CN110336659A - A kind of multi-party quantum key machinery of consultation, terminal and storage device - Google Patents

A kind of multi-party quantum key machinery of consultation, terminal and storage device Download PDF

Info

Publication number
CN110336659A
CN110336659A CN201910600518.1A CN201910600518A CN110336659A CN 110336659 A CN110336659 A CN 110336659A CN 201910600518 A CN201910600518 A CN 201910600518A CN 110336659 A CN110336659 A CN 110336659A
Authority
CN
China
Prior art keywords
state
information
negotiation
quantum
interaction end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910600518.1A
Other languages
Chinese (zh)
Inventor
孙志伟
成荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Polytechnic
Original Assignee
Shenzhen Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Polytechnic filed Critical Shenzhen Polytechnic
Priority to CN201910600518.1A priority Critical patent/CN110336659A/en
Publication of CN110336659A publication Critical patent/CN110336659A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Optical Communication System (AREA)

Abstract

The present invention provides a kind of multi-party quantum key agreement method, terminal and storage devices, including N number of negotiation interaction end, are denoted as P respectivelyi, each PiRespectively one information coding state of preparationAnd eavesdropping detection state;Then the information coding state radom insertion is obtained into new quantum state sequence into eavesdropping detection stateEach PiIt will respectively obtainIt is sent to Pi+1;Pi+1With PiChannel safety detection is carried out, first round circulation is completed, next round circulation is carried out if judging channel safety until completing N wheel circulation, finally, all negotiation interaction ends announce respective randomly selected numerical value at random and the secret negotiation key of N number of interaction end are calculated based on the property of tenth of the twelve Earthly Branches operation.This agreement can be realized in Single quantum system; key generation efficiency is improved using ultra dense coding techniques; it can be provided based on quantum-mechanical theory and negotiate higher safety than classical code key, and the fairness of participant can be effectively protected, prevent the generation of malicious user control key.

