decrypted signature purchase information and with The purchase information that Bob is inferred to is wanted to compare, so that it may know that message is signed by Alice.Therefore, Alice can not be denied The fact that purchase information that he is signed.Likewise, if Bob wants to deny the thing that he has been received that signature purchase message It is real, due to the signature information S that in signature stage (S3), final T2 is sentT2BIt is that the key shared with T2 and Bob encrypts, this A signature can only could also be decrypted by the owner Bob of key.
Unforgeable:
Assuming that there are the external attacker Eve signatures for wanting to forge Alice to buy information, but since the signature of Alice disappears Breath is to lie in 2iIn particle, so Eve must formulate the forgery attack strategy for not violating principle of quantum mechanics.These attack plans Slightly detailed analysis illustrates in safety analysis before, therefore it can be concluded that, no matter which kind of attacker Eve uses Formula, his eavesdropping are forged behavior and can all be detected by Bob in Qualify Phase.
If the signature that other employee Charlie of company 1 want to forge Alice buys information, measurement base must be used | 0 >, | 1 > } or |+>, | -> measurement 1iParticle, but since Charlie does not know 1iThe state of particle, he can only randomly choose Base is measured, once the measurement base of selection and the base that uses is misfitted when preparing, according to quantum uncertainty principle, 1iParticle can be random It is collapsed into different states, it is to forge that such Bob, which can detecte out this signature in Qualify Phase,.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real It is existing.When using entirely or partly realizing in the form of a computer program product, the computer program product include one or Multiple computer instructions.When loading on computers or executing the computer program instructions, entirely or partly generate according to Process described in the embodiment of the present invention or function.The computer can be general purpose computer, special purpose computer, computer network Network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or from one Computer readable storage medium is transmitted to another computer readable storage medium, for example, the computer instruction can be from one A web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL) Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center Transmission).The computer-readable storage medium can be any usable medium or include one that computer can access The data storage devices such as a or multiple usable mediums integrated server, data center.The usable medium can be magnetic Jie Matter, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid State Disk (SSD)) etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (8)

1. a kind of multigroup e-commerce endorsement method based on quantum teleportation, which is characterized in that described to be based on Quantum Teleportation Pass state multigroup e-commerce endorsement method include:
The application user of first group sends procurement information to the second group;Application is hidden to the procurement information of application user Subscriber identity information blind processing after, be sent to the first group audit center;
After first group audit center receives application user's purchase information, purchase signal auditing is carried out;If be proved to be successful, The purchase information is sent to the second group audit center of the second group together with payment information;
After second group audit center receives information, whether correct the payment information sended over is compared;It, will if correct Purchase information is sent to the delivery user of the second group;
Delivery user confirms information after receiving information;If it is confirmed that being the application user purchase letter of the first group Breath then executes delivery of goods instruction.
2. the multigroup e-commerce endorsement method based on quantum teleportation as described in claim 1, which is characterized in that first In group and the transmission of the second group message, the key used is using quantum key distribution agreement, including BB84 agreement;
Blinding processing includes: that application user buys information by measuring to Bell state particle using different measurement bases, so After encode.
3. the multigroup e-commerce endorsement method based on quantum teleportation as claimed in claim 2, which is characterized in that first Include: in group and the transmission of the second group message
Four kinds of Pauli doors:
By four kinds of Pauli gate actions in uncertain particle state | Ψ >T=(α | 0 >+β | 1 >)TOn, | Ψ >TAs a result as follows:
σ00|Ψ>T=(α | 0 >+β | 1 >)T01|Ψ>T=(α | 1 >+β | 0 >)T
σ10|Ψ>T=(α | 0 >-β | 1 >)T11|Ψ>T=(α | 1 >-β | 0 >)T
To uncertain particle | Ψ >TPauli operation is carried out, application user is bought into application and is loaded by Pauli operation | Ψ >TGrain On son;
The classical information that four kinds of different Pauli doors represent is respectively: 00 represents01 represents10 represent11 represent
4. the multigroup e-commerce endorsement method based on quantum teleportation as claimed in claim 2, which is characterized in that quantum Key distribution protocol further comprises:
Four kinds of Bell state particles, are respectively as follows:
First group audit center is right | and Ψ >TParticle and | φ+>12In 1 particle carry out Bell combined measurement, the result of measurement and 2 State after particle is collapsed is as follows:
By after Bell combined measurement, 2 particles can be collapsed to { (α | 0 >+β | 1 >) at random2、(α|0>-β|1>)2、(α|1>+β |0>)2、(α|1>-β|0>)2One of four kinds of Bell state particle states;
Then, 2 particles are sent to the second group audit center by the first group audit center, and the second group audit center is by 2 Son and | φ+>34In 3 particles carry out Bell combined measurement, measurement result is as follows:
After carrying out Bell combined measurement to 2,3 particles, 4 particles can be collapsed to { (α | 0 >+β | 1 >) at random4、(α|0>-β|1 >)4、(α|1>+β|0>)4、(α|1>-β|0>)4One of four kinds of Bell state particle states.
5. a kind of multigroup e-commerce endorsement method realized described in Claims 1 to 4 any one based on quantum teleportation Computer program.
6. a kind of terminal, which is characterized in that the terminal, which is at least carried, to be realized described in Claims 1 to 4 any one based on amount The processor of the multigroup e-commerce endorsement method of sub- Teleportation.
7. a kind of computer readable storage medium, including instruction, when run on a computer, so that computer is executed as weighed Benefit requires the multigroup e-commerce endorsement method described in 1-4 any one based on quantum teleportation.
8. a kind of multigroup e-commerce endorsement method realized described in Claims 1 to 4 any one based on quantum teleportation Multigroup e-commerce based on quantum teleportation sign network service platform.
CN201811547503.5A 2018-12-18 2018-12-18 Quantum invisible transitive state-based multi-group electronic commerce signature method Active CN109711932B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811547503.5A CN109711932B (en) 2018-12-18 2018-12-18 Quantum invisible transitive state-based multi-group electronic commerce signature method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811547503.5A CN109711932B (en) 2018-12-18 2018-12-18 Quantum invisible transitive state-based multi-group electronic commerce signature method

