CN113517986A - Identity authentication method based on quantum walking and related equipment - Google Patents

Identity authentication method based on quantum walking and related equipment Download PDF

Info

Publication number
CN113517986A
CN113517986A CN202111077376.9A CN202111077376A CN113517986A CN 113517986 A CN113517986 A CN 113517986A CN 202111077376 A CN202111077376 A CN 202111077376A CN 113517986 A CN113517986 A CN 113517986A
Authority
CN
China
Prior art keywords
photon
sequence
quantum
quantum walking
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111077376.9A
Other languages
Chinese (zh)
Other versions
CN113517986B (en
Inventor
娄小平
王胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Normal University
Original Assignee
Hunan Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Normal University filed Critical Hunan Normal University
Priority to CN202111077376.9A priority Critical patent/CN113517986B/en
Publication of CN113517986A publication Critical patent/CN113517986A/en
Application granted granted Critical
Publication of CN113517986B publication Critical patent/CN113517986B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0855Quantum cryptography involving additional nodes, e.g. quantum relays, repeaters, intermediate nodes or remote nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Optical Communication System (AREA)

Abstract

The invention provides an identity authentication method based on quantum walking and related equipment, wherein the method comprises the following steps: the method comprises the steps of carrying out two-step quantum walking operation in a constructed quantum walking system by preparing a single photon sequence, carrying out Z-based measurement on the single photon sequence subjected to the two-step quantum walking, and judging whether a participant passes identity authentication or not according to a measurement result. The identity authentication method provided by the invention has higher feasibility and practicability, is easy to prepare, consumes less physical resources, and does not need to prepare entangled quantum at the previous stage, thereby avoiding risk leakage caused by the authentication process and improving the security of identity authentication. Meanwhile, the identity authentication method provided by the invention is experimentally verified on an IBM quantum cloud platform, and the verification result conforms to theoretical derivation, so that the identity authentication method provided by the invention is more practical.