Description

A kind of multi-party quantum key machinery of consultation, terminal and storage device
Technical field
The invention belongs to quantum cryptology technical field more particularly to a kind of multi-party quantum key agreement methods.
Background technique
Key agreement (key agreement, KA) is a most basic, most crucial proposition of contemporary cryptology, it is Establish the key of cryptographic system mechanism.Key agreement is all the research hotspot of cryptography all the time.Its purpose is so that two Side can safely negotiate a shared session key in many ways, the key by be used for cryptographic system secret communication or Safety calculates.Therefore, the security intensity of cryptographic system is largely dependent upon the safety of key agreement.
Classical key agreement scheme needs a special server to store the password of participant, as a result attacker The password of participant's preservation can be obtained by server.
Therefore, classic key negotiates the presence of very big security risk.
Summary of the invention
Technical problem to be solved by the present invention lies in provide a kind of multi-party quantum key agreement method, it is intended to solve warp There is very big security risk in allusion quotation key agreement.
In order to solve the above technical problems, the invention is realized in this way, a kind of multi-party quantum key agreement method, including N A negotiation interaction end, is denoted as P respectivelyi, 0≤i≤N-1, each secret information for negotiating interaction end is respectively x0,x1,...,xN-1 ∈ { 0,1 ..., d-1 }, d are odd prime, PiIn cipher key agreement process, under be designated as modN operation, machinery of consultation includes such as Under:
A kind of multi-party quantum key agreement method, which is characterized in that including N number of negotiation interaction end, be denoted as P respectivelyi, 0≤ I≤N-1, each secret information for negotiating interaction end is respectively x0,x1,...,xN-1∈ { 0,1 ..., d-1 }, d is odd prime, PiIn cipher key agreement process, under be designated as modN operation, machinery of consultation includes the following:
Step S1, the first round recycles: each PiOne is respectively prepared for encoding the quantum state of secret informationClaim For information coding state, and the quantum state sequence for detecting channel safety, referred to as eavesdropping detection state;By the information coding State radom insertion obtains new quantum state sequence into eavesdropping detection stateEach negotiation interaction end PiIt will respectively obtain 'sIt is sent to next negotiation interaction end Pi+1
Step S2, channel safety detects: next negotiation interaction end Pi+1With upper negotiation interaction end PiCarry out channel Safety detection, if being judged as, safety thens follow the steps S3, otherwise return step S1;
Step S3, the second wheel circulation: Pi+1By what is receivedRemoval eavesdropping detection state, obtains information coding state Pi+1A numerical value is taken at random, and combines secret information xi+1It is rightTenth of the twelve Earthly Branches operation is carried out, new information coding state is obtainedAnd radom insertion obtains new quantum state sequence into eavesdropping detection statePi+1It willIt is sent to next Negotiate interaction end Pi+2
Step S4, channel safety detects: next negotiation interaction end Pi+2With upper negotiation interaction end Pi+1Carry out channel Safety inspection, the next round executed if passing through with step S3 recycle, and take turns circulation until completing N, otherwise return step S1;
Step S5, all negotiation interaction ends announce respective randomly selected numerical value at random, based on the property of tenth of the twelve Earthly Branches operation, meter Calculation obtains N number of secret negotiation key.
Further, in the step S1,Wherein, ai,bi∈ { 0,1 ..., d-1 } is indicated B in set MiThe a of group baseiA vector, M indicate that the set of d group base vector, the dimension of base are d, the quantum state difference in M ForIndicate the coding of vector in each base, v =0,1 ..., d-1 indicates the coding of every group of base.
Further, in the step S1, the eavesdropping detection state is the ordered sequence comprising q quantum state:
Further, the step S2 includes:
Step S21, PiTo Pi+1Each quantum state in the eavesdropping detection state is sent to existIn location information and corresponding Base information dgIt is worth, wherein g ∈ { 1,2 ..., q };
Step S22, Pi+1According to the positional information and the dgValue measures eavesdropping detection state, and at random will Wherein the measurement result of half is sent to Pi, PiTo Pi+1The other half initial preparation state information of the eavesdropping detection state is disclosed; PiWith Pi+1By comparing the initial preparation state information of measurement result and the eavesdropping detection state, to determine whether channel is safe.
Further, the measurement result is compared with eavesdropping detection state, if error rate is less than preset Threshold value is then judged as safety, is otherwise judged as dangerous.
Further, in the step S3, the Pi+1A numerical value is taken at random, and combines secret information xi+1It is rightInto The operation of the row tenth of the twelve Earthly Branches, comprising:
Pi+1A numerical value is taken at randomIt is rightImplement tenth of the twelve Earthly Branches operationObtain new amount Sub- state isWherein xi+1∈ 0,1 ..., and d-1 } it is Pi+1The secret information of input,
