CN109711932A - A kind of multigroup e-commerce endorsement method based on quantum teleportation - Google Patents
A kind of multigroup e-commerce endorsement method based on quantum teleportation Download PDFInfo
- Publication number
- CN109711932A CN109711932A CN201811547503.5A CN201811547503A CN109711932A CN 109711932 A CN109711932 A CN 109711932A CN 201811547503 A CN201811547503 A CN 201811547503A CN 109711932 A CN109711932 A CN 109711932A
- Authority
- CN
- China
- Prior art keywords
- particle
- information
- group
- commerce
- multigroup
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention belongs to electronic commerce information processing method technical fields, a kind of multigroup e-commerce endorsement method and system based on quantum teleportation is disclosed, the multigroup e-commerce endorsement method based on quantum teleportation includes: that the application user of the first group sends procurement information to the second group;To application user procurement information be hidden application subscriber identity information blind processing after, be sent to the first group audit center;After first group audit center receives application user's purchase information, purchase signal auditing is carried out;After second group audit center receives information, whether correct the payment information sended over is compared.The present invention uses Bell state particle and single photon, these particles are compared to other a small bundle of straw, etc. for silkworms to spin cocoons on states and multiple particle state is all relatively easy to realization;The present invention is for general intercepting and capturing multi-sending attack and tangles attack all with certain attack tolerant, while having certain non repudiation and unforgeable.
Description
Technical field
The invention belongs to electronic commerce information processing method technical fields more particularly to a kind of based on quantum teleportation
Multigroup e-commerce endorsement method.
Background technique
Currently, the prior art commonly used in the trade is such that
Since Diffie and Hellman propose first digit signature agreement, digital signature in classical cryptoraphy and
Very crucial effect is played in many other application scenarios (such as data integrity protection, authentication and authorization).However,
The safety of classical digital signature depends on some unverified computational complexities it is assumed that these assume facing quantum calculation
When be insecure.
Due to the property of quantum state, quantum signature causes the interest of many people, also proposed many quantum label in recent years
Name scheme.First quantum signature scheme was proposed that the program is based on one-way function by Gottesman and Chuang in 2001
Quantum signature scheme.Then in 2002, Zeng and Keitel first proposed a kind of arbitration quantum signature using GHZ state
(AQS) agreement.The scheme that Zeng and Keitel is proposed also overcomes infeasible theorem of the Barnum et al. about quantum signature.And
In 2008, Yang and Wen were proposed and are acted on behalf of quantum group signature scheme more one, realized Threshold Shared Verification.They also exist
Propose within 2010 the group ranking based on quantum teleportation, and during the eavesdropping after being transmitted by Qi et al. to it there may be
The loophole of internal attacker is analyzed and has been improved.In the group ranking of Yang and Wen, they refer to e-payment, electricity
Sub- government affairs, the practical application of e-commerce etc..
Meanwhile Wen and Nie propose a kind of electronic fare payment system based on quantum group and Proxy Signature, using two thirds
Square trusted party rather than one enhance the robustness of system.After from this, many researchers are from Internal Quantum Proxy Blind label
Name arrives the online shopping mechanism based on quantum communications, all uses and improve this practical application scene.Finally, in 2017
Zhang et al. proposes a kind of Third Party Payment System agreement based on quantum Group-blind signature using four quantum bit Entangled States.
In conclusion problem of the existing technology is:
(1) from above-mentioned background it is known that being now based on the e-commerce group signature scheme of quantum theory system mostly all
Multiple particle state is used, but in existing technology, the preparation and storage of multiple particle state are all very difficult, so this
A little schemes are all difficult among actual conditions mostly.In addition, most e-commerce group signature scheme all only sets up one
A administrator, but among actual production and commercial situation, there is different administrators in different departments, most of important
Confidential information cannot be known that administrator just has the power to modify to these confidential information by other in-company employees
And authorization, while the transmission of confidential information can only also carry out between administrator.So based on above technical deficiency, this hair
It is bright to propose a kind of multigroup e-commerce signature scheme based on quantum teleportation.
(2) current quantum Proxy Signature or other special signatures blind coding form used by treatment process, mostly
It is measured to after Bell state particle measurement using different measurement bases, 0 represents the measurement of Z base, and 1 represents the measurement of X base, according to survey
Amount result 0,1 ,+,-be separately encoded as { 00,01,10,11 }.But such coding form has very maximum probability exposure former
Beginning information, such as, it is assumed that attacker extracts the first half of encoded infonnation, i.e., 0 is taken in 01, then all to all encoded informations
Take such operation, so that it may restore original information, there are great hidden danger for the safety of such coding mode.Institute
With based on above technical deficiency, the present invention improves the process for blinding processing.