Description

Identity authentication method based on quantum walking and related equipment
Technical Field
The invention relates to the technical field of quantum identity authentication, in particular to an identity authentication method based on quantum walking and related equipment.
Background
Identity authentication refers to a trusted process of verifying an identity of a network principal to confirm the identity of the network principal, which has appeared in about 60 s of the 20 th century and is applied to the field of computer technology. The identity authentication technology has been developed and applied for a long time and is roughly divided into three stages. The first stage mainly comprises forms of static passwords, dynamic passwords, third-party authorized login and the like, and the first stage is not eliminated although the risk of identity information leakage exists. The second generation identity authentication is represented by a public Key infrastructure (pki) technology and a block chain technology, and currently mainstream technologies such as an asymmetric encryption algorithm, a hash algorithm, and a digital certificate are applied thereto, and meanwhile, a lightweight identity authentication protocol represented by a Fast identity authentication (FIDO) standard appears, which is known to be highly secure, cross-platform, and protect user privacy. The third generation identity authentication technology is proposed under the background of the vigorous development of the high-speed mobile internet, mainly focuses on the emerging fields of biological feature recognition, big data user behavior analysis, quantum encryption and the like, meanwhile, due to the occurrence of quantum computation, a mass encryption algorithm based on the problems of big number decomposition and discrete logarithm becomes unsafe, and the current identity authentication technology faces huge challenges.
Quantum secure communication has gradually entered the implementation and application stage from theoretical design as a hotspot of quantum cryptography research. Currently, research into the field of quantum secure communications has been refined to various stages of communications, with the goal of pursuing higher security and efficiency. Among them, Quantum Identity Authentication (QIA) is a necessary premise for realizing Quantum communication. QIA is the combination of classical identity authentication and quantum communication theory, and its security is guaranteed by the fundamental properties of quantum mechanics, such as the uncertainty theory and the unclonable principle, which makes QIA more secure than classical identity authentication.
At present, a series of researches are carried out around QIA in China, and fruitful results are obtained. The scheme has the following characteristics: first, the proposed QIA scheme generally requires that a quantum sequence representing classical key information be transmitted to a third party certification authority, information required for certification be encoded in the quantum sequence with entanglement association, and the result of verification be issued by a third party. Secondly, the previous research on quantum identity authentication generally needs to prepare quantum entanglement states and distribute the quantum entanglement states to a verifier, and identity authentication is completed by using entanglement characteristics. However, since the entangled state sequence includes the key information, there is a risk of leakage during distribution, and preparation of the entangled state consumes more physical resources than preparation of a single photon.
Disclosure of Invention
In view of the above, the present invention is directed to an identity authentication method based on quantum walking and related devices.
Based on the above purpose, the invention provides an identity authentication method based on quantum walking, comprising the following steps:
a first party and a second party participating in identity authentication acquire a shared key through a sub-key distribution protocol, wherein the length of the shared key is n, and n is a positive integer;
the first party and the second party respectively prepare a first single-photon sequence and a second single-photon sequence which are n in length based on the shared secret key, and a third party certification authority participating in identity certification randomly prepares a group of single-photon sequences which are n in length and serve as a third single-photon sequence;
constructing a quantum walking system based on two-point complete graphs of two coins, wherein a single photon in a third single-photon sequence is used as a position state in the quantum walking system, a single photon in a first single-photon sequence is used as a first coin in the quantum walking system, a single photon in a second single-photon sequence is used as a second coin in the quantum walking system, and a third party certification mechanism carries out two-step quantum walking operation on each single photon in the third single-photon sequence, the single photon in the first single-photon sequence corresponding to the single photon in the third single-photon sequence and the single photon in the second single-photon sequence in sequence;
the third-party certification authority measures the third single-photon sequence after two-step quantum walking by selecting a matched measurement basis to obtain a measurement result;
and in response to determining that the measurement result is the same as the initial state of the third single-photon sequence, the identity authentication of the first party and the second party is passed, and if the measurement result is different from the initial state of the third single-photon sequence, the identity authentication is not passed.
Further, the first and second parties respectively prepare a first and second single-photon sequence of length n based on the shared key, including:
said mixtureThe shared key is expressed as
Figure DEST_PATH_IMAGE001
The first single-photon sequence is expressed as
Figure DEST_PATH_IMAGE002
The second single-photon sequence is expressed as
Figure DEST_PATH_IMAGE003
Wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE004
and
Figure DEST_PATH_IMAGE005
and
Figure DEST_PATH_IMAGE006
has a corresponding relationship of
Figure DEST_PATH_IMAGE007
1,2,…,n。
Further, the third-party certification authority performs two-step quantum walking operation on each single photon in the third single-photon sequence, the single photon in the first single-photon sequence corresponding to the third single-photon sequence, and the single photon in the second single-photon sequence corresponding to the third single-photon sequence, and the two-step quantum walking operation includes:
the third single-photon sequence is represented as
Figure DEST_PATH_IMAGE008
Said third party certification authority slave to said
Figure DEST_PATH_IMAGE009
Selecting one of the single photons
Figure DEST_PATH_IMAGE010
It is then mixed with
Figure DEST_PATH_IMAGE011
Single photon of (2)
Figure DEST_PATH_IMAGE012
And
Figure DEST_PATH_IMAGE013
single photon of (2)
Figure DEST_PATH_IMAGE014
Sequentially performing two-step quantum walking operation, specifically as
Figure DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE016
Wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE017
is an operator of the first step of quantum walking,
Figure DEST_PATH_IMAGE018
is an operator of the quantum walking of the second step,
Figure DEST_PATH_IMAGE019
for the controlled shift operator in the first step of quantum walking,
Figure 100002_DEST_PATH_IMAGE020
is a controlled shift operator when the quantum walks the second step, and C is a coin operator.
Further, the third-party certification authority measures the third single-photon sequence after the two-step quantum walking by selecting the matched measurement basis to obtain a measurement result, and the measurement result includes:
and the third-party certification authority selects a Z measurement basis to measure the third single-photon sequence after the two-step quantum walking.
Further, the responding to the determination that the measurement result is the same as the initial state of the third single-photon sequence, the identity authentication of the first participant and the second participant is passed, and if the measurement result is different from the initial state of the third single-photon sequence, the identity authentication is not passed, includes:
and in response to determining that each value in the measurement result is the same as the initial state of the corresponding single photon in the third single-photon sequence, passing the authentication of the first and second parties, and failing the authentication if any value in the measurement result is different from the corresponding single photon in the third single-photon sequence.
Based on the same invention concept, the invention also provides an identity authentication method and device based on quantum walking, which comprises the following steps:
the key acquisition module is configured to acquire a shared key through a child key distribution protocol by a first party and a second party participating in identity authentication, wherein the length of the shared key is n, and n is a positive integer;
the particle preparation module is configured to respectively prepare a first single-photon sequence and a second single-photon sequence which are n in length by the first party and the second party based on the shared secret key, and a third party certification authority participating in identity certification randomly prepares a group of single-photon sequences which are n in length and serve as a third single-photon sequence;
the quantum walking module is configured to construct a quantum walking system based on a two-point complete graph of two coins, a single photon in the third single-photon sequence is used as a position state in the quantum walking system, a single photon in the first single-photon sequence is used as a first coin in the quantum walking system, a single photon in the second single-photon sequence is used as a second coin in the quantum walking system, and the third party authentication mechanism carries out two-step quantum walking operation on each single photon in the third single-photon sequence, the single photon in the first single-photon sequence corresponding to the single photon in the third single-photon sequence and the single photon in the second single-photon sequence sequentially;
the result measuring module is configured to measure the third single-photon sequence after the two-step quantum walking by the third-party certification authority by selecting the matched measuring basis to obtain a measuring result;
an identity authentication module configured to pass identity authentication of the first and second parties in response to determining that the measurement result is the same as the initial state of the third single-photon sequence, and fail identity authentication if the measurement result is different from the initial state of the third single-photon sequence.
Based on the same inventive concept, the present invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable by the processor, wherein the processor implements the method as described above when executing the computer program.
Based on the same inventive concept, the present invention also provides a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the method as described above.
From the above, the identity authentication method based on quantum walking provided by the invention has the advantages that the single-photon sequence is prepared, the two-step quantum walking operation is carried out in the constructed quantum walking system, the Z-base measurement is carried out on the single-photon sequence subjected to the two-step quantum walking, and whether the participant passes the identity authentication or not is judged according to the measurement result. The identity authentication method provided by the invention has higher feasibility and practicability, is easy to prepare, consumes less physical resources, and does not need to prepare entangled quantum at the previous stage, thereby avoiding risk leakage caused by the authentication process and improving the security of identity authentication. Meanwhile, the identity authentication method provided by the invention is experimentally verified on an IBM quantum cloud platform, and the verification result conforms to theoretical derivation, so that the identity authentication method provided by the invention is more practical.
Drawings
In order to more clearly illustrate the technical solutions of the present invention or the related art, the drawings required to be used in the description of the embodiments or the related art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flow chart of an identity authentication method based on quantum walking according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a two-point complete view of two coins in accordance with an embodiment of the present invention;
FIG. 3 is a diagram of a quantum walking simulation circuit according to an embodiment of the present invention;
FIG. 4 is a diagram of a quantum walking simulation circuit with a shared secret key length of 3 according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an identity authentication device based on quantum walking according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to specific embodiments and the accompanying drawings.
It should be noted that technical terms or scientific terms used in the embodiments of the present invention should have the ordinary meanings as understood by those having ordinary skill in the art to which the present invention belongs, unless otherwise defined. The use of "first," "second," and similar language in the embodiments of the present invention does not denote any order, quantity, or importance, but rather the terms "first," "second," and similar language are used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that the element or item listed before the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items. The terms "connected" or "coupled" and the like are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect. "upper", "lower", "left", "right", and the like are used merely to indicate relative positional relationships, and when the absolute position of the object being described is changed, the relative positional relationships may also be changed accordingly.
Embodiments of the present invention are described in detail below with reference to the accompanying drawings.
The invention provides an identity authentication method based on quantum walking, which comprises the following steps with reference to fig. 1:
step S101, a first party and a second party participating in identity authentication acquire a shared key through a sub-key distribution protocol, wherein the length of the shared key is n, and n is a positive integer.
Specifically, in this embodiment, the first party and the second party are Alice and Bob, respectively, and the two parties obtain the shared Key with the length of n in advance through a quantum Key distribution QKD (quantum Key distribution) protocol, where the QKD protocol may specifically be a BB84 protocol, and the like. The shared secret represents the identity information of the participants, and only Alice and Bob know the shared secret, and no third party knows the secret.
Step S102, the first party and the second party respectively prepare a first single-photon sequence and a second single-photon sequence which are both n in length based on the shared secret key, and a third party certification authority participating in identity certification randomly prepares a group of single-photon sequences which are n in length and serve as a third single-photon sequence.
Specifically, the present embodiment further includes a third-party certification authority Charlie for assisting the identity certification of the participating party and publishing a certification result, and the third-party certification authority is defaulted to be semi-honest. The first party, the second party and the third party certification authority prepare single-photon sequences with the length of n for subsequent identity certification. The first party and the second party prepare single-photon sequences according to the acquired shared secret key, and the third party certification authority randomly prepares a group of single-photon sequences for verifying the identity of the parties.
Step S103, constructing a quantum walking system based on a two-point complete graph of two coins, wherein a single photon in a third single-photon sequence is used as a position state in the quantum walking system, a single photon in a first single-photon sequence is used as a first coin in the quantum walking system, a single photon in a second single-photon sequence is used as a second coin in the quantum walking system, and each single photon in the third single-photon sequence, the corresponding single photon in the first single-photon sequence and the corresponding single photon in the second single-photon sequence are subjected to two-step quantum walking operation by a third-party authentication mechanism.