Further, the step S5 includes:
Step S51, N number of negotiation interaction end announces its randomly selected numerical value according to random orderFor all Pi, calculateJ is calculated result;
Step S52, calculated result J, P are based oniIn baseUnder to the information coding received State measures, and measurement result isIt willIt is encoded to classical information m, wherein m∈{0,1,...,d-1};
Step S53, it is operated based on the tenth of the twelve Earthly BranchesProperty, be calculatedThus it obtains N number of secret negotiation key for negotiating interaction end are as follows:
A kind of terminal carries out multi-party quantum key negotiation, the terminal for N number of negotiation interaction end It include: processor, the memory that is connect with processor communication, the memory is stored with computer program, the processor tune With the multi-party quantum key agreement method as described above of realization when the computer program.
A kind of storage device carries out multi-party quantum key negotiation, the storage device storage for N number of negotiation interaction end There is computer program, the computer program is performed realization multi-party quantum key agreement method as described above.
Compared with prior art, the present invention beneficial effect is: multi-party quantum key agreement method of the invention have with Lower advantage: (1) this agreement can be realized in Single quantum system, it has big advantage in terms of scalability, and utilize super Code technology improves key generation efficiency;(2) quantum key is negotiated to provide based on quantum-mechanical theory more secret than classical Key negotiates higher safety;(3) fairness of user can be effectively protected in the key agreement scheme, prevent malicious user The generation of control key.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to this hair It is bright to be further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, not For limiting the present invention.
In the present invention in many ways in cipher key agreement process, it is assumed that classical channel has been certified with quantum channel, and is not had There is the loss of noise and information.N participants pass through N number of negotiation interaction end P respectivelyi(0≤i≤N-1), carry out key association Quotient.Assuming that each secret information for negotiating interaction end is respectively x0,x1,...,xN-1∈ { 0,1 ..., d-1 }, d is odd prime, Participant PiIn cipher key agreement process, under be designated as modN operation, i.e. N participant is according to suitable in cipher key agreement process Sequence Pi→Pi+1→…→PN-1→ PN-2→…→Pi-1→PiSuccessively hold consultation.
Multi-party quantum key agreement method of the invention includes the following steps S1-S5:
Step S1, the first round recycles: each PiOne is respectively prepared for encoding the quantum state of secret informationClaim For information coding state, and the quantum state sequence for detecting channel safety, referred to as eavesdropping detection state;By the information coding State radom insertion obtains new quantum state sequence into eavesdropping detection stateEach negotiation interaction end PiIt will respectively obtain 'sIt is sent to next negotiation interaction end Pi+1
Specifically, to all i=0,1 ..., N-1, PiRandom one quantum state of preparationMark it ForIndicate b in set MiThe a of group baseiA vector, P in protocol proceduresiNo Reveal aiAnd biValue give anyone.Wherein, M indicates that the set of d group base vector, the dimension of base are d, the quantum state difference in M For Indicate vector in each base Coding, v=0,1 ..., d-1 indicate the coding of every group of base.Such asIndicate u-th of vector of v group base.Whole For encoding the secret information of participant, referred to as information coding state in a protocol procedures.In order to detect the safety of channel, Need additional quantum state, referred to as eavesdropping detection state.Eavesdropping detection state is by PiIt is random to generate, wherein including q orderly amounts Sub- state, such asThe value of q depends on the security level of system, and q is bigger, safety Rank is higher.Then PiIt encodes information onto the random orderly eavesdropping that is inserted into of state to detect in state sequence, forms new quantum state SequenceLast PiIt willIt is sent to Pi+1
Step S2, channel safety detects: next negotiation interaction end Pi+1With upper negotiation interaction end PiCarry out channel Safety detection, if being judged as, safety thens follow the steps S3, otherwise return step S1.
One specific embodiment of channel safety detection, includes the following steps S21, step S22.
Step S21, PiTo Pi+1Each quantum state in the eavesdropping detection state is sent to existIn location information and corresponding Base information dgIt is worth, wherein g ∈ { 1,2 ..., q }.
Step S22, Pi+1According to the positional information and the dgValue measures eavesdropping detection state, and random The measurement result of wherein half is sent to Pi, PiTo Pi+1The other half the initial preparation state letter of the eavesdropping detection state is disclosed Breath;PiWith Pi+1Each by the initial preparation state information for comparing measurement result and the eavesdropping detection state, to determine that channel is No safety.