(3) most of quantum signature protocol at this stage all lacks the safety to agreement process itself and carries out detailed point
Analysis, many agreements have carried out simply both for the non repudiation of agreement, non-repudiation, unforgeable and traceability
Verbal description, lack the analytic process for some specific attack strategies.So based on above technical deficiency, the present invention
Most common intercepting and capturing/the multi-sending attack of detailed analysis and attack is tangled in safety analysis.
Solve the difficulty and meaning of above-mentioned technical problem:
Since the preparation process of multiparticle Entangled State is complex, it is possible to be carried out using Bell state particle or single photon
Substitution can save many preparation costs during actually preparation in this way and save cost.
Multigroup group of the present invention-more administrators model foundation is also more in line with actual production and commercial situation.
Many quantum signatures blind process all blindnesses using the processing method in the above problem, protected in the privacy of user
There are great security risks for shield aspect, this blinds processing and also needs to improve.
Be also for the safety analysis generally attacked it is important, this analysis can embody out the program
Attack tolerant.
Summary of the invention
In view of the problems of the existing technology, the multigroup e-commerce based on quantum teleportation that the present invention provides a kind of
Endorsement method.
The invention is realized in this way a kind of multigroup e-commerce endorsement method based on quantum teleportation, the base
Include: in the multigroup e-commerce endorsement method of quantum teleportation
The application user of first group sends procurement information to the second group;The procurement information of application user is hidden
Application subscriber identity information blind processing after, be sent to the first group audit center;
After first group audit center receives application user's purchase information, purchase signal auditing is carried out;If verifying
The purchase information is sent to the second group audit center of the second group by success together with payment information;
After second group audit center receives information, whether correct the payment information sended over is compared;If correct,
Purchase information is then sent to the delivery user of the second group;
Delivery user confirms information after receiving information;If it is confirmed that being the application user purchase of the first group
Information then executes delivery of goods instruction.
Further, in the first group and the transmission of the second group message, the key used is using quantum key distribution agreement, packet
Include BB84 agreement;Quantum key distribution agreement is not only the transmission of single photon or Bel state particle, is to have a series of key point
Hair process (such as most classic BB84 agreement, an exactly key distribution protocol) is by mature key distribution association here
View is directly applied, and ensure that the unconditional safety of key distribution.
Blinding processing includes: that application user buys information by surveying to Bell state particle using different measurement bases
Amount, then encodes.
Further, include: in the first group and the transmission of the second group message
Four kinds of Pauli doors:
By four kinds of Pauli gate actions in uncertain particle state | Ψ >T=(α | 0 >+β | 1 >)TOn, | Ψ >TAs a result such as
Under:
σ00|Ψ>T=(α | 0 >+β | 1 >)T,σ01|Ψ>T=(α | 1 >+β | 0 >)T
σ10|Ψ>T=(α | 0 >-β | 1 >)T,σ11|Ψ>T=(α | 1 >-β | 0 >)T;
To uncertain particle | Ψ >TPauli operation is carried out, application user is bought into application and is loaded by Pauli operation | Ψ
>TOn particle;
The classical information that four kinds of different Pauli doors represent is respectively: 00 represents01 represents10 represent
11 represent
Further, quantum key distribution agreement further comprises:
Four kinds of Bell state particles are respectively:
First group audit center is right | and Ψ >TParticle and | φ+>12In 1 particle carry out Bell combined measurement, the knot of measurement
State after fruit and 2 particles are collapsed is as follows:
By after Bell combined measurement, 2 particles can be collapsed to { (α | 0 >+β | 1 >) at random2、(α|0>-β|1>)2、(α|
1>+β|0>)2、(α|1>-β|0>)2One of four kinds of Bell state particle states;
Then, 2 particles are sent to the second group audit center by the first group audit center, and the second group audit center will
2 particles and | φ+>34In 3 particles carry out Bell combined measurement, measurement result is as follows:
After carrying out Bell combined measurement to 2,3 particles, 4 particles can be collapsed to { (α | 0 >+β | 1 >) at random4、(α|0>-
β|1>)4、(α|1>+β|0>)4、(α|1>-β|0>)4One of four kinds of Bell state particle states.
Another object of the present invention is to provide the multigroup e-commerce label described in a kind of realize based on quantum teleportation
The computer program of name method.
Another object of the present invention is to provide a kind of terminal, it is described based on Quantum Teleportation that the terminal at least carries realization
Pass the processor of the multigroup e-commerce endorsement method of state.
Another object of the present invention is to provide a kind of computer readable storage mediums, including instruction, when it is in computer
When upper operation, so that computer executes the multigroup e-commerce endorsement method based on quantum teleportation.
Another object of the present invention is to provide the multigroup e-commerce label described in a kind of realize based on quantum teleportation
The multigroup e-commerce signature network service platform based on quantum teleportation of name method.
In conclusion advantages of the present invention and good effect are as follows:
In the present invention, it is assumed that by Liang Ge group: company 1 and company 2, each company have oneself Finance Department T1 and
T2, each employee require to submit purchase application to Finance Department if necessary to buying raw material.It is more accorded in the foundation of model
Close practical application scene.