In this embodiment, referring to fig. 2, a quantum walking system based on a two-point complete diagram of two coins is defined. In a full graph containing two vertices
Figure DEST_PATH_IMAGE021
In (1), the open circles represent vertices, the two vertices are labeled as vertex 0 and vertex 1, respectively, and the label on the vertex indicates the position. Each vertex has two directed edges, the edge labeled 1 points to the other vertex, the edge labeled 0 points to itself, and the label of the edge indicates the coin.
Setting coin operator for quantum walking on graph G
Figure 100002_DEST_PATH_IMAGE022
Figure DEST_PATH_IMAGE023
Is a Pauli operator
Figure DEST_PATH_IMAGE024
Controlled shift operatorTIs composed of
Figure DEST_PATH_IMAGE025
Wherein the shift operator
Figure DEST_PATH_IMAGE026
Figure DEST_PATH_IMAGE027
. Two coins a and b are arranged in the coin space
Figure DEST_PATH_IMAGE028
Assuming that the vertex currently located is c,
Figure DEST_PATH_IMAGE029
the vertex c and the coins a and b move in sequence in a quantum mode on the graph G. The definition of the vertex c and the result after the first quantum walking of the coin a is shown in formula 1,
Figure DEST_PATH_IMAGE030
(1)
the result definition after the second quantum walking of the vertex c and the coin b is shown in formula 2,
Figure DEST_PATH_IMAGE031
(2)
as shown in table 1, there are 8 results in the position c and the coins a and b after two quantum walks.
TABLE 1 results based on quantum walking on two-point complete graphs of two coins
Figure DEST_PATH_IMAGE032
As can be seen from table 1, when a, b, and c take different values, they correspond to different first-step quantum walking results and second-step quantum walking results. In this embodiment, the single photon in the first single-photon sequence is taken as a coin a, the single photon in the second single-photon sequence is taken as a coin b, and the single photon in the third single-photon sequence is taken as a peak c. And carrying out quantum walking on the single photons in each third single-photon sequence and the coins a and b respectively.
And step S104, the third-party certification authority measures the third single-photon sequence after the two-step quantum walking by selecting the matched measurement basis to obtain a measurement result.
Specifically, a single photon in the third single photon sequence after two-step quantum walking needs to obtain a specific state value through measurement of a measurement base, and the specific state value is used for subsequently judging the identity authentication of a participant.
Step S105, in response to determining that the measurement result is the same as the initial state of the third single-photon sequence, passing the identity authentication of the first party and the second party, and if the measurement result is different from the initial state of the third single-photon sequence, failing to pass the identity authentication.
Specifically, after measurement of the measurement basis, comparing whether the state value of each single photon in the third-party single photon sequence is the same as the initial state value, if so, determining that the identity authentication of the two parties passes, and if not, determining that the identity authentication of the two parties does not pass.
In some embodiments, the first and second parties respectively prepare first and second single-photon sequences of length n based on the shared key, including:
the shared secret key is represented as
Figure 98034DEST_PATH_IMAGE001
The first single-photon sequence is expressed as
Figure 343071DEST_PATH_IMAGE002
The second single-photon sequence is expressed as
Figure 434392DEST_PATH_IMAGE003
Wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE033
and
Figure DEST_PATH_IMAGE034
and
Figure DEST_PATH_IMAGE035
has a corresponding relationship of
Figure 547711DEST_PATH_IMAGE007
1,2,…,n。
Specifically, Key is a classical bit string,
Figure DEST_PATH_IMAGE036
when is coming into contact with
Figure DEST_PATH_IMAGE037
When the temperature of the water is higher than the set temperature,
Figure 100002_DEST_PATH_IMAGE038
Figure DEST_PATH_IMAGE039
when is coming into contact with
Figure DEST_PATH_IMAGE040
When the temperature of the water is higher than the set temperature,
Figure DEST_PATH_IMAGE041
Figure DEST_PATH_IMAGE042
in some embodiments, the third party certification authority performs a two-step quantum walking operation on each single photon in the third sequence of single photons sequentially with its corresponding single photon in the first sequence of single photons and single photon in the second sequence of single photons, comprising:
the third single-photon sequence is represented as
Figure DEST_PATH_IMAGE043
Said third party certification authority slave to said
Figure DEST_PATH_IMAGE044
Selecting one of the single photons
Figure DEST_PATH_IMAGE045
It is then mixed with
Figure DEST_PATH_IMAGE046
Single photon of (2)
Figure DEST_PATH_IMAGE047
And
Figure DEST_PATH_IMAGE048
single photon of (2)
Figure DEST_PATH_IMAGE049
Sequentially performing two-step quantum walking operation, specifically as
Figure DEST_PATH_IMAGE050
Figure DEST_PATH_IMAGE051
Wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE052
is an operator of the first step of quantum walking,
Figure DEST_PATH_IMAGE053
is an operator of the quantum walking of the second step,
Figure DEST_PATH_IMAGE054
for the controlled shift operator in the first step of quantum walking,
Figure DEST_PATH_IMAGE055
is a controlled shift operator when the quantum walks the second step, and C is a coin operator.
In particular, single photons
Figure DEST_PATH_IMAGE056
Firstly, the first quantum walking is carried out with the coin a, and then the second quantum walking is carried out with the coin b. Wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE057
Figure DEST_PATH_IMAGE058
Figure DEST_PATH_IMAGE059
the results of the two-step quantum walking can be referred to in table 1.
In some embodiments, the third-party certification authority measures the third single-photon sequence after two-step quantum walking by selecting a matching measurement basis to obtain a measurement result, including:
the third party certification authority selects Z measurement basisAnd measuring the third single-photon sequence after the two-step quantum walking. Selecting single photon with two-step quantum walking by considering Z measurement base property
Figure DEST_PATH_IMAGE060
The measurement is carried out, the value output by the measurement result is 0 or 1, and the measurement is convenient to carry out with a single photon
Figure DEST_PATH_IMAGE061
The initial state of (a) is compared.
In some embodiments, the determining that the measurement result is the same as the initial state of the third single-photon sequence, the identity authentication of the first and second parties is passed, and if not, the identity authentication is not passed includes:
and in response to determining that each value in the measurement result is the same as the initial state of the corresponding single photon in the third single-photon sequence, passing the authentication of the first and second parties, and failing the authentication if any value in the measurement result is different from the corresponding single photon in the third single-photon sequence.
Specifically, a third-party certification authority Charlie verifies the identities of the parties Alice and Bob based on a quantum walking system on a two-point complete graph of two coins, and the specific process is as follows:
step S201, if single photon sequence
Figure DEST_PATH_IMAGE062
If not, third party certification authority Charlie selects sequence
Figure 192710DEST_PATH_IMAGE062
The first single photon in (1)
Figure DEST_PATH_IMAGE063
If sequence
Figure 890539DEST_PATH_IMAGE062
If it is empty, go directly to step S204 to continueThe process is carried out.
Step S202, the third party certification authority Charlie uses the photon selected in the step S201
Figure 203578DEST_PATH_IMAGE063
Single photon sequence held by a first participant Alice
Figure DEST_PATH_IMAGE064
The coin of
Figure DEST_PATH_IMAGE065
And a single-photon sequence held by a second party Bob
Figure DEST_PATH_IMAGE066
Middle coin