Specifically, when determining all Pi+1It receivesAfterwards, PiTo Pi+1Inform that q detection state existsIn position letter Breath and corresponding q dgIt is worth, wherein g ∈ { 1,2 ..., q }.Pi+1According to PiInformation dg, eavesdropping is examined under corresponding base It surveys state to measure, and records measurement result.Pi+1Tell the measurement result of half to P at randomi, then PiThe other half is disclosed The information of initial preparation state.PiWith Pi+1By measurement result and it is initial when prepare eavesdropping detection state information, it is right respectively Channel carries out safety detection, calculates error rate.An error rate threshold can be previously set, if error rate is more than the threshold value, PiWith Pi+1Acknowledgement channel has eavesdropping, dangerous, and terminates and this time communicate, and return step S1 restarts this agreement.Otherwise, It is judged as safety.
Step S3, the second wheel circulation: Pi+1By what is receivedRemoval eavesdropping detection state, obtains information coding state Pi+1A numerical value is taken at random, and combines secret information xi+1It is rightTenth of the twelve Earthly Branches operation is carried out, new information coding state is obtainedAnd radom insertion obtains new quantum state sequence into eavesdropping detection statePi+1It willIt is sent to next Negotiate interaction end Pi+2
Specifically, after judging channel safety, Pi+1By what is receivedRemoval eavesdropping detection state, obtains information coding statePi+1Random takes a numerical valueAnd to information coding stateImplement tenth of the twelve Earthly Branches operationForming new quantum state (coding state) isWherein xi+1∈ 0,1 ..., and d-1 } it is Pi+1Input it is secret Confidential information,Then Pi+1Random preparation contains q quantum state Eavesdropping detect state, be inserted into the information coding state after coding is random in orderly eavesdropping detection state sequence, formed new Quantum state sequenceLast Pi+1It willIt is sent to Pi+2。Pi+1To the q eavesdropping detection state secrecy prepared at random, do not reveal To any participant.
Step S4, channel safety detects: next negotiation interaction end Pi+2With upper negotiation interaction end Pi+1Carry out channel Safety inspection, the next round executed if passing through with step 3 recycle, and take turns circulation until completing N, otherwise return step S1.
Specifically, as all Pi+2It receivesAfterwards, Pi+1The open q detection state prepared at random existsIn position Information and q corresponding dgValue.Pi+2According to Pi+1Information dg, eavesdropping detection state is surveyed under corresponding base Amount, and record measurement result.Pi+2Tell the measurement result of half to P at randomi+1, then Pi+1The other half initial preparation is disclosed The information of state.Pi+1With Pi+2By measurement result and it is initial when prepare eavesdropping detection state information, to channel carry out safety Detection, calculates error rate.If error rate is more than preset threshold value, Pi+1With Pi+2Acknowledgement channel has eavesdropping, and terminates It this time communicates, returns to step S1, restart this agreement.Otherwise, Pi+2After removal eavesdropping detection state, information volume has just been obtained Code state
Step S5, all negotiation interaction ends announce respectively randomly selected numerical value according to random order, are operated based on the tenth of the twelve Earthly Branches Property, N number of secret negotiation key is calculated.
The present invention provides the methods of the following N number of secret negotiation key of calculating, including step S51-S53.
Step S51, PiRandom selection Pn, n ∈ { 0,1 ..., N-1 }, all participants announce its randomly selected number ValueI.e. N number of negotiation interaction end does not need to be announced according to cycle calculations sequence above-mentioned, can adopt It is announced with random order, PiIt calculatesJ is calculated result.
Step S52, according to calculated result J, PiIn baseUnder to the information coding received State measures, and measurement result isThen willIt is encoded to classical information m, Wherein m ∈ { 0,1 ..., d-1 }.
Step S53, it is operated based on the tenth of the twelve Earthly BranchesProperty, be calculatedThus it obtains N number of secret negotiation key for negotiating interaction end are as follows:
The all or part of technical solution of the present invention the part that contributes to existing technology or the technical solution can To be expressed in the form of software products, which is stored in a storage medium, including some instructions With so that terminal (can be personal computer, server or the network equipment an etc.) execution present invention is each The all or part of the steps of embodiment the method.And storage device above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk Etc. the various media that can store program code.
The Correctness Analysis of agreement
If all participant's honesty execute agreement, Pi, i ∈ 0,1 ..., and N-1 } it can correctly calculate final association Quotient's key.In agreement above, PiThe information coding state of preparation isWhat every participant possessed Secret information is respectively x0,x1,...,xN-1∈{0,1,...,d-1}.N number of participant is respectively to information coding stateImplement After tenth of the twelve Earthly Branches operation, information coding state becomes
By can be obtained above:
ai+x0+...+xN-1=mmodd (2)
That is, if PiIn baseLower measurement, final message coding state areMeasurement result is encoded to ai+x0+...+xN-1=mmodd, final PiIt can be easily Calculating final arranging key is K=x0+...+xN-1=(m-a) modd.
The safety analysis of agreement
The attack of Main Analysis two ways, one is external attacks: external attacker attempts to obtain the final association of user Quotient's key;One is internal attack: participant attempts to control final key generation.Arranging key participant is one special Internal attacker, he possesses attacking ability more stronger than external attacker.Attack analysis process is as follows:
(1) external attack
In this agreement, in order to detect external attack, between any two subscriber channel, examined using q eavesdropping detection state Attack is surveyed, which is known as inveigling state technology.Inveigling state technology is one of main detection Eavesdropping of quantum cryptography, the party Method is most suggested early in BB84 agreement, and the Security Proof of this method has been proved to.It is any that quantum channel is stolen Behavior is listened, will be all detected.Using the eavesdropping detection technique, present existing various attack means are such as intercepted to reset and be attacked Hit, measure Replay Attack, tangle measurement attack etc., it will be all invalid.For example, it is assumed that attack is attacked using reproducing process is intercepted The agreement.Assuming that external attacker Eve attempts to obtain the secret information of participant, she needs to obtain for secret encryption information Initial quantum state information and final encrypted quantum information, thus to be inferred to the tenth of the twelve Earthly Branches operation that ciphering process is implemented. Obviously, which is doomed failure.Firstly, Eve can not obtain the information of initial quantum state, the information is in entire agreement mistake It maintains secrecy always in journey.Eve may attempt to intercept initial data state, and the quantum state for sending oneself some preparation is sent to and connects Debit.However this mode is in eavesdropping that detection-phase is very easy is just detected.It is passed in the quantum state and channel of Eve preparation The completely the same probability of defeated quantum state is 1/d, then the probability that Eve is detected is 1- (1/d) in detection processq.Work as q When sufficiently large, which is intended to 1.Therefore, which can effectively resist external attacker attack.
(2) it internals attack: participant's collusion of any N-1 malice.
Internal participant possesses more resources than external attacker, can be obtained by lying in protocol procedures Economic interests.Therefore, all QKA agreements must can resist the attack of internal attacker.Internal attacker's attack can divide For two processes: key steals the stage and key overturns the stage.Stolen the stage in key, internal conspirator it is available other The key exclusive or information of legitimate user.Then they can control final shared key in the key overturning stage, make Shared code key finally is obtained no longer by the common fair generation of all participants.Why conspirator can obtain legitimate user The exclusive or information of key is that conspirator generates initial quantum state, and conspirator shares all letters of the initial quantum state Breath.There is the information of initial state, the user in two specific positions, which can smoothly measure, obtains the close of intermediate legitimate user Key exclusive or information.
Consider under worst case, only one honest user Pt, t ∈ { 0 ..., N-1 }, remaining N-1 user's collusion. In the case, if collusion attack success, N-1 user needs to obtain P before agreement terminatestKey Kt, specifically retouch It states as conspirator sends message coding sequence and gives user Pt, PtBy the secret information of oneself and randomly select y ∈ 0, 1 ..., d-1 } it is encoded to message coding sequence, then the message coding sequence after coding is sent by eavesdropping detection technique To next user, then other N-2 user successively carries out eavesdropping detection operation and operates without any information coding. Due to PtDo not disclose oneself randomly selects information y, therefore N-1 user can not select correctly to measure base to information volume Code state measures, and the correct probability for choosing measurement base is 1/d, therefore is also unable to get any about PtSecret information.? With regard to saying, PtCryptographic operation carried out to message coding state using y, key is stolen in attack is no longer feasible, and agreement can resist safely Portion attacker.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Protocol efficiency analysis
In agreement of the invention, it is assumed that d can be expressed as N-bit binary number, in order to generate the key of LN length, Each user generates L single quantum state (information coding state) and L eavesdropping detects state.Since information coding state transmits n times, So every wheel agreement needs LN eavesdropping detection state in total.Because of N number of user, N is needed to take turns agreement, so needing N (L+ in total LN) a quantum state.In order to decode final arranging key, user needs to announce the classical bit of LN (N-1).Therefore protocol bits Rate can be calculated,And existing quantum key negotiation maximum bit rate isTherefore, bit rate of the invention has obtained larger promotion.