Meanwhile key used in message transmitting procedure uses quantum key distribution agreement, this ensure that entirely
Unconditional security in protocol message transmission process.Secondly, the purchase information comprising individual privacy can be carried out first using key
Then exclusive or processing, is then encoded by being measured to Bell state particle using different measurement bases, so that after coding,
Original purchase information will not be known by the potential attacker of other employees and outside, ensure that buyer's privacy information
Safety.In addition, the transmission process of message uses Bell state particle and single photon, these particles are compared to other a small bundle of straw, etc. for silkworms to spin cocoons ons
State and multiple particle state are all relatively easy to realization.Finally, illustrating this programme for general intercepting and capturing by safety analysis
It multi-sending attack and tangles attack all there is certain attack tolerant, while there is certain non repudiation and unforgeable.
Detailed description of the invention
Fig. 1 is the multigroup e-commerce endorsement method flow chart provided in an embodiment of the present invention based on quantum teleportation.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention
It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to
Limit the present invention.
The e-commerce group signature scheme for being now based on quantum theory system all uses multiple particle state mostly, but
It is existing technically, the preparation of multiple particle state and storage be all it is very difficult, so these schemes be all difficult with mostly in
Among actual conditions.In addition, most e-commerce group signature scheme all only sets up an administrator, but in actual life
It produces among commercial situation, there is different administrators in different departments, and most of important confidential information are cannot be by company
What other employees in portion knew, administrator just has the power that these confidential information are modified and authorized, while confidential information
Transmission can only also carry out between administrator.So it is hidden based on quantum that the invention proposes one kind based on above technical deficiency
The multigroup e-commerce signature scheme of shape biography state.
Application of the invention is further described below with reference to concrete analysis.
The present invention is based on actual application scenarios, propose a kind of group ranking model based on e-commerce.Assuming that company 1
Employee Alice need the raw material of Acquisition Company 2 because of work production.Alice needs to mention to the Finance Department T1 of oneself company
A application material is handed over, including the raw material information (title, price, quantity of raw material etc.) and purchase information for needing to buy.
Only Finance Department just has the power to carry out financial transaction.But due to including the privacy of Alice personal identification in purchase information
Information, so purchase information carries out blinding processing.Blind other employees and external irrelevant personnel for handling and being intended to company 1
The identity of buyer is hidden, they can only know this raw material of someone's purchase, but not know it is whose application purchase.In this way,
Just protect the identity security of Alice.
Then, T1 can audit raw material information and pricing information after receiving purchase application, if agreed to buy,
These message are just sent to the Finance Department T2 of company 2 together with payment amount.T2 is received to compare after information and be sended over
Payment amount whether be consistent with the price of the material of needs, if met, information will be bought and be sent to the deliveryman of company 2
Bob, Bob finally confirm message after receiving information, if it have been confirmed that being people's purchase of company 1 then by the delivery of goods
To company 1.So far, a complete process of exchange just completes.Detailed process is as shown in Figure 1.
In the present invention, the theoretical knowledge for needing to use includes:
Four kinds of Pauli doors:
If by these four Pauli gate actions in a uncertain particle state | Ψ >T=(α | 0 >+β | 1 >)TOn, | Ψ >T
The result of presentation is as follows:
σ00|Ψ>T=(α | 0 >+β | 1 >)T,σ01|Ψ>T=(α | 1 >+β | 0 >)T
σ10|Ψ>T=(α | 0 >-β | 1 >)T,σ11|Ψ>T=(α | 1 >-β | 0 >)T(2)
In fact, to uncertain particle | Ψ >TThe process for carrying out Pauli operation is exactly that the purchase application of Alice is passed through Pauli
Operation is loaded into | and Ψ >TOn particle.The classical information that four kinds of different Pauli doors represent is respectively: 00 represents01 represents10 represent11 represent
Four kinds of Bell state particles are also needed simultaneously, they are respectively:
Assuming that Finance Department T1 is right | Ψ >TParticle and | φ+>12In 1 particle carry out Bell combined measurement, then measuring
As a result the state after collapsing with 2 particles is as follows:
What the process of this measurement indicated is after T1 audit is applied by purchase, to agree to the operation traded.By
(7) it can be concluded that, by after Bell combined measurement, 2 particles can be collapsed to { (α | 0 >+β | 1 >) at random2、(α|0>-β|1>)2、
(α|1>+β|0>)2、(α|1>-β|0>)2One of these four states.Then, 2 particles are sent to the Finance Department of company 2 by T1
T2, then T2 can by 2 particles and | φ+>34In 3 particles carry out Bell combined measurement, measurement result is as follows:
Likewise, 4 particles can be collapsed to { (α | 0 >+β | 1 >) at random after carrying out Bell combined measurement to 2,3 particles4、
(α|0>-β|1>)4、(α|1>+β|0>)4、(α|1>-β|0>)4This one of state in 4.As long as can be released from above-mentioned formula
According to the measurement result of 2,3 particles, 4 particles can operate the state for being converted into 2 particles by reverse Pauli, in addition, converting it
Particle afterwards can also be converted into the state of original T particle according to the measurement result of T, 1 particle.So if necessary to transmission T
The message for including in son does not need a T particle and is sent to T2, but can be operated by reverse Pauli by the state of 4 particles
It is converted into the state of T particle, has just achieved the purpose that transmit message.