Figure DEST_PATH_IMAGE067
The quantum walking on the two-point complete graph is performed sequentially,
Figure 510800DEST_PATH_IMAGE050
Figure 648520DEST_PATH_IMAGE051
step S203, after the two-step quantum walking is completed, the third party certification authority Charlie pair
Figure DEST_PATH_IMAGE068
The measurement of the Z base is carried out,
Figure DEST_PATH_IMAGE069
the measurement results are represented by 0 and 1, respectively
Figure DEST_PATH_IMAGE070
And
Figure DEST_PATH_IMAGE071
will then
Figure DEST_PATH_IMAGE072
From single-photon sequences
Figure DEST_PATH_IMAGE073
And removing. According to
Figure DEST_PATH_IMAGE074
Whether the measurement result is the same as that in the initial preparation or not is judged, if the measurement result is the same, the process returns to step S201, and if the measurement result is different, the process jumps to step S205.
And step S204, the identity authentication is passed, and the method is ended.
And step S205, if the identity verification fails, re-authenticating.
The identity authentication method provided by the present invention is exemplified below.
Example 1
The identity authentication passes the case:
the single-photon sequences obtained by the participants Alice and Bob through preparation are as follows:
Figure DEST_PATH_IMAGE075
Figure DEST_PATH_IMAGE076
prepared by third party certification authority Charlie
Figure DEST_PATH_IMAGE077
As follows:
Figure DEST_PATH_IMAGE078
at the same time, assume that
Figure DEST_PATH_IMAGE079
First and
Figure DEST_PATH_IMAGE080
carry out quantum walking and then with
Figure DEST_PATH_IMAGE081
And carrying out quantum walking. The results after two quantum walks are shown in table 2,
table 2 case execution procedure for authentication pass
Figure DEST_PATH_IMAGE082
As can be seen from the results of table 2,
Figure DEST_PATH_IMAGE083
the measurement result is the same as the initial state, and the parties Alice and Bob pass identity authentication.
Example 2
Identity authentication failed case:
suppose that the single-photon sequences of the participants Alice and Bob obtained by preparation are as follows:
Figure DEST_PATH_IMAGE084
Figure 779900DEST_PATH_IMAGE076
prepared by third party certification authority Charlie
Figure 268650DEST_PATH_IMAGE077
As follows:
Figure 645142DEST_PATH_IMAGE078
at the same time, assume that
Figure 902948DEST_PATH_IMAGE079
First and
Figure 677000DEST_PATH_IMAGE080
carry out quantum walking and then with
Figure 184205DEST_PATH_IMAGE081
And carrying out quantum walking. The results after two quantum walks are shown in table 3,
table 3 case execution procedure for failed authentication
Figure DEST_PATH_IMAGE085
Due to single photon sequence
Figure DEST_PATH_IMAGE086
And
Figure DEST_PATH_IMAGE087
in (1)
Figure DEST_PATH_IMAGE088
And
Figure DEST_PATH_IMAGE089
otherwise, the authentication process is not passed.
The invention not only provides an identity authentication method based on quantum walking, but also verifies the method on an IBM quantum cloud platform. Controlled shift operator in simulation of quantum walking by using quantum CNOT gate in experimentTUsing Pauli operator
Figure DEST_PATH_IMAGE090
Simulated coin operatorCUsing operatorsXAnd single photon
Figure DEST_PATH_IMAGE091
In combination to simulate the initial apex c and coins a, b.
As shown in FIG. 3, the quantum logic circuit simulates 8 cases shown in Table 1, wherein (a) corresponds to the result of quantum walking numbered 1 in Table 1, (b) corresponds to the result of quantum walking numbered 2 in Table 1, (c) corresponds to the result of quantum walking numbered 3 in Table 1, (d) corresponds to the result of quantum walking numbered 4 in Table 1, (e)Corresponds to the quantum walking result numbered 5 in table 1, (f) corresponds to the quantum walking result numbered 6 in table 1, (g) corresponds to the quantum walking result numbered 7 in table 1, and (h) corresponds to the quantum walking result numbered 7 in table 1. In the circuitq 0 The particles correspond to the apex c of the particle,q 1 andq 2 corresponding to coins a and b, respectively, columns 1 and 2 show the preparation of coins and initial vertices in quantum walking, column 3 shows the coin operator, columns 4 and 5 show the implementation of two-step quantum walking, columns 6, 7 and 8 show the experimental results returned by measuring each particle, the last column of circles represents the measurement results, dark grey represents the initial state change, and light grey represents the initial state unchanged. Taking (b) as an example, the initial values of a, b and c obtained by quantum preparation are respectively 0, 1 and 0, and after two quantum walks, the results of the two quantum walks are obtained by measurement as 0, 1 and 1, and other situations are similar and are not described again. All the quantum logic circuits in fig. 3 are operated, the operation parameter sets the operation times to be the maximum value 8192, and the quantum computer selects ibmq _ qasm _ simulator, which is a quantum computer implemented by a classical computer and can simulate the circuit operation process in an ideal environment. The experimental results are shown in table 4, and it is clear that the experimental results completely conform to the theoretical derivation in table 1.
Table 4 frequency distribution of operation results of quantum walking analog circuit in ideal environment
Figure DEST_PATH_IMAGE092
If the influence of noise on the scheme execution process is considered, the circuit in the figure 3 is operated, the operation times of the current operation parameter is set to be the maximum value 8192, and the quantum computer selects ibmq _ manila. Unlike ibmq _ qasm _ scalar, ibmq _ manila is a real quantum computer with 5 qubits, and noise can interfere with experimental results during circuit execution.
As shown in table 5, it is found through analysis that most cases in a noise environment return correct results with a frequency of 83% or more, and only a few cases, such as a =1, b =0, c =1 and a =1, b =0, c =1, return correct results with a frequency of less than 83%, but still 63% or more. The experimental result in the noise environment shows that the scheme can well resist the negative influence generated by noise, and can still return a correct result with high probability in the noise environment, so that the scheme is proved to have good performance in the actual communication environment.
TABLE 5 frequency distribution of operating results of a Quantum Walking analog Circuit in a noisy Environment
Figure DEST_PATH_IMAGE093
Based on the quantum walking analog circuit, a logic circuit is designed and operated on an IBM quantum cloud platform, as shown in FIG. 4. The operation parameter sets the operation frequency to be the maximum value 8192, the quantum computer selects ibmq _ qasm _ simulator, and the experimental result is shown in table 6.
In fig. 4, (i) is a schematic diagram of a quantum circuit that passes authentication, and (j) is a schematic diagram of a quantum circuit that does not pass authentication. The circuit uses a barrier to separate the logic steps of the scheme, wherein the first part corresponds to the single-photon preparation phase of the scheme, assuming that Alice and Bob previously used the QKD protocol to obtain a key with a length of 3, the single-photon sequence obtained by the preparation is as follows,
Figure DEST_PATH_IMAGE094
Figure DEST_PATH_IMAGE095
Figure DEST_PATH_IMAGE096
Figure DEST_PATH_IMAGE097
corresponding sequence
Figure 518716DEST_PATH_IMAGE077
Figure DEST_PATH_IMAGE098
Corresponding sequence
Figure DEST_PATH_IMAGE099
Figure DEST_PATH_IMAGE100
Corresponding sequence
Figure DEST_PATH_IMAGE101
. The identity authentication phase of the schemes corresponding to parts 2, 3 and 4 of fig. 4, where part 2 representsq 0 In sequence withq 3 Andq 6 carry out quantum walking andq 0 measurement of (2), part 2 showsq 1 In sequence withq 4 Andq 7 carry out quantum walking andq 1 measurement of (2), part 4 showsq 2 In sequence withq 5 Andq 8 carry out quantum walking andq 2 the measurement result of the experiment is the result of the identity authentication, as shown in table 6.
TABLE 6 operating results of Quantum identity authentication circuits in ideal environments
Figure DEST_PATH_IMAGE102
Analyzing the operation result of the circuit: circuit operation result of passing condition of authentication and during single photon preparation stage
Figure DEST_PATH_IMAGE103