Publications (2)

Publication Number Publication Date
CN109711932A true CN109711932A (en) 2019-05-03
CN109711932B CN109711932B (en) 2020-10-27

Family

ID=66255916

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811547503.5A Active CN109711932B (en) 2018-12-18 2018-12-18 Quantum invisible transitive state-based multi-group electronic commerce signature method

Country Status (1)

Country Link
CN (1) CN109711932B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110233732A (en) * 2019-05-24 2019-09-13 西北大学 A kind of dynamic quantum rotation gate proxy blind signing method based on cluster state
CN116385000A (en) * 2023-04-23 2023-07-04 山东大学 Quantum group signature-based electronic payment method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103441819A (en) * 2013-08-28 2013-12-11 北京航空航天大学 Method and device for deterministic secure quantum communication based on EPR pairs and single photons
CN108512659A (en) * 2018-03-13 2018-09-07 成都信息工程大学 A kind of quantum secret information sharing method and system suitable for company property management
CN108880790A (en) * 2018-05-28 2018-11-23 华南师范大学 A kind of quantum ballot system and method based on quantum teleportation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103441819A (en) * 2013-08-28 2013-12-11 北京航空航天大学 Method and device for deterministic secure quantum communication based on EPR pairs and single photons
CN108512659A (en) * 2018-03-13 2018-09-07 成都信息工程大学 A kind of quantum secret information sharing method and system suitable for company property management
CN108880790A (en) * 2018-05-28 2018-11-23 华南师范大学 A kind of quantum ballot system and method based on quantum teleportation

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
XIANG GAO ET AL.: "Cryptanalysis of the Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State", 《INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS》 *
王辉 等: "有序双重的量子盲签名协议", 《通信学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110233732A (en) * 2019-05-24 2019-09-13 西北大学 A kind of dynamic quantum rotation gate proxy blind signing method based on cluster state
CN116385000A (en) * 2023-04-23 2023-07-04 山东大学 Quantum group signature-based electronic payment method and system

Also Published As

Publication number Publication date
CN109711932B (en) 2020-10-27

Similar Documents

Publication Publication Date Title
US10320569B1 (en) Systems and methods for authenticating a digitally signed assertion using verified evaluators
CN108880790B (en) Quantum voting system and method based on quantum invisible transmission state
WO2007092577A2 (en) A point-of-sale terminal transactions using mutating identifiers
CN108141354B (en) Quantum token
Luo et al. A lightweight mutual authentication protocol for RFID networks
Cai et al. A blockchain smart contract based on light-weighted quantum blind signature
US20200111095A1 (en) Systems and methods for amplifying the strength of cryptographic algorithms
Xiaojun An E-payment system based on quantum group signature
CN108694580B (en) Payment system and method based on quantum encryption
CN110071814A (en) A kind of quantum Proxy Signature method and system based on Bell state entanglement transfer
CN110166251A (en) A kind of half quantum group signature method and system based on quantum walking
CN109816844A (en) A kind of quantum ballot system based on quantum homomorphism signature
Zhang et al. A novel E-payment protocol implented by blockchain and quantum signature
CN109711932A (en) A kind of multigroup e-commerce endorsement method based on quantum teleportation
Cao et al. A quantum proxy weak blind signature scheme
Shi et al. A new quantum blind signature with unlinkability
Xiaojun et al. An E-payment system based on quantum blind and group signature
Ren et al. Building resilient Web 3.0 with quantum information technologies and blockchain: An ambilateral view
CN110100413A (en) Robust for certification calculates Fuzzy extractor and method
CN109903028A (en) A kind of electronic trade method, device, transaction originating end and medium
CN208190666U (en) A kind of quantum ballot system based on quantum Proxy Signature
Gou et al. A novel quantum E-payment protocol based on blockchain
Catherine et al. Multi authority ciphertext-policy attribute-based encryption for security enhancement in cloud storage unit
CN101425901A (en) Control method and device for customer identity verification in processing terminals
CN112884485A (en) Symmetric encryption traceability transaction method, system and storage medium based on block chain network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211220

Address after: 610095 902-905, floor 9, zone a, building 2, No. 200, Tianfu Fifth Street, high tech Zone, Chengdu, Sichuan

Patentee after: Chengdu Jicun Technology Co.,Ltd.

Address before: 610225, No. 24, Section 1, Xuefu Road, Southwest Economic Development Zone, Chengdu, Sichuan

Patentee before: CHENGDU University OF INFORMATION TECHNOLOGY