Application of the invention is further described combined with specific embodiments below.
Multigroup e-commerce endorsement method provided in an embodiment of the present invention based on quantum teleportation, comprising:
Initialize the application stage:
(I1) the employee Alice of company 1 is by the key K of oneselfAT1It is shared with Finance Department T1, the deliveryman Bob of company 2
By the key K of oneselfAT2It is shared with Finance Department T2, T1 and T2 and shares a string of key KT1T2.These keys are all by QKD agreement
It is distributed.
(I2) T1 prepares n to Bell state particleI=1,2,3 ..., n.Then T1 is by the A of every centeringiParticle
It is sent to Alice, oneself retains TiParticle.
(I3) Alice provides merchandise news M1With purchase information M2=(m2(1),m2(2),···,m2(i),···,
m2(n)) is in order to blind the privacy information of Alice to other employees and external potential attacker.Firstly, Alice is according to oneself
Key KAT1, by m2(i) and the i-th bit of the key of oneself carries out xor operation.If KAT1Length ratio i it is small, then Alice
Just by m2(i) and KAT1Jth position carry out exclusive or, wherein j=i (mod (KAT1Length)).Then, M has just been obtained2'=(m2’
(1),m2’(2),···,m2’(i),···,m2’(n))。
Before xor operation has been advanceed to measurement, by calculating, such xor operation is just meaningful.
Next, Alice is according to M2' to AiParticle measures, if m2' (i)=0, Alice selection | 0 >, | 1 > } base
To AiParticle measures, if m2' (i)=1, then select |+>, | -> base measures.In Alice to AiParticle is surveyed
After amount, according to the Entanglement of Bell state particle, different bases is selected to measure, TiParticle can be collapsed into different at random
State (state after collapsing be | 0 >, | 1 >, |+>, | ->, concrete outcome can be derived from by (3) (4) (5) (6)).
Measurement result is denoted as m2' (i), the method encoded to measurement result is as follows:
| 0 > → 00, | 1 > → 01, |+> → 10, | -> → 11 (12)
Therefore, it can be obtained from above, the purchase information M after signing2' (2n-bits)=(m2’(1),m2’(2),···,
m2’(i),···,m2' (n)) just it has been encoded into M2" (2n-bits)=(m2”(1),m2”(2),···,m2”
(i),···,m2"(n)).Then, then, Alice is to M by Alice1And M2" backed up, and by M1And M2" use key KAT1Into
Row encryption, is denoted as EKAT1{M1,M2", it is then sent to T1.
(I4) encryption message EK is received in T1AT1{M1,M2" after, first use key KAT1It is decrypted, then according to m2”(i)
Prepare n;
To Bell state particlem2" (i) andPreparation relationship it is as follows:
For in each pair of Bell state particle prepared, T1 is by 1iParticle is sent to Alice, oneself retains 2iParticle.Finally
T2 prepares n pairsParticle, i=1,2,3 ..., n.
Signature transactional stage
(S1) Alice buys message m according to the signature of oneself2" (i) to 1iCarry out Pauli operation, be denoted as Then by 1i' particle is sent to T1.m2" (i) and selection Pauli door relationship as shown in Table 1, no matter in factParticle is most initially any state, 1iAfter operating by Pauli, it can be all converted intoThe particle of state.
Table 1.m2" relationship between (i) and Pauli door
(S2) T1 receives 1i' after particle, T1 is to TiParticle and 1i' particle carries out Bell combined measurement, measurement result is denoted as
βA, then T1 key KT1T2To βA、M1With payment amount MFIt is encrypted, is as a result denoted as ST1T2=EKT1T2{βA,M1,MF}.It connects
T1 get off for ST1T2With 2iParticle is sent to T2.
(S3) when T2 receives ST1T2With 2iAfter particle, first by ST1T2Use key KT1T2It is decrypted, to obtain MFWith
M1.Then M is auditedFWhether and M1In pricing information match, if it does not match, this transaction can be cancelled.By auditing it
Afterwards, T2 can be to 2iWith 3iParticle carries out Bell combined measurement, and measurement result is denoted as βB.Then T2 key KT2BBy (βA,βB) plus
It is close, it is denoted as ST2B=EKT2B{βA,βB, later by ST2BWith 4iParticle is sent to Bob.