The sequences are completely identical; circuit operation result of authentication failure and during single photon preparation stage
Figure 552400DEST_PATH_IMAGE103
The sequences being different, obviously sharing the corresponding position in the key information
Figure DEST_PATH_IMAGE104
. The experimental results are as expected.
It should be noted that the method of the embodiment of the present invention may be executed by a single device, such as a computer or a server. The method of the embodiment can also be applied to a distributed scene and completed by the mutual cooperation of a plurality of devices. In the case of such a distributed scenario, one of the multiple devices may only perform one or more steps of the method according to the embodiment of the present invention, and the multiple devices interact with each other to complete the method.
It should be noted that the above describes some embodiments of the invention. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments described above and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Based on the same inventive concept, the invention also provides an identity authentication method and device based on quantum walking, which is corresponding to the method of any embodiment.
Referring to fig. 5, the identity authentication method and apparatus based on quantum walking includes:
a key obtaining module 501, configured to obtain a shared key through a child key distribution protocol by a first party and a second party participating in identity authentication, where the shared key is n in length, and n is a positive integer;
a particle preparation module 502 configured to respectively prepare a first single-photon sequence and a second single-photon sequence with a length of n by the first party and the second party based on the shared secret key, and randomly prepare a group of single-photon sequences with a length of n as a third single-photon sequence by a third party certification authority participating in identity certification;
the quantum walking module 503 is configured to construct a quantum walking system based on a two-point complete graph of two coins, a single photon in the third single-photon sequence is used as a position state in the quantum walking system, a single photon in the first single-photon sequence is used as a first coin in the quantum walking system, a single photon in the second single-photon sequence is used as a second coin in the quantum walking system, and the third party certification mechanism performs two-step quantum walking operation on each single photon in the third single-photon sequence, the single photon in the first single-photon sequence corresponding to the single photon in the third single-photon sequence, and the single photon in the second single-photon sequence;
a result measurement module 504, configured to measure the third single-photon sequence after the two-step quantum walking by the third-party certification authority by selecting a matched measurement basis, so as to obtain a measurement result;
an identity authentication module 505 configured to pass the identity authentication of the first and second parties in response to determining that the measurement result is the same as the initial state of the third single-photon sequence, and fail the identity authentication if the measurement result is different from the initial state of the third single-photon sequence.
For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, the functionality of the various modules may be implemented in the same one or more software and/or hardware implementations of the invention.
The device of the above embodiment is used to implement the corresponding identity authentication method based on quantum walking in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Based on the same inventive concept, corresponding to the method of any embodiment described above, the present invention further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the quantum walking-based identity authentication method described in any embodiment described above.
Fig. 6 is a schematic diagram illustrating a more specific hardware structure of an electronic device according to this embodiment, where the electronic device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. Wherein the processor 1010, memory 1020, input/output interface 1030, and communication interface 1040 are communicatively coupled to each other within the device via bus 1050.
The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present disclosure.
The Memory 1020 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random Access Memory), a static storage device, a dynamic storage device, or the like. The memory 1020 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 1020 and called to be executed by the processor 1010.
The input/output interface 1030 is used for connecting an input/output module to input and output information. The input/output module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 1040 is used for connecting a communication module (not shown in the drawings) to implement communication interaction between the present apparatus and other apparatuses. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
Bus 1050 includes a path that transfers information between various components of the device, such as processor 1010, memory 1020, input/output interface 1030, and communication interface 1040.
It should be noted that although the above-mentioned device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040 and the bus 1050, in a specific implementation, the device may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
The electronic device of the above embodiment is used to implement the corresponding quantum walking-based identity authentication method in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Based on the same inventive concept, corresponding to any of the above-mentioned embodiment methods, the present invention also provides a non-transitory computer-readable storage medium storing computer instructions for causing the computer to execute the quantum walking-based identity authentication method according to any of the above embodiments.
Computer-readable media of the present embodiments, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The computer instructions stored in the storage medium of the above embodiment are used to enable the computer to execute the identity authentication method based on quantum walking as described in any of the above embodiments, and have the beneficial effects of the corresponding method embodiments, which are not described herein again.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, is limited to those examples; within the idea of the invention, also technical features in the above embodiments or in different embodiments may be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity.
In addition, well-known power/ground connections to Integrated Circuit (IC) chips and other components may or may not be shown within the provided figures for simplicity of illustration and discussion, and so as not to obscure the embodiments of the invention. Furthermore, devices may be shown in block diagram form in order to avoid obscuring embodiments of the present invention, and also in view of the fact that specifics with respect to implementation of such block diagram devices are highly dependent upon the platform within which the embodiments of the present invention are to be implemented (i.e., specifics should be well within purview of one skilled in the art). Where specific details (e.g., circuits) are set forth in order to describe example embodiments of the invention, it should be apparent to one skilled in the art that embodiments of the invention can be practiced without, or with variation of, these specific details. Accordingly, the description is to be regarded as illustrative instead of restrictive.
While the present invention has been described in conjunction with specific embodiments thereof, many alternatives, modifications, and variations of these embodiments will be apparent to those of ordinary skill in the art in light of the foregoing description. For example, other memory architectures (e.g., dynamic ram (dram)) may use the discussed embodiments.
The present embodiments are intended to embrace all such alternatives, modifications and variances which fall within the broad scope of the appended claims. Therefore, any omissions, modifications, substitutions, improvements and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the invention.