Claims (9)

1. a kind of multi-party quantum key agreement method, which is characterized in that including N number of negotiation interaction end, be denoted as P respectivelyi, 0≤i≤ N-1, each secret information for negotiating interaction end is respectively x0,x1,...,xN-1∈ { 0,1 ..., d-1 }, d are odd prime, Pi? In cipher key agreement process, under be designated as modN operation, machinery of consultation includes the following:
Step S1, the first round recycles: each PiOne is respectively prepared for encoding the quantum state of secret informationReferred to as information State, and the quantum state sequence for detecting channel safety are encoded, referred to as eavesdropping detection state;By the information coding state with the machine transplanting of rice Enter into eavesdropping detection state, obtains new quantum state sequenceEach negotiation interaction end PiIt will respectively obtainIt sends To next negotiation interaction end Pi+1
Step S2, channel safety detects: next negotiation interaction end Pi+1With upper negotiation interaction end PiCarry out channel safety inspection It surveys, if being judged as, safety thens follow the steps S3, otherwise return step S1;
Step S3, the second wheel circulation: Pi+1By what is receivedRemoval eavesdropping detection state, obtains information coding statePi+1At random A numerical value is taken, and combines secret information xi+1It is rightTenth of the twelve Earthly Branches operation is carried out, new information coding state is obtainedAnd it is random It is inserted into eavesdropping detection state, obtains new quantum state sequencePi+1It willIt is sent to next negotiation interaction end Pi+2
Step S4, channel safety detects: next negotiation interaction end Pi+2With upper negotiation interaction end Pi+1Carry out channel safety It checks, recycles, recycled until completing N wheel, otherwise return step S1 if executing the next round with step S3 if;
Step S5, all negotiation interaction ends are announced respective randomly selected numerical value at random and are calculated based on the property of tenth of the twelve Earthly Branches operation N number of secret negotiation key.
2. multi-party quantum key agreement method as described in claim 1, which is characterized in that in the step S1,Wherein, ai,bi∈ { 0,1 ..., d-1 } indicates b in set MiThe a of group baseiA vector, M table Show that the set of d group base vector, the dimension of base are d, the quantum state in M is respectivelyIndicate the volume of vector in each base Code, v=0,1 ..., d-1 indicate the coding of every group of base.
3. multi-party quantum key agreement method as claimed in claim 2, which is characterized in that in the step S1, the eavesdropping Detection state is the ordered sequence comprising q quantum state:
4. multi-party quantum key agreement method as claimed in claim 3, which is characterized in that the step S2 includes:
Step S21, PiTo Pi+1Each quantum state in the eavesdropping detection state is sent to existIn location information and corresponding base letter Cease dgIt is worth, wherein g ∈ { 1,2 ..., q };
Step S22, Pi+1According to the positional information and the dgValue measures eavesdropping detection state, and at random will wherein one Half measurement result is sent to Pi, PiTo Pi+1The other half initial preparation state information of the eavesdropping detection state is disclosed;PiWith Pi+1 By comparing the initial preparation state information of measurement result and the eavesdropping detection state, to determine whether channel is safe.
5. multi-party quantum key agreement method as claimed in claim 4, which is characterized in that steal the measurement result with described It listens detection state to compare, if error rate is less than preset threshold value, is judged as safety, is otherwise judged as dangerous.
6. multi-party quantum key agreement method as claimed in claim 4, which is characterized in that in the step S3, the Pi+1With Machine takes a numerical value, and combines secret information xi+1It is rightCarry out tenth of the twelve Earthly Branches operation, comprising:
Pi+1A numerical value is taken at randomIt is rightImplement tenth of the twelve Earthly Branches operationObtain new quantum state ForWherein xi+1∈ 0,1 ..., and d-1 } it is Pi+1The secret information of input,
7. multi-party quantum key agreement method as claimed in claim 6, which is characterized in that the step S5 includes:
Step S51, N number of negotiation interaction end announces its randomly selected numerical value according to random orderIt is right In all Pi, calculateJ is calculated result;
Step S52, calculated result J, P are based oniIn baseUnder the information coding state that receives is carried out Measurement, measurement result areIt willBe encoded to classical information m, wherein m ∈ 0, 1,...,d-1};
Step S53, it is operated based on the tenth of the twelve Earthly BranchesProperty, be calculatedThus N number of association is obtained The secret negotiation key of quotient's interaction end are as follows:
8. a kind of terminal, which is characterized in that carry out multi-party quantum key negotiation, the meter for N number of negotiation interaction end The memory that calculation machine terminal includes: processor, is connect with processor communication, the memory is stored with computer program, described Processor realizes such as the described in any item multi-party quantum key agreement methods of claim 1-7 when calling the computer program.
9. a kind of storage device, which is characterized in that carry out multi-party quantum key negotiation, the storage for N number of negotiation interaction end Device is stored with computer program, and it is described in any item multi-party that the computer program is performed realization such as claim 1-7 Quantum key agreement method.
CN201910600518.1A 2019-07-04 2019-07-04 A kind of multi-party quantum key machinery of consultation, terminal and storage device Pending CN110336659A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910600518.1A CN110336659A (en) 2019-07-04 2019-07-04 A kind of multi-party quantum key machinery of consultation, terminal and storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910600518.1A CN110336659A (en) 2019-07-04 2019-07-04 A kind of multi-party quantum key machinery of consultation, terminal and storage device

Publications (1)

Publication Number Publication Date
CN110336659A true CN110336659A (en) 2019-10-15

Family

ID=68143134

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910600518.1A Pending CN110336659A (en) 2019-07-04 2019-07-04 A kind of multi-party quantum key machinery of consultation, terminal and storage device

Country Status (1)

Country Link
CN (1) CN110336659A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111970111A (en) * 2020-10-22 2020-11-20 深圳职业技术学院 Quantum zero knowledge proof-based block chain consensus mechanism establishing method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105846999A (en) * 2016-06-14 2016-08-10 泰山学院 Multi-side quantum secret key negotiation method based on unidirectional transmission loop
CN106712936A (en) * 2016-12-20 2017-05-24 中国电子科技集团公司第三十研究所 Ring structure based multi-party quantum key agreement protocol
US20170346627A1 (en) * 2015-01-09 2017-11-30 Institut Mines-Telecom Communication with everlasting security from short-term-secure encrypted quantum communication
CN108632261A (en) * 2018-04-24 2018-10-09 深圳职业技术学院 Multi-party quantum summation method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170346627A1 (en) * 2015-01-09 2017-11-30 Institut Mines-Telecom Communication with everlasting security from short-term-secure encrypted quantum communication
CN105846999A (en) * 2016-06-14 2016-08-10 泰山学院 Multi-side quantum secret key negotiation method based on unidirectional transmission loop
CN106712936A (en) * 2016-12-20 2017-05-24 中国电子科技集团公司第三十研究所 Ring structure based multi-party quantum key agreement protocol
CN108632261A (en) * 2018-04-24 2018-10-09 深圳职业技术学院 Multi-party quantum summation method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111970111A (en) * 2020-10-22 2020-11-20 深圳职业技术学院 Quantum zero knowledge proof-based block chain consensus mechanism establishing method and system
CN111970111B (en) * 2020-10-22 2021-01-05 深圳职业技术学院 Quantum zero knowledge proof-based block chain consensus mechanism establishing method and system

Similar Documents

Publication Publication Date Title
Wazid et al. LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
Zhou et al. Provable secure authentication protocol with anonymity for roaming service in global mobility networks
US8484469B2 (en) Method, system and equipment for key distribution
WO2021000329A1 (en) Multi-party quantum key agreement method, computer terminal and storage device
Maitra et al. A robust ElGamal‐based password‐authentication protocol using smart card for client‐server communication
CN105991285A (en) Identity authentication methods, devices and system applied to quantum key distribution process
Giri et al. Efficient biometric and password based mutual authentication for consumer USB mass storage devices
Rührmair et al. Practical security analysis of PUF-based two-player protocols
CN109379176B (en) Password leakage resistant authentication and key agreement method
CN110213060A (en) A kind of quantum Proxy Signature method and system that the nothing based on quantum walking is tangled
CN110855667B (en) Block chain encryption method, device and system
CN113114456B (en) Multi-user quantum privacy query method with authentication
Bhattacharya et al. ASPA-MOSN: An efficient user authentication scheme for phishing attack detection in mobile online social networks
Chikouche et al. Improved RFID authentication protocol based on randomized McEliece cryptosystem
CN110336659A (en) A kind of multi-party quantum key machinery of consultation, terminal and storage device
CN110365477A (en) Can collusion resistant quantum key agreement method, terminal and storage device
Li et al. An improved two-factor user authentication protocol for wireless sensor networks using elliptic curve cryptography
Roe et al. Secure sessions from weak secrets
Li et al. A simple and robust anonymous two‐factor authenticated key exchange protocol
Nikooghadam et al. HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment
US11159317B2 (en) SpaceFlip plus: ordinal cryptography
Jiang et al. PRUB: a privacy protection friend recommendation system based on user behavior
ÖZCANHAN et al. Mersenne twister-based RFID authentication protocol
Lee et al. Forward anonymity-preserving secure remote authentication scheme
Sahi et al. Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191015

RJ01 Rejection of invention patent application after publication