Verify the delivery stage
(V1) Bob receives ST2BWith 4iAfter particle, key K is first usedT2BBy ST2BIt is decrypted, obtains measurement result (βA,βB)。
Then Bob is according to measurement result βBFirst to 4iParticle carries out reverse Pauli operation, such Bob available 2iThe state of particle,
Then further according to measurement result βAContinue to 4iParticle carries out reverse Pauli operation, may finally restore TiThe state of particle.It is inverse
To Pauli operation and measurement result (βA,βB) relationship it is as shown in table 2:
The operation of the reverse Pauli of table 2. and measurement result (βA,βB) relationship
(V2) in fact, the T restorediThe state of particle just contains the message m blinded2" (i), so Bob can be with
Finally deduce complete signature purchase information M2", the message M that this is derived2" it is denoted as MT".Therefore, it is known that M2”
Bob can be inferred that initial T1 preparationThe state of particle.
(V3) due to mentioning before, no matter initiallyHow is the state of particle, and Alice is to 1 in (S1) stepiInto
After the operation of row Pauli, these particles can all becomeThe particle of state, so Bob can be according to the conversion of this state
As a result which kind of Pauli door derives that Alice has been used has selected carry out Pauli operation, and because the Pauli door of Alice selection represents
Alice think transmitting purchase information, so Bob can be inferred to according to this result Alice signature purchase information
M2", the message M that this is derived2" it is denoted as MA".The information that two kinds are derived is compared by last Bob, if MT”
=MA", then illustrating that this signature purchase information is legal effective, and cargo is sent to company 1.Otherwise Bob sends out refusal
Goods.
The invention will be further described combined with specific embodiments below.
For the detailed process for illustrating scheme, specific experimentation is simulated.Assuming that the employee of group 1, name A,
Work number is 1, and (name and work number are message M2).(unit price and quantity of router are to disappear to the router device of application purchase group 2
Cease M1).Due to M1Transmission and review process be essentially the transmission and audit of classical information, mostly by current equipment and existing
Some computer programs may be implemented.
Initial phase:
Because buying information M2In include employee A oneself privacy information, so employee A according to solution processes to oneself
Purchase information carries out blinding processing, and generation blinds signature M2", detailed process is as shown in table 3:
3. initialization procedure of table
Signature transactional stage
According to the Entanglement of Bell state particle, TiThe result of collapsing of particle can be derived.Then T1 is by TiParticle with
1 particle oneself generated carries out Bell combined measurement, obtains measurement result βA.Next by 2 particles and measurement result βAIt is sent to
2 particles and 3 particles oneself generated are carried out Bell combined measurement by T2, T2, obtain measurement result βB, finally by 4 particles and survey
Measure result (βA,βB) it is sent to deliveryman Bob together.
Specific measurement result is as shown in table 4:
The signature process of exchange of table 4.
Verify the delivery stage
After Bob receives 4 particles, according to measurement result (βA,βB) and table 2, select corresponding Pauli door, to 4 particles into
Row reverse Pauli operation twice, obtains the end-state of 4 particles, then deduces MA", further according to MA" it is inferred to initial T1 preparation
'sThe state of particle, withAfter being compared, thus it is speculated that go out Pauli door used in employee A, finally deduce
MT" detailed process is as shown in table 5:
Table 5. verifies delivery process of exchange
According to above-mentioned detailed process, last available MT"=MA", it is legal to sign, and article will be sent to employee A, this
Process of exchange terminates.
Meanwhile simulation attack and corresponding safety analysis are carried out to the transaction flow of scheme.
Intercepting and capturing/multi-sending attack:
Assuming that when T1 sends 2 to T2iDuring particle, external attacker Eve attempts to initiate intercepting and capturing/multi-sending attack.Eve is attacked
The main means hit are 2 intercepted and captured each from T1iParticle, and with the measurement base chosen in advance to 2iParticle measures, then root
A new particle is prepared according to measurement result and is sent to T2.But since Eve is not aware that TiThe original state of particle, so working as
TiWith 1iAfter particle has carried out Bell combined measurement, Eve can not naturally also can know that 2i, the state of particle.So Eve can only
Randomly choose one group of measurement base (| 0 >, | 1 > } or |+>, | ->).According to quantum uncertainty principle, if Eve has selected mistake
Measurement base measure, then 2iParticle will be collapsed into and original different state.Assuming that 2iThe original state of particle isState, and Eve selection be |+>, | -> base measures, then 2iParticle can be collapsed at random |+> state or | -> state, no matter
2iWhich kind of state particle is collapsed into, and this abnormality can all be detected in Qualify Phase (V3) by Bob.So Eve thinks
Correct measurement is wanted to obtain 2iThe shape probability of state of particle is 1/2, and the final probability for obtaining complete correctly signature purchase information is
1/2nIf n is sufficiently large, Bob can be readily detected eavesdropping behavior.If Eve wants through modification pricing information
It come the audit for bypassing T2 is also infeasible with the data of payment amount, because Eve in this way must be known by sharing between T1 and T2
Key KT1T2, but this key is distributed by QKD agreement, the protocol procedures of QKD key distribution have been proved to
It is unconditional security.So Eve can not be decrypted by KT1T2The information of encryption.