Claims (10)

1. An identity authentication method based on quantum walking is characterized by comprising the following steps:
a first party and a second party participating in identity authentication acquire a shared key through a sub-key distribution protocol, wherein the length of the shared key is n, and n is a positive integer;
the first party and the second party respectively prepare a first single-photon sequence and a second single-photon sequence which are n in length based on the shared secret key, and a third party certification authority participating in identity certification randomly prepares a group of single-photon sequences which are n in length and serve as a third single-photon sequence;
constructing a quantum walking system based on two-point complete graphs of two coins, wherein a single photon in a third single-photon sequence is used as a position state in the quantum walking system, a single photon in a first single-photon sequence is used as a first coin in the quantum walking system, a single photon in a second single-photon sequence is used as a second coin in the quantum walking system, and a third party certification mechanism carries out two-step quantum walking operation on each single photon in the third single-photon sequence, the single photon in the first single-photon sequence corresponding to the single photon in the third single-photon sequence and the single photon in the second single-photon sequence in sequence;
the third-party certification authority measures the third single-photon sequence after two-step quantum walking by selecting a matched measurement basis to obtain a measurement result;
and in response to determining that the measurement result is the same as the initial state of the third single-photon sequence, the identity authentication of the first party and the second party is passed, and if the measurement result is different from the initial state of the third single-photon sequence, the identity authentication is not passed.
2. The identity authentication method of claim 1, wherein the first and second parties respectively prepare a first and second single-photon sequence of length n based on the shared secret key, comprising:
the shared secret key is represented as
Figure 57171DEST_PATH_IMAGE001
The first single-photon sequence is expressed as
Figure 170768DEST_PATH_IMAGE002
The second single-photon sequence is expressed as
Figure 825872DEST_PATH_IMAGE003
Wherein the content of the first and second substances,
Figure 221081DEST_PATH_IMAGE004
and
Figure 973136DEST_PATH_IMAGE005
and
Figure 733282DEST_PATH_IMAGE006
has a corresponding relationship of
Figure 937998DEST_PATH_IMAGE007
1,2,…,n。
3. The identity authentication method of claim 2, wherein the third party authentication mechanism performs two-step quantum walking operations on each single photon in the third single-photon sequence with the corresponding single photon in the first single-photon sequence and the corresponding single photon in the second single-photon sequence, and comprises:
the third single-photon sequence is represented as
Figure 136899DEST_PATH_IMAGE008
SaidFrom which the third party certification authority derives
Figure 743460DEST_PATH_IMAGE009
Selecting one of the single photons
Figure 671578DEST_PATH_IMAGE010
It is then mixed with
Figure 425907DEST_PATH_IMAGE011
Single photon of (2)
Figure 100602DEST_PATH_IMAGE012
And
Figure 561670DEST_PATH_IMAGE013
single photon of (2)
Figure 929198DEST_PATH_IMAGE014
Sequentially performing two-step quantum walking operation, specifically as
Figure 170823DEST_PATH_IMAGE015
Figure 131433DEST_PATH_IMAGE016
Wherein the content of the first and second substances,
Figure 587953DEST_PATH_IMAGE017
is an operator of the first step of quantum walking,
Figure 798485DEST_PATH_IMAGE018
is an operator of the quantum walking of the second step,
Figure 527407DEST_PATH_IMAGE019
controlled shift calculation for quantum walking in the first stepIn the case of a hybrid vehicle,
Figure DEST_PATH_IMAGE020
is a controlled shift operator when the quantum walks the second step, and C is a coin operator.
4. The identity authentication method of claim 1, wherein the third-party authentication mechanism measures the third single-photon sequence after two-step quantum walking by selecting a matched measurement basis to obtain a measurement result, and the method comprises the following steps:
and the third-party certification authority selects a Z measurement basis to measure the third single-photon sequence after the two-step quantum walking.
5. The method of claim 1, wherein the responding to the determination that the measurement result is the same as the initial state of the third single-photon sequence comprises that the first participant and the second participant pass identity authentication, and if the measurement result is different from the initial state of the third single-photon sequence, the first participant and the second participant do not pass identity authentication, and the method comprises the following steps:
and in response to determining that each value in the measurement result is the same as the initial state of the corresponding single photon in the third single-photon sequence, passing the authentication of the first and second parties, and failing the authentication if any value in the measurement result is different from the corresponding single photon in the third single-photon sequence.
6. An identity authentication method device based on quantum walking is characterized by comprising the following steps:
the key acquisition module is configured to acquire a shared key through a child key distribution protocol by a first party and a second party participating in identity authentication, wherein the length of the shared key is n, and n is a positive integer;
the particle preparation module is configured to respectively prepare a first single-photon sequence and a second single-photon sequence which are n in length by the first party and the second party based on the shared secret key, and a third party certification authority participating in identity certification randomly prepares a group of single-photon sequences which are n in length and serve as a third single-photon sequence;
the quantum walking module is configured to construct a quantum walking system based on a two-point complete graph of two coins, a single photon in the third single-photon sequence is used as a position state in the quantum walking system, a single photon in the first single-photon sequence is used as a first coin in the quantum walking system, a single photon in the second single-photon sequence is used as a second coin in the quantum walking system, and the third party authentication mechanism carries out two-step quantum walking operation on each single photon in the third single-photon sequence, the single photon in the first single-photon sequence corresponding to the single photon in the third single-photon sequence and the single photon in the second single-photon sequence sequentially;
the result measuring module is configured to measure the third single-photon sequence after the two-step quantum walking by the third-party certification authority by selecting the matched measuring basis to obtain a measuring result;
an identity authentication module configured to pass identity authentication of the first and second parties in response to determining that the measurement result is the same as the initial state of the third single-photon sequence, and fail identity authentication if the measurement result is different from the initial state of the third single-photon sequence.
7. The apparatus of claim 6, wherein the particle preparation module, being specifically configured to prepare the first and second single-photon sequences of length n based on the shared key by the first and second parties respectively, comprises:
the shared secret key is represented as
Figure 354024DEST_PATH_IMAGE001
The first single-photon sequence is expressed as
Figure 789685DEST_PATH_IMAGE002
The second single-photon sequence is expressed as
Figure 499015DEST_PATH_IMAGE003
Wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE022
and
Figure 387336DEST_PATH_IMAGE024
and
Figure 676366DEST_PATH_IMAGE026
has a corresponding relationship of
Figure 700954DEST_PATH_IMAGE007
1,2,…,n。
8. The apparatus of claim 6, wherein the quantum walking module is specifically configured to perform a two-step quantum walking operation on each single photon in the third sequence of single photons with its corresponding single photon in the first sequence of single photons and the second sequence of single photons by the third-party certification authority, comprising:
the third single-photon sequence is represented as
Figure 377923DEST_PATH_IMAGE008
Said third party certification authority slave to said
Figure 485032DEST_PATH_IMAGE028
Selecting one of the single photons
Figure 640070DEST_PATH_IMAGE030
It is then mixed with
Figure 112639DEST_PATH_IMAGE032
Single photon of (2)
Figure 163772DEST_PATH_IMAGE034
And
Figure 761107DEST_PATH_IMAGE036
single photon of (2)
Figure DEST_PATH_IMAGE038
Sequentially performing two-step quantum walking operation, specifically as
Figure 188677DEST_PATH_IMAGE015
Figure 187857DEST_PATH_IMAGE016
Wherein the content of the first and second substances,
Figure 472208DEST_PATH_IMAGE017
is an operator of the first step of quantum walking,
Figure 822418DEST_PATH_IMAGE018
is an operator of the quantum walking of the second step,
Figure 991362DEST_PATH_IMAGE019
for the controlled shift operator in the first step of quantum walking,
Figure 172944DEST_PATH_IMAGE020
is a controlled shift operator when the quantum walks the second step, and C is a coin operator.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable by the processor, the processor implementing the method according to any one of claims 1 to 5 when executing the computer program.
10. A non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the method according to any one of claims 1 to 5.
CN202111077376.9A 2021-09-15 2021-09-15 Identity authentication method based on quantum walking and related equipment Active CN113517986B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111077376.9A CN113517986B (en) 2021-09-15 2021-09-15 Identity authentication method based on quantum walking and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111077376.9A CN113517986B (en) 2021-09-15 2021-09-15 Identity authentication method based on quantum walking and related equipment