In addition, if wanting to steal Alice by intercepting and capturing/multi-sending attack there are a certain employee Charlie inside company 1
Signature buy information.But since Charlie is not aware that initial Alice 1iWhich kind of Pauli operation what is carried out on particle is,
So 1iParticle is for Charlie
It is unknown, it is desirable to correctly obtain 1iThe attack strategies of the information that particle is contained, Charlie are also identical with Eve.
Likewise, this attack is also to be easy to be detected by Bob according to quantum uncertainty principle.Finally, if Charlie is intended to
By in Alice to AiParticle carries out intercepting and capturing A after Pauli operationiParticle buys information to obtain signature, and this mode is also not
It is feasible.Because of AiParticle is forwarded to other people after Alice is received never again, so Charlie cannot be to AiParticle
It is intercepted and captured, can not naturally also pass through AiParticle buys information to obtain the signature of Alice.
Tangle attack:
Assuming that when T1 sends 2 to T2iDuring particle, external attacker Eve attempts to initiate to tangle attack.Eve is cut first
Obtain each 2 from T1iParticle, then by 2iParticle is tangled with an additional particles.It is assumed that additional particle is gi, just
Primary state is | 0 > state.When Eve intercepts and captures 2iAfter particle, he passes through controlled-not gate (CNOT) for 2iParticle and giParticle is tangled,
In 2iParticle is control bit, giParticle is controlled bit, then additional particles to tangle procedural representation as follows:
From formula (13) as can be seen that when control bit is | the state of 0 > when, controlled bit are constant;When control bit is |
1 > when, controlled bit will be from | and 0 > state becomes | 1 > state.But since Eve does not know 2iThe particular state of particle, so Eve is considered
2iThe state of particle then includes | 0 >, | 1 >, |+>, and | -> tetra- kinds of states, as Eve giParticle is to being in |+> state or | ->
When the particle of state is tangled, it is as follows to tangle procedural representation:
As long as 2iThe state of particle is in |+> state or | -> state, according to formula (15) (16), the state of particle has been converted into
Bell state.Therefore, in next signature and Qualify Phase, when T2 is to 2iParticle and 3iParticle carries out Bell combined measurement
When, due to 2iThe state of particle and it is converted into | φ+> or | φ-> state, measurement result indicate as follows:
From formula (17) (18) as can be seen that 4iThe state of particle will be collapsed at random | φ+>、|φ->、|ψ+>、|ψ->}
One of four kinds of states.No matter which kind of state be collapsed into, in Qualify Phase, in order to speculate signature purchase information, Bob can be according to measurement
As a result to 4iParticle carries out Pauli operation, after progress Pauli operation, it is desirable to obtain the information contained in particle, it is necessary to measurement
Base | 0 >, | 1 > } or |+>, | -> particle is measured, but due to 4iParticle and from |+> state or | -> state is converted to |
φ+>、|φ->、|ψ+>or|ψ-> state is not inconsistent so finally deducing the signing messages come and can buy information with original signature,
So Bob can easily have found this eavesdropping behavior very much.
Non repudiation:
If Alice want deny, do not recognize he signed this purchase information, according to initial phase (I2), Alice
When submitting purchase application to T1, key K has been usedAT1It is encrypted, this key is to be difficult to be stolen for other people
's.So if disagreed between Alice and Bob, Finance Department T1 only need decrypted signature purchase information and with
The purchase information that Bob is inferred to is wanted to compare, so that it may know that message is signed by Alice.Therefore, Alice can not be denied
The fact that purchase information that he is signed.Likewise, if Bob wants to deny the thing that he has been received that signature purchase message
It is real, due to the signature information S that in signature stage (S3), final T2 is sentT2BIt is that the key shared with T2 and Bob encrypts, this
A signature can only could also be decrypted by the owner Bob of key.
Unforgeable:
Assuming that there are the external attacker Eve signatures for wanting to forge Alice to buy information, but since the signature of Alice disappears
Breath is to lie in 2iIn particle, so Eve must formulate the forgery attack strategy for not violating principle of quantum mechanics.These attack plans
Slightly detailed analysis illustrates in safety analysis before, therefore it can be concluded that, no matter which kind of attacker Eve uses
Formula, his eavesdropping are forged behavior and can all be detected by Bob in Qualify Phase.
If the signature that other employee Charlie of company 1 want to forge Alice buys information, measurement base must be used
| 0 >, | 1 > } or |+>, | -> measurement 1iParticle, but since Charlie does not know 1iThe state of particle, he can only randomly choose
Base is measured, once the measurement base of selection and the base that uses is misfitted when preparing, according to quantum uncertainty principle, 1iParticle can be random
It is collapsed into different states, it is to forge that such Bob, which can detecte out this signature in Qualify Phase,.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real
It is existing.When using entirely or partly realizing in the form of a computer program product, the computer program product include one or
Multiple computer instructions.When loading on computers or executing the computer program instructions, entirely or partly generate according to
Process described in the embodiment of the present invention or function.The computer can be general purpose computer, special purpose computer, computer network
Network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or from one
Computer readable storage medium is transmitted to another computer readable storage medium, for example, the computer instruction can be from one
A web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)
Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center
Transmission).The computer-readable storage medium can be any usable medium or include one that computer can access
The data storage devices such as a or multiple usable mediums integrated server, data center.The usable medium can be magnetic Jie
Matter, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid
State Disk (SSD)) etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (8)
1. a kind of multigroup e-commerce endorsement method based on quantum teleportation, which is characterized in that described to be based on Quantum Teleportation
Pass state multigroup e-commerce endorsement method include:
The application user of first group sends procurement information to the second group;Application is hidden to the procurement information of application user
Subscriber identity information blind processing after, be sent to the first group audit center;
After first group audit center receives application user's purchase information, purchase signal auditing is carried out;If be proved to be successful,
The purchase information is sent to the second group audit center of the second group together with payment information;
After second group audit center receives information, whether correct the payment information sended over is compared;It, will if correct
Purchase information is sent to the delivery user of the second group;
Delivery user confirms information after receiving information;If it is confirmed that being the application user purchase letter of the first group
Breath then executes delivery of goods instruction.
2. the multigroup e-commerce endorsement method based on quantum teleportation as described in claim 1, which is characterized in that first
In group and the transmission of the second group message, the key used is using quantum key distribution agreement, including BB84 agreement;
Blinding processing includes: that application user buys information by measuring to Bell state particle using different measurement bases, so
After encode.
3. the multigroup e-commerce endorsement method based on quantum teleportation as claimed in claim 2, which is characterized in that first
Include: in group and the transmission of the second group message
Four kinds of Pauli doors:
By four kinds of Pauli gate actions in uncertain particle state | Ψ >T=(α | 0 >+β | 1 >)TOn, | Ψ >TAs a result as follows:
σ00|Ψ>T=(α | 0 >+β | 1 >)T,σ01|Ψ>T=(α | 1 >+β | 0 >)T
σ10|Ψ>T=(α | 0 >-β | 1 >)T,σ11|Ψ>T=(α | 1 >-β | 0 >)T;
To uncertain particle | Ψ >TPauli operation is carried out, application user is bought into application and is loaded by Pauli operation | Ψ >TGrain
On son;
The classical information that four kinds of different Pauli doors represent is respectively: 00 represents01 represents10 represent11 represent
4. the multigroup e-commerce endorsement method based on quantum teleportation as claimed in claim 2, which is characterized in that quantum
Key distribution protocol further comprises:
Four kinds of Bell state particles, are respectively as follows:
First group audit center is right | and Ψ >TParticle and | φ+>12In 1 particle carry out Bell combined measurement, the result of measurement and 2
State after particle is collapsed is as follows:
By after Bell combined measurement, 2 particles can be collapsed to { (α | 0 >+β | 1 >) at random2、(α|0>-β|1>)2、(α|1>+β
|0>)2、(α|1>-β|0>)2One of four kinds of Bell state particle states;
Then, 2 particles are sent to the second group audit center by the first group audit center, and the second group audit center is by 2
Son and | φ+>34In 3 particles carry out Bell combined measurement, measurement result is as follows:
After carrying out Bell combined measurement to 2,3 particles, 4 particles can be collapsed to { (α | 0 >+β | 1 >) at random4、(α|0>-β|1
>)4、(α|1>+β|0>)4、(α|1>-β|0>)4One of four kinds of Bell state particle states.
5. a kind of multigroup e-commerce endorsement method realized described in Claims 1 to 4 any one based on quantum teleportation
Computer program.
6. a kind of terminal, which is characterized in that the terminal, which is at least carried, to be realized described in Claims 1 to 4 any one based on amount
The processor of the multigroup e-commerce endorsement method of sub- Teleportation.
7. a kind of computer readable storage medium, including instruction, when run on a computer, so that computer is executed as weighed
Benefit requires the multigroup e-commerce endorsement method described in 1-4 any one based on quantum teleportation.
8. a kind of multigroup e-commerce endorsement method realized described in Claims 1 to 4 any one based on quantum teleportation
Multigroup e-commerce based on quantum teleportation sign network service platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811547503.5A CN109711932B (en) | 2018-12-18 | 2018-12-18 | Quantum invisible transitive state-based multi-group electronic commerce signature method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811547503.5A CN109711932B (en) | 2018-12-18 | 2018-12-18 | Quantum invisible transitive state-based multi-group electronic commerce signature method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109711932A true CN109711932A (en) | 2019-05-03 |
CN109711932B CN109711932B (en) | 2020-10-27 |
Family
ID=66255916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811547503.5A Active CN109711932B (en) | 2018-12-18 | 2018-12-18 | Quantum invisible transitive state-based multi-group electronic commerce signature method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109711932B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110233732A (en) * | 2019-05-24 | 2019-09-13 | 西北大学 | A kind of dynamic quantum rotation gate proxy blind signing method based on cluster state |
CN116385000A (en) * | 2023-04-23 | 2023-07-04 | 山东大学 | Quantum group signature-based electronic payment method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103441819A (en) * | 2013-08-28 | 2013-12-11 | 北京航空航天大学 | Method and device for deterministic secure quantum communication based on EPR pairs and single photons |
CN108512659A (en) * | 2018-03-13 | 2018-09-07 | 成都信息工程大学 | A kind of quantum secret information sharing method and system suitable for company property management |
CN108880790A (en) * | 2018-05-28 | 2018-11-23 | 华南师范大学 | A kind of quantum ballot system and method based on quantum teleportation |
-
2018
- 2018-12-18 CN CN201811547503.5A patent/CN109711932B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103441819A (en) * | 2013-08-28 | 2013-12-11 | 北京航空航天大学 | Method and device for deterministic secure quantum communication based on EPR pairs and single photons |
CN108512659A (en) * | 2018-03-13 | 2018-09-07 | 成都信息工程大学 | A kind of quantum secret information sharing method and system suitable for company property management |
CN108880790A (en) * | 2018-05-28 | 2018-11-23 | 华南师范大学 | A kind of quantum ballot system and method based on quantum teleportation |
Non-Patent Citations (2)
Title |
---|
XIANG GAO ET AL.: "Cryptanalysis of the Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State", 《INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS》 * |
王辉 等: "有序双重的量子盲签名协议", 《通信学报》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110233732A (en) * | 2019-05-24 | 2019-09-13 | 西北大学 | A kind of dynamic quantum rotation gate proxy blind signing method based on cluster state |
CN116385000A (en) * | 2023-04-23 | 2023-07-04 | 山东大学 | Quantum group signature-based electronic payment method and system |
Also Published As
Publication number | Publication date |
---|---|
CN109711932B (en) | 2020-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10320569B1 (en) | Systems and methods for authenticating a digitally signed assertion using verified evaluators | |
CN108880790B (en) | Quantum voting system and method based on quantum invisible transmission state | |
WO2007092577A2 (en) | A point-of-sale terminal transactions using mutating identifiers | |
CN108141354B (en) | Quantum token | |
Luo et al. | A lightweight mutual authentication protocol for RFID networks | |
Cai et al. | A blockchain smart contract based on light-weighted quantum blind signature | |
US20200111095A1 (en) | Systems and methods for amplifying the strength of cryptographic algorithms | |
Xiaojun | An E-payment system based on quantum group signature | |
CN108694580B (en) | Payment system and method based on quantum encryption | |
CN110071814A (en) | A kind of quantum Proxy Signature method and system based on Bell state entanglement transfer | |
CN110166251A (en) | A kind of half quantum group signature method and system based on quantum walking | |
CN109816844A (en) | A kind of quantum ballot system based on quantum homomorphism signature | |
Zhang et al. | A novel E-payment protocol implented by blockchain and quantum signature | |
CN109711932A (en) | A kind of multigroup e-commerce endorsement method based on quantum teleportation | |
Cao et al. | A quantum proxy weak blind signature scheme | |
Shi et al. | A new quantum blind signature with unlinkability | |
Xiaojun et al. | An E-payment system based on quantum blind and group signature | |
Ren et al. | Building resilient Web 3.0 with quantum information technologies and blockchain: An ambilateral view | |
CN110100413A (en) | Robust for certification calculates Fuzzy extractor and method | |
CN109903028A (en) | A kind of electronic trade method, device, transaction originating end and medium | |
CN208190666U (en) | A kind of quantum ballot system based on quantum Proxy Signature | |
Gou et al. | A novel quantum E-payment protocol based on blockchain | |
Catherine et al. | Multi authority ciphertext-policy attribute-based encryption for security enhancement in cloud storage unit | |
CN101425901A (en) | Control method and device for customer identity verification in processing terminals | |
CN112884485A (en) | Symmetric encryption traceability transaction method, system and storage medium based on block chain network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20211220 Address after: 610095 902-905, floor 9, zone a, building 2, No. 200, Tianfu Fifth Street, high tech Zone, Chengdu, Sichuan Patentee after: Chengdu Jicun Technology Co.,Ltd. Address before: 610225, No. 24, Section 1, Xuefu Road, Southwest Economic Development Zone, Chengdu, Sichuan Patentee before: CHENGDU University OF INFORMATION TECHNOLOGY |