Publications (2)

Publication Number Publication Date
CN113517986A true CN113517986A (en) 2021-10-19
CN113517986B CN113517986B (en) 2021-11-23

Family

ID=78063438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111077376.9A Active CN113517986B (en) 2021-09-15 2021-09-15 Identity authentication method based on quantum walking and related equipment

Country Status (1)

Country Link
CN (1) CN113517986B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113904779A (en) * 2021-12-10 2022-01-07 湖南师范大学 Identity authentication method, system, equipment and storage medium based on super-secret code
CN114640448A (en) * 2022-03-25 2022-06-17 重庆邮电大学 Quantum privacy ordering method based on quantum random walk
CN114826605A (en) * 2022-03-28 2022-07-29 华南理工大学 Data security sharing block chain system based on quantum key distribution

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017001850A1 (en) * 2015-07-02 2017-01-05 Adrian Kent Quantum tokens
CN107493168A (en) * 2017-09-07 2017-12-19 中国电子科技集团公司第三十研究所 Quanta identity authentication method and its application process during quantum key distribution
CN109586909A (en) * 2019-01-21 2019-04-05 成都信息工程大学 Based on Bell state quantal data library access control and Bidirectional identity authentication method
CN110061787A (en) * 2019-04-25 2019-07-26 成都信息工程大学 A kind of half quantum safety direct communication method and system based on Bell's state
CN110166251A (en) * 2019-05-17 2019-08-23 成都信息工程大学 A kind of half quantum group signature method and system based on quantum walking
CN110213060A (en) * 2019-07-05 2019-09-06 成都信息工程大学 A kind of quantum Proxy Signature method and system that the nothing based on quantum walking is tangled
CN110445609A (en) * 2019-08-23 2019-11-12 成都信息工程大学 A kind of quantum secret sharing method and shared system based on quantum walking
CN111082937A (en) * 2020-01-10 2020-04-28 华北电力大学 Bidirectional identity authentication method based on single photon
CN111404691A (en) * 2020-03-02 2020-07-10 成都信息工程大学 Quantum secret sharing method and system with credible authentication based on quantum walking
CN111464314A (en) * 2020-04-02 2020-07-28 北京工业大学 Quantum synchronization bidirectional identity authentication method based on single photon
CN112822006A (en) * 2020-12-22 2021-05-18 华北电力大学 Quantum one-vote privacy voting method based on single photon

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017001850A1 (en) * 2015-07-02 2017-01-05 Adrian Kent Quantum tokens
CN107493168A (en) * 2017-09-07 2017-12-19 中国电子科技集团公司第三十研究所 Quanta identity authentication method and its application process during quantum key distribution
CN109586909A (en) * 2019-01-21 2019-04-05 成都信息工程大学 Based on Bell state quantal data library access control and Bidirectional identity authentication method
CN110061787A (en) * 2019-04-25 2019-07-26 成都信息工程大学 A kind of half quantum safety direct communication method and system based on Bell's state
CN110166251A (en) * 2019-05-17 2019-08-23 成都信息工程大学 A kind of half quantum group signature method and system based on quantum walking
CN110213060A (en) * 2019-07-05 2019-09-06 成都信息工程大学 A kind of quantum Proxy Signature method and system that the nothing based on quantum walking is tangled
CN110445609A (en) * 2019-08-23 2019-11-12 成都信息工程大学 A kind of quantum secret sharing method and shared system based on quantum walking
CN111082937A (en) * 2020-01-10 2020-04-28 华北电力大学 Bidirectional identity authentication method based on single photon
CN111404691A (en) * 2020-03-02 2020-07-10 成都信息工程大学 Quantum secret sharing method and system with credible authentication based on quantum walking
CN111464314A (en) * 2020-04-02 2020-07-28 北京工业大学 Quantum synchronization bidirectional identity authentication method based on single photon
CN112822006A (en) * 2020-12-22 2021-05-18 华北电力大学 Quantum one-vote privacy voting method based on single photon

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
XIAOPING LOU: "Quantum Distributed Ballot Scheme based on entanglement swapping", 《2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11》 *
娄小平: "一种可验证的量子匿名通信方案", 《小型微型计算机系统》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113904779A (en) * 2021-12-10 2022-01-07 湖南师范大学 Identity authentication method, system, equipment and storage medium based on super-secret code
CN114640448A (en) * 2022-03-25 2022-06-17 重庆邮电大学 Quantum privacy ordering method based on quantum random walk
CN114640448B (en) * 2022-03-25 2024-05-28 北京神州数码云科信息技术有限公司 Quantum privacy ordering method based on quantum random walk
CN114826605A (en) * 2022-03-28 2022-07-29 华南理工大学 Data security sharing block chain system based on quantum key distribution
CN114826605B (en) * 2022-03-28 2023-08-18 华南理工大学 Data security sharing method and blockchain system based on quantum key distribution

Also Published As

Publication number Publication date
CN113517986B (en) 2021-11-23

Similar Documents

Publication Publication Date Title
CN113517986B (en) Identity authentication method based on quantum walking and related equipment
US9471279B2 (en) Random number generation using untrusted quantum devices
Datta Quantum discord between relatively accelerated observers
US9471280B2 (en) Extraction of random numbers from physical systems
Pironio et al. Focus on device independent quantum information
TWI804832B (en) Systems and methods for facilitating and hardening key exchange procedures against quantum computing threats
JP5488596B2 (en) Signature device, signature verification device, anonymous authentication system, signature method, signature authentication method, and programs thereof
Navascués et al. Characterizing finite-dimensional quantum behavior
CN105474575B (en) Secure Verification System, certificate server, intermediate server, Secure authentication method and program
Mironowicz et al. Experimentally feasible semi-device-independent certification of four-outcome positive-operator-valued measurements
US10812265B1 (en) Using cryptographic co-processors in a supersingular isogeny-based cryptosystem
CN107645376B (en) Long code private key amplification method for continuous variable quantum key distribution
Mironowicz et al. Properties of dimension witnesses and their semidefinite programming relaxations
Wortman et al. P2M‐based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices
JP2022095852A (en) Digital signature method, signature information verification method, related device, and electronic device
Galetsky et al. Comparison of Quantum PUF models
Ikken et al. Bidirectional quantum teleportation of even and odd coherent states through the multipartite Glauber coherent state: Theory and implementation
JPWO2013129084A1 (en) Information processing apparatus, information processing method, and program
US11477021B1 (en) Systems and methods for universal three-dimensional quantum random number generation and encryption
CN116170144B (en) Smart power grid anonymous authentication method, electronic equipment and storage medium
Khan et al. Soteria: A quantum-based device attestation technique for the Internet of Things
CN114448613B (en) Physical layer key generation method and device of communication system and electronic equipment
Wu et al. Cryptanalysis and improvement of Ye et al’s quantum private comparison protocol
Lou et al. Quantum identity authentication scheme based on quantum walks on graphs with ibm quantum cloud platform
CN116137564A (en) Ciphertext decryption method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant