CN113517986A - Identity authentication method based on quantum walking and related equipment - Google Patents
Identity authentication method based on quantum walking and related equipment Download PDFInfo
- Publication number
- CN113517986A CN113517986A CN202111077376.9A CN202111077376A CN113517986A CN 113517986 A CN113517986 A CN 113517986A CN 202111077376 A CN202111077376 A CN 202111077376A CN 113517986 A CN113517986 A CN 113517986A
- Authority
- CN
- China
- Prior art keywords
- photon
- sequence
- quantum
- quantum walking
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0855—Quantum cryptography involving additional nodes, e.g. quantum relays, repeaters, intermediate nodes or remote nodes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Optical Communication System (AREA)
Abstract
The invention provides an identity authentication method based on quantum walking and related equipment, wherein the method comprises the following steps: the method comprises the steps of carrying out two-step quantum walking operation in a constructed quantum walking system by preparing a single photon sequence, carrying out Z-based measurement on the single photon sequence subjected to the two-step quantum walking, and judging whether a participant passes identity authentication or not according to a measurement result. The identity authentication method provided by the invention has higher feasibility and practicability, is easy to prepare, consumes less physical resources, and does not need to prepare entangled quantum at the previous stage, thereby avoiding risk leakage caused by the authentication process and improving the security of identity authentication. Meanwhile, the identity authentication method provided by the invention is experimentally verified on an IBM quantum cloud platform, and the verification result conforms to theoretical derivation, so that the identity authentication method provided by the invention is more practical.
Description
Technical Field
The invention relates to the technical field of quantum identity authentication, in particular to an identity authentication method based on quantum walking and related equipment.
Background
Identity authentication refers to a trusted process of verifying an identity of a network principal to confirm the identity of the network principal, which has appeared in about 60 s of the 20 th century and is applied to the field of computer technology. The identity authentication technology has been developed and applied for a long time and is roughly divided into three stages. The first stage mainly comprises forms of static passwords, dynamic passwords, third-party authorized login and the like, and the first stage is not eliminated although the risk of identity information leakage exists. The second generation identity authentication is represented by a public Key infrastructure (pki) technology and a block chain technology, and currently mainstream technologies such as an asymmetric encryption algorithm, a hash algorithm, and a digital certificate are applied thereto, and meanwhile, a lightweight identity authentication protocol represented by a Fast identity authentication (FIDO) standard appears, which is known to be highly secure, cross-platform, and protect user privacy. The third generation identity authentication technology is proposed under the background of the vigorous development of the high-speed mobile internet, mainly focuses on the emerging fields of biological feature recognition, big data user behavior analysis, quantum encryption and the like, meanwhile, due to the occurrence of quantum computation, a mass encryption algorithm based on the problems of big number decomposition and discrete logarithm becomes unsafe, and the current identity authentication technology faces huge challenges.
Quantum secure communication has gradually entered the implementation and application stage from theoretical design as a hotspot of quantum cryptography research. Currently, research into the field of quantum secure communications has been refined to various stages of communications, with the goal of pursuing higher security and efficiency. Among them, Quantum Identity Authentication (QIA) is a necessary premise for realizing Quantum communication. QIA is the combination of classical identity authentication and quantum communication theory, and its security is guaranteed by the fundamental properties of quantum mechanics, such as the uncertainty theory and the unclonable principle, which makes QIA more secure than classical identity authentication.
At present, a series of researches are carried out around QIA in China, and fruitful results are obtained. The scheme has the following characteristics: first, the proposed QIA scheme generally requires that a quantum sequence representing classical key information be transmitted to a third party certification authority, information required for certification be encoded in the quantum sequence with entanglement association, and the result of verification be issued by a third party. Secondly, the previous research on quantum identity authentication generally needs to prepare quantum entanglement states and distribute the quantum entanglement states to a verifier, and identity authentication is completed by using entanglement characteristics. However, since the entangled state sequence includes the key information, there is a risk of leakage during distribution, and preparation of the entangled state consumes more physical resources than preparation of a single photon.
Disclosure of Invention
In view of the above, the present invention is directed to an identity authentication method based on quantum walking and related devices.
Based on the above purpose, the invention provides an identity authentication method based on quantum walking, comprising the following steps:
a first party and a second party participating in identity authentication acquire a shared key through a sub-key distribution protocol, wherein the length of the shared key is n, and n is a positive integer;
the first party and the second party respectively prepare a first single-photon sequence and a second single-photon sequence which are n in length based on the shared secret key, and a third party certification authority participating in identity certification randomly prepares a group of single-photon sequences which are n in length and serve as a third single-photon sequence;
constructing a quantum walking system based on two-point complete graphs of two coins, wherein a single photon in a third single-photon sequence is used as a position state in the quantum walking system, a single photon in a first single-photon sequence is used as a first coin in the quantum walking system, a single photon in a second single-photon sequence is used as a second coin in the quantum walking system, and a third party certification mechanism carries out two-step quantum walking operation on each single photon in the third single-photon sequence, the single photon in the first single-photon sequence corresponding to the single photon in the third single-photon sequence and the single photon in the second single-photon sequence in sequence;
the third-party certification authority measures the third single-photon sequence after two-step quantum walking by selecting a matched measurement basis to obtain a measurement result;
and in response to determining that the measurement result is the same as the initial state of the third single-photon sequence, the identity authentication of the first party and the second party is passed, and if the measurement result is different from the initial state of the third single-photon sequence, the identity authentication is not passed.
Further, the first and second parties respectively prepare a first and second single-photon sequence of length n based on the shared key, including:
Wherein the content of the first and second substances,andandhas a corresponding relationship of1,2,…,n。
Further, the third-party certification authority performs two-step quantum walking operation on each single photon in the third single-photon sequence, the single photon in the first single-photon sequence corresponding to the third single-photon sequence, and the single photon in the second single-photon sequence corresponding to the third single-photon sequence, and the two-step quantum walking operation includes:
the third single-photon sequence is represented asSaid third party certification authority slave to saidSelecting one of the single photonsIt is then mixed withSingle photon of (2)Andsingle photon of (2)Sequentially performing two-step quantum walking operation, specifically as
Wherein the content of the first and second substances,is an operator of the first step of quantum walking,is an operator of the quantum walking of the second step,for the controlled shift operator in the first step of quantum walking,is a controlled shift operator when the quantum walks the second step, and C is a coin operator.
Further, the third-party certification authority measures the third single-photon sequence after the two-step quantum walking by selecting the matched measurement basis to obtain a measurement result, and the measurement result includes:
and the third-party certification authority selects a Z measurement basis to measure the third single-photon sequence after the two-step quantum walking.
Further, the responding to the determination that the measurement result is the same as the initial state of the third single-photon sequence, the identity authentication of the first participant and the second participant is passed, and if the measurement result is different from the initial state of the third single-photon sequence, the identity authentication is not passed, includes:
and in response to determining that each value in the measurement result is the same as the initial state of the corresponding single photon in the third single-photon sequence, passing the authentication of the first and second parties, and failing the authentication if any value in the measurement result is different from the corresponding single photon in the third single-photon sequence.
Based on the same invention concept, the invention also provides an identity authentication method and device based on quantum walking, which comprises the following steps:
the key acquisition module is configured to acquire a shared key through a child key distribution protocol by a first party and a second party participating in identity authentication, wherein the length of the shared key is n, and n is a positive integer;
the particle preparation module is configured to respectively prepare a first single-photon sequence and a second single-photon sequence which are n in length by the first party and the second party based on the shared secret key, and a third party certification authority participating in identity certification randomly prepares a group of single-photon sequences which are n in length and serve as a third single-photon sequence;
the quantum walking module is configured to construct a quantum walking system based on a two-point complete graph of two coins, a single photon in the third single-photon sequence is used as a position state in the quantum walking system, a single photon in the first single-photon sequence is used as a first coin in the quantum walking system, a single photon in the second single-photon sequence is used as a second coin in the quantum walking system, and the third party authentication mechanism carries out two-step quantum walking operation on each single photon in the third single-photon sequence, the single photon in the first single-photon sequence corresponding to the single photon in the third single-photon sequence and the single photon in the second single-photon sequence sequentially;
the result measuring module is configured to measure the third single-photon sequence after the two-step quantum walking by the third-party certification authority by selecting the matched measuring basis to obtain a measuring result;
an identity authentication module configured to pass identity authentication of the first and second parties in response to determining that the measurement result is the same as the initial state of the third single-photon sequence, and fail identity authentication if the measurement result is different from the initial state of the third single-photon sequence.
Based on the same inventive concept, the present invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable by the processor, wherein the processor implements the method as described above when executing the computer program.
Based on the same inventive concept, the present invention also provides a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the method as described above.
From the above, the identity authentication method based on quantum walking provided by the invention has the advantages that the single-photon sequence is prepared, the two-step quantum walking operation is carried out in the constructed quantum walking system, the Z-base measurement is carried out on the single-photon sequence subjected to the two-step quantum walking, and whether the participant passes the identity authentication or not is judged according to the measurement result. The identity authentication method provided by the invention has higher feasibility and practicability, is easy to prepare, consumes less physical resources, and does not need to prepare entangled quantum at the previous stage, thereby avoiding risk leakage caused by the authentication process and improving the security of identity authentication. Meanwhile, the identity authentication method provided by the invention is experimentally verified on an IBM quantum cloud platform, and the verification result conforms to theoretical derivation, so that the identity authentication method provided by the invention is more practical.
Drawings
In order to more clearly illustrate the technical solutions of the present invention or the related art, the drawings required to be used in the description of the embodiments or the related art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flow chart of an identity authentication method based on quantum walking according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a two-point complete view of two coins in accordance with an embodiment of the present invention;
FIG. 3 is a diagram of a quantum walking simulation circuit according to an embodiment of the present invention;
FIG. 4 is a diagram of a quantum walking simulation circuit with a shared secret key length of 3 according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an identity authentication device based on quantum walking according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to specific embodiments and the accompanying drawings.
It should be noted that technical terms or scientific terms used in the embodiments of the present invention should have the ordinary meanings as understood by those having ordinary skill in the art to which the present invention belongs, unless otherwise defined. The use of "first," "second," and similar language in the embodiments of the present invention does not denote any order, quantity, or importance, but rather the terms "first," "second," and similar language are used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that the element or item listed before the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items. The terms "connected" or "coupled" and the like are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect. "upper", "lower", "left", "right", and the like are used merely to indicate relative positional relationships, and when the absolute position of the object being described is changed, the relative positional relationships may also be changed accordingly.
Embodiments of the present invention are described in detail below with reference to the accompanying drawings.
The invention provides an identity authentication method based on quantum walking, which comprises the following steps with reference to fig. 1:
step S101, a first party and a second party participating in identity authentication acquire a shared key through a sub-key distribution protocol, wherein the length of the shared key is n, and n is a positive integer.
Specifically, in this embodiment, the first party and the second party are Alice and Bob, respectively, and the two parties obtain the shared Key with the length of n in advance through a quantum Key distribution QKD (quantum Key distribution) protocol, where the QKD protocol may specifically be a BB84 protocol, and the like. The shared secret represents the identity information of the participants, and only Alice and Bob know the shared secret, and no third party knows the secret.
Step S102, the first party and the second party respectively prepare a first single-photon sequence and a second single-photon sequence which are both n in length based on the shared secret key, and a third party certification authority participating in identity certification randomly prepares a group of single-photon sequences which are n in length and serve as a third single-photon sequence.
Specifically, the present embodiment further includes a third-party certification authority Charlie for assisting the identity certification of the participating party and publishing a certification result, and the third-party certification authority is defaulted to be semi-honest. The first party, the second party and the third party certification authority prepare single-photon sequences with the length of n for subsequent identity certification. The first party and the second party prepare single-photon sequences according to the acquired shared secret key, and the third party certification authority randomly prepares a group of single-photon sequences for verifying the identity of the parties.
Step S103, constructing a quantum walking system based on a two-point complete graph of two coins, wherein a single photon in a third single-photon sequence is used as a position state in the quantum walking system, a single photon in a first single-photon sequence is used as a first coin in the quantum walking system, a single photon in a second single-photon sequence is used as a second coin in the quantum walking system, and each single photon in the third single-photon sequence, the corresponding single photon in the first single-photon sequence and the corresponding single photon in the second single-photon sequence are subjected to two-step quantum walking operation by a third-party authentication mechanism.
In this embodiment, referring to fig. 2, a quantum walking system based on a two-point complete diagram of two coins is defined. In a full graph containing two verticesIn (1), the open circles represent vertices, the two vertices are labeled as vertex 0 and vertex 1, respectively, and the label on the vertex indicates the position. Each vertex has two directed edges, the edge labeled 1 points to the other vertex, the edge labeled 0 points to itself, and the label of the edge indicates the coin.
Setting coin operator for quantum walking on graph G,Is a Pauli operatorControlled shift operatorTIs composed ofWherein the shift operator,. Two coins a and b are arranged in the coin spaceAssuming that the vertex currently located is c,the vertex c and the coins a and b move in sequence in a quantum mode on the graph G. The definition of the vertex c and the result after the first quantum walking of the coin a is shown in formula 1,
the result definition after the second quantum walking of the vertex c and the coin b is shown in formula 2,
as shown in table 1, there are 8 results in the position c and the coins a and b after two quantum walks.
TABLE 1 results based on quantum walking on two-point complete graphs of two coins
As can be seen from table 1, when a, b, and c take different values, they correspond to different first-step quantum walking results and second-step quantum walking results. In this embodiment, the single photon in the first single-photon sequence is taken as a coin a, the single photon in the second single-photon sequence is taken as a coin b, and the single photon in the third single-photon sequence is taken as a peak c. And carrying out quantum walking on the single photons in each third single-photon sequence and the coins a and b respectively.
And step S104, the third-party certification authority measures the third single-photon sequence after the two-step quantum walking by selecting the matched measurement basis to obtain a measurement result.
Specifically, a single photon in the third single photon sequence after two-step quantum walking needs to obtain a specific state value through measurement of a measurement base, and the specific state value is used for subsequently judging the identity authentication of a participant.
Step S105, in response to determining that the measurement result is the same as the initial state of the third single-photon sequence, passing the identity authentication of the first party and the second party, and if the measurement result is different from the initial state of the third single-photon sequence, failing to pass the identity authentication.
Specifically, after measurement of the measurement basis, comparing whether the state value of each single photon in the third-party single photon sequence is the same as the initial state value, if so, determining that the identity authentication of the two parties passes, and if not, determining that the identity authentication of the two parties does not pass.
In some embodiments, the first and second parties respectively prepare first and second single-photon sequences of length n based on the shared key, including:
Wherein the content of the first and second substances,andandhas a corresponding relationship of1,2,…,n。
Specifically, Key is a classical bit string,when is coming into contact withWhen the temperature of the water is higher than the set temperature,,when is coming into contact withWhen the temperature of the water is higher than the set temperature,,。
in some embodiments, the third party certification authority performs a two-step quantum walking operation on each single photon in the third sequence of single photons sequentially with its corresponding single photon in the first sequence of single photons and single photon in the second sequence of single photons, comprising:
the third single-photon sequence is represented asSaid third party certification authority slave to saidSelecting one of the single photonsIt is then mixed withSingle photon of (2)Andsingle photon of (2)Sequentially performing two-step quantum walking operation, specifically as
Wherein the content of the first and second substances,is an operator of the first step of quantum walking,is an operator of the quantum walking of the second step,for the controlled shift operator in the first step of quantum walking,is a controlled shift operator when the quantum walks the second step, and C is a coin operator.
In particular, single photonsFirstly, the first quantum walking is carried out with the coin a, and then the second quantum walking is carried out with the coin b. Wherein the content of the first and second substances,,,the results of the two-step quantum walking can be referred to in table 1.
In some embodiments, the third-party certification authority measures the third single-photon sequence after two-step quantum walking by selecting a matching measurement basis to obtain a measurement result, including:
the third party certification authority selects Z measurement basisAnd measuring the third single-photon sequence after the two-step quantum walking. Selecting single photon with two-step quantum walking by considering Z measurement base propertyThe measurement is carried out, the value output by the measurement result is 0 or 1, and the measurement is convenient to carry out with a single photonThe initial state of (a) is compared.
In some embodiments, the determining that the measurement result is the same as the initial state of the third single-photon sequence, the identity authentication of the first and second parties is passed, and if not, the identity authentication is not passed includes:
and in response to determining that each value in the measurement result is the same as the initial state of the corresponding single photon in the third single-photon sequence, passing the authentication of the first and second parties, and failing the authentication if any value in the measurement result is different from the corresponding single photon in the third single-photon sequence.
Specifically, a third-party certification authority Charlie verifies the identities of the parties Alice and Bob based on a quantum walking system on a two-point complete graph of two coins, and the specific process is as follows:
step S201, if single photon sequenceIf not, third party certification authority Charlie selects sequenceThe first single photon in (1)If sequenceIf it is empty, go directly to step S204 to continueThe process is carried out.
Step S202, the third party certification authority Charlie uses the photon selected in the step S201Single photon sequence held by a first participant AliceThe coin ofAnd a single-photon sequence held by a second party BobMiddle coinThe quantum walking on the two-point complete graph is performed sequentially,
step S203, after the two-step quantum walking is completed, the third party certification authority Charlie pairThe measurement of the Z base is carried out,the measurement results are represented by 0 and 1, respectivelyAndwill thenFrom single-photon sequencesAnd removing. According toWhether the measurement result is the same as that in the initial preparation or not is judged, if the measurement result is the same, the process returns to step S201, and if the measurement result is different, the process jumps to step S205.
And step S204, the identity authentication is passed, and the method is ended.
And step S205, if the identity verification fails, re-authenticating.
The identity authentication method provided by the present invention is exemplified below.
Example 1
The identity authentication passes the case:
the single-photon sequences obtained by the participants Alice and Bob through preparation are as follows:
at the same time, assume thatFirst andcarry out quantum walking and then withAnd carrying out quantum walking. The results after two quantum walks are shown in table 2,
table 2 case execution procedure for authentication pass
As can be seen from the results of table 2,the measurement result is the same as the initial state, and the parties Alice and Bob pass identity authentication.
Example 2
Identity authentication failed case:
suppose that the single-photon sequences of the participants Alice and Bob obtained by preparation are as follows:
at the same time, assume thatFirst andcarry out quantum walking and then withAnd carrying out quantum walking. The results after two quantum walks are shown in table 3,
table 3 case execution procedure for failed authentication
The invention not only provides an identity authentication method based on quantum walking, but also verifies the method on an IBM quantum cloud platform. Controlled shift operator in simulation of quantum walking by using quantum CNOT gate in experimentTUsing Pauli operatorSimulated coin operatorCUsing operatorsXAnd single photonIn combination to simulate the initial apex c and coins a, b.
As shown in FIG. 3, the quantum logic circuit simulates 8 cases shown in Table 1, wherein (a) corresponds to the result of quantum walking numbered 1 in Table 1, (b) corresponds to the result of quantum walking numbered 2 in Table 1, (c) corresponds to the result of quantum walking numbered 3 in Table 1, (d) corresponds to the result of quantum walking numbered 4 in Table 1, (e)Corresponds to the quantum walking result numbered 5 in table 1, (f) corresponds to the quantum walking result numbered 6 in table 1, (g) corresponds to the quantum walking result numbered 7 in table 1, and (h) corresponds to the quantum walking result numbered 7 in table 1. In the circuitq 0 The particles correspond to the apex c of the particle,q 1 andq 2 corresponding to coins a and b, respectively, columns 1 and 2 show the preparation of coins and initial vertices in quantum walking, column 3 shows the coin operator, columns 4 and 5 show the implementation of two-step quantum walking, columns 6, 7 and 8 show the experimental results returned by measuring each particle, the last column of circles represents the measurement results, dark grey represents the initial state change, and light grey represents the initial state unchanged. Taking (b) as an example, the initial values of a, b and c obtained by quantum preparation are respectively 0, 1 and 0, and after two quantum walks, the results of the two quantum walks are obtained by measurement as 0, 1 and 1, and other situations are similar and are not described again. All the quantum logic circuits in fig. 3 are operated, the operation parameter sets the operation times to be the maximum value 8192, and the quantum computer selects ibmq _ qasm _ simulator, which is a quantum computer implemented by a classical computer and can simulate the circuit operation process in an ideal environment. The experimental results are shown in table 4, and it is clear that the experimental results completely conform to the theoretical derivation in table 1.
Table 4 frequency distribution of operation results of quantum walking analog circuit in ideal environment
If the influence of noise on the scheme execution process is considered, the circuit in the figure 3 is operated, the operation times of the current operation parameter is set to be the maximum value 8192, and the quantum computer selects ibmq _ manila. Unlike ibmq _ qasm _ scalar, ibmq _ manila is a real quantum computer with 5 qubits, and noise can interfere with experimental results during circuit execution.
As shown in table 5, it is found through analysis that most cases in a noise environment return correct results with a frequency of 83% or more, and only a few cases, such as a =1, b =0, c =1 and a =1, b =0, c =1, return correct results with a frequency of less than 83%, but still 63% or more. The experimental result in the noise environment shows that the scheme can well resist the negative influence generated by noise, and can still return a correct result with high probability in the noise environment, so that the scheme is proved to have good performance in the actual communication environment.
TABLE 5 frequency distribution of operating results of a Quantum Walking analog Circuit in a noisy Environment
Based on the quantum walking analog circuit, a logic circuit is designed and operated on an IBM quantum cloud platform, as shown in FIG. 4. The operation parameter sets the operation frequency to be the maximum value 8192, the quantum computer selects ibmq _ qasm _ simulator, and the experimental result is shown in table 6.
In fig. 4, (i) is a schematic diagram of a quantum circuit that passes authentication, and (j) is a schematic diagram of a quantum circuit that does not pass authentication. The circuit uses a barrier to separate the logic steps of the scheme, wherein the first part corresponds to the single-photon preparation phase of the scheme, assuming that Alice and Bob previously used the QKD protocol to obtain a key with a length of 3, the single-photon sequence obtained by the preparation is as follows,
corresponding sequence,Corresponding sequence,Corresponding sequence. The identity authentication phase of the schemes corresponding to parts 2, 3 and 4 of fig. 4, where part 2 representsq 0 In sequence withq 3 Andq 6 carry out quantum walking andq 0 measurement of (2), part 2 showsq 1 In sequence withq 4 Andq 7 carry out quantum walking andq 1 measurement of (2), part 4 showsq 2 In sequence withq 5 Andq 8 carry out quantum walking andq 2 the measurement result of the experiment is the result of the identity authentication, as shown in table 6.
TABLE 6 operating results of Quantum identity authentication circuits in ideal environments
Analyzing the operation result of the circuit: circuit operation result of passing condition of authentication and during single photon preparation stageThe sequences are completely identical; circuit operation result of authentication failure and during single photon preparation stageThe sequences being different, obviously sharing the corresponding position in the key information. The experimental results are as expected.
It should be noted that the method of the embodiment of the present invention may be executed by a single device, such as a computer or a server. The method of the embodiment can also be applied to a distributed scene and completed by the mutual cooperation of a plurality of devices. In the case of such a distributed scenario, one of the multiple devices may only perform one or more steps of the method according to the embodiment of the present invention, and the multiple devices interact with each other to complete the method.
It should be noted that the above describes some embodiments of the invention. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments described above and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Based on the same inventive concept, the invention also provides an identity authentication method and device based on quantum walking, which is corresponding to the method of any embodiment.
Referring to fig. 5, the identity authentication method and apparatus based on quantum walking includes:
a key obtaining module 501, configured to obtain a shared key through a child key distribution protocol by a first party and a second party participating in identity authentication, where the shared key is n in length, and n is a positive integer;
a particle preparation module 502 configured to respectively prepare a first single-photon sequence and a second single-photon sequence with a length of n by the first party and the second party based on the shared secret key, and randomly prepare a group of single-photon sequences with a length of n as a third single-photon sequence by a third party certification authority participating in identity certification;
the quantum walking module 503 is configured to construct a quantum walking system based on a two-point complete graph of two coins, a single photon in the third single-photon sequence is used as a position state in the quantum walking system, a single photon in the first single-photon sequence is used as a first coin in the quantum walking system, a single photon in the second single-photon sequence is used as a second coin in the quantum walking system, and the third party certification mechanism performs two-step quantum walking operation on each single photon in the third single-photon sequence, the single photon in the first single-photon sequence corresponding to the single photon in the third single-photon sequence, and the single photon in the second single-photon sequence;
a result measurement module 504, configured to measure the third single-photon sequence after the two-step quantum walking by the third-party certification authority by selecting a matched measurement basis, so as to obtain a measurement result;
an identity authentication module 505 configured to pass the identity authentication of the first and second parties in response to determining that the measurement result is the same as the initial state of the third single-photon sequence, and fail the identity authentication if the measurement result is different from the initial state of the third single-photon sequence.
For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, the functionality of the various modules may be implemented in the same one or more software and/or hardware implementations of the invention.
The device of the above embodiment is used to implement the corresponding identity authentication method based on quantum walking in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Based on the same inventive concept, corresponding to the method of any embodiment described above, the present invention further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the quantum walking-based identity authentication method described in any embodiment described above.
Fig. 6 is a schematic diagram illustrating a more specific hardware structure of an electronic device according to this embodiment, where the electronic device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. Wherein the processor 1010, memory 1020, input/output interface 1030, and communication interface 1040 are communicatively coupled to each other within the device via bus 1050.
The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present disclosure.
The Memory 1020 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random Access Memory), a static storage device, a dynamic storage device, or the like. The memory 1020 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 1020 and called to be executed by the processor 1010.
The input/output interface 1030 is used for connecting an input/output module to input and output information. The input/output module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 1040 is used for connecting a communication module (not shown in the drawings) to implement communication interaction between the present apparatus and other apparatuses. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
It should be noted that although the above-mentioned device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040 and the bus 1050, in a specific implementation, the device may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
The electronic device of the above embodiment is used to implement the corresponding quantum walking-based identity authentication method in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Based on the same inventive concept, corresponding to any of the above-mentioned embodiment methods, the present invention also provides a non-transitory computer-readable storage medium storing computer instructions for causing the computer to execute the quantum walking-based identity authentication method according to any of the above embodiments.
Computer-readable media of the present embodiments, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The computer instructions stored in the storage medium of the above embodiment are used to enable the computer to execute the identity authentication method based on quantum walking as described in any of the above embodiments, and have the beneficial effects of the corresponding method embodiments, which are not described herein again.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, is limited to those examples; within the idea of the invention, also technical features in the above embodiments or in different embodiments may be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity.
In addition, well-known power/ground connections to Integrated Circuit (IC) chips and other components may or may not be shown within the provided figures for simplicity of illustration and discussion, and so as not to obscure the embodiments of the invention. Furthermore, devices may be shown in block diagram form in order to avoid obscuring embodiments of the present invention, and also in view of the fact that specifics with respect to implementation of such block diagram devices are highly dependent upon the platform within which the embodiments of the present invention are to be implemented (i.e., specifics should be well within purview of one skilled in the art). Where specific details (e.g., circuits) are set forth in order to describe example embodiments of the invention, it should be apparent to one skilled in the art that embodiments of the invention can be practiced without, or with variation of, these specific details. Accordingly, the description is to be regarded as illustrative instead of restrictive.
While the present invention has been described in conjunction with specific embodiments thereof, many alternatives, modifications, and variations of these embodiments will be apparent to those of ordinary skill in the art in light of the foregoing description. For example, other memory architectures (e.g., dynamic ram (dram)) may use the discussed embodiments.
The present embodiments are intended to embrace all such alternatives, modifications and variances which fall within the broad scope of the appended claims. Therefore, any omissions, modifications, substitutions, improvements and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the invention.
Claims (10)
1. An identity authentication method based on quantum walking is characterized by comprising the following steps:
a first party and a second party participating in identity authentication acquire a shared key through a sub-key distribution protocol, wherein the length of the shared key is n, and n is a positive integer;
the first party and the second party respectively prepare a first single-photon sequence and a second single-photon sequence which are n in length based on the shared secret key, and a third party certification authority participating in identity certification randomly prepares a group of single-photon sequences which are n in length and serve as a third single-photon sequence;
constructing a quantum walking system based on two-point complete graphs of two coins, wherein a single photon in a third single-photon sequence is used as a position state in the quantum walking system, a single photon in a first single-photon sequence is used as a first coin in the quantum walking system, a single photon in a second single-photon sequence is used as a second coin in the quantum walking system, and a third party certification mechanism carries out two-step quantum walking operation on each single photon in the third single-photon sequence, the single photon in the first single-photon sequence corresponding to the single photon in the third single-photon sequence and the single photon in the second single-photon sequence in sequence;
the third-party certification authority measures the third single-photon sequence after two-step quantum walking by selecting a matched measurement basis to obtain a measurement result;
and in response to determining that the measurement result is the same as the initial state of the third single-photon sequence, the identity authentication of the first party and the second party is passed, and if the measurement result is different from the initial state of the third single-photon sequence, the identity authentication is not passed.
2. The identity authentication method of claim 1, wherein the first and second parties respectively prepare a first and second single-photon sequence of length n based on the shared secret key, comprising:
3. The identity authentication method of claim 2, wherein the third party authentication mechanism performs two-step quantum walking operations on each single photon in the third single-photon sequence with the corresponding single photon in the first single-photon sequence and the corresponding single photon in the second single-photon sequence, and comprises:
the third single-photon sequence is represented asSaidFrom which the third party certification authority derivesSelecting one of the single photonsIt is then mixed withSingle photon of (2)Andsingle photon of (2)Sequentially performing two-step quantum walking operation, specifically as
Wherein the content of the first and second substances,is an operator of the first step of quantum walking,is an operator of the quantum walking of the second step,controlled shift calculation for quantum walking in the first stepIn the case of a hybrid vehicle,is a controlled shift operator when the quantum walks the second step, and C is a coin operator.
4. The identity authentication method of claim 1, wherein the third-party authentication mechanism measures the third single-photon sequence after two-step quantum walking by selecting a matched measurement basis to obtain a measurement result, and the method comprises the following steps:
and the third-party certification authority selects a Z measurement basis to measure the third single-photon sequence after the two-step quantum walking.
5. The method of claim 1, wherein the responding to the determination that the measurement result is the same as the initial state of the third single-photon sequence comprises that the first participant and the second participant pass identity authentication, and if the measurement result is different from the initial state of the third single-photon sequence, the first participant and the second participant do not pass identity authentication, and the method comprises the following steps:
and in response to determining that each value in the measurement result is the same as the initial state of the corresponding single photon in the third single-photon sequence, passing the authentication of the first and second parties, and failing the authentication if any value in the measurement result is different from the corresponding single photon in the third single-photon sequence.
6. An identity authentication method device based on quantum walking is characterized by comprising the following steps:
the key acquisition module is configured to acquire a shared key through a child key distribution protocol by a first party and a second party participating in identity authentication, wherein the length of the shared key is n, and n is a positive integer;
the particle preparation module is configured to respectively prepare a first single-photon sequence and a second single-photon sequence which are n in length by the first party and the second party based on the shared secret key, and a third party certification authority participating in identity certification randomly prepares a group of single-photon sequences which are n in length and serve as a third single-photon sequence;
the quantum walking module is configured to construct a quantum walking system based on a two-point complete graph of two coins, a single photon in the third single-photon sequence is used as a position state in the quantum walking system, a single photon in the first single-photon sequence is used as a first coin in the quantum walking system, a single photon in the second single-photon sequence is used as a second coin in the quantum walking system, and the third party authentication mechanism carries out two-step quantum walking operation on each single photon in the third single-photon sequence, the single photon in the first single-photon sequence corresponding to the single photon in the third single-photon sequence and the single photon in the second single-photon sequence sequentially;
the result measuring module is configured to measure the third single-photon sequence after the two-step quantum walking by the third-party certification authority by selecting the matched measuring basis to obtain a measuring result;
an identity authentication module configured to pass identity authentication of the first and second parties in response to determining that the measurement result is the same as the initial state of the third single-photon sequence, and fail identity authentication if the measurement result is different from the initial state of the third single-photon sequence.
7. The apparatus of claim 6, wherein the particle preparation module, being specifically configured to prepare the first and second single-photon sequences of length n based on the shared key by the first and second parties respectively, comprises:
8. The apparatus of claim 6, wherein the quantum walking module is specifically configured to perform a two-step quantum walking operation on each single photon in the third sequence of single photons with its corresponding single photon in the first sequence of single photons and the second sequence of single photons by the third-party certification authority, comprising:
the third single-photon sequence is represented asSaid third party certification authority slave to saidSelecting one of the single photonsIt is then mixed withSingle photon of (2)Andsingle photon of (2)Sequentially performing two-step quantum walking operation, specifically as
Wherein the content of the first and second substances,is an operator of the first step of quantum walking,is an operator of the quantum walking of the second step,for the controlled shift operator in the first step of quantum walking,is a controlled shift operator when the quantum walks the second step, and C is a coin operator.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable by the processor, the processor implementing the method according to any one of claims 1 to 5 when executing the computer program.
10. A non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the method according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111077376.9A CN113517986B (en) | 2021-09-15 | 2021-09-15 | Identity authentication method based on quantum walking and related equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111077376.9A CN113517986B (en) | 2021-09-15 | 2021-09-15 | Identity authentication method based on quantum walking and related equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113517986A true CN113517986A (en) | 2021-10-19 |
CN113517986B CN113517986B (en) | 2021-11-23 |
Family
ID=78063438
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111077376.9A Active CN113517986B (en) | 2021-09-15 | 2021-09-15 | Identity authentication method based on quantum walking and related equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113517986B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113904779A (en) * | 2021-12-10 | 2022-01-07 | 湖南师范大学 | Identity authentication method, system, equipment and storage medium based on super-secret code |
CN114640448A (en) * | 2022-03-25 | 2022-06-17 | 重庆邮电大学 | Quantum privacy ordering method based on quantum random walk |
CN114826605A (en) * | 2022-03-28 | 2022-07-29 | 华南理工大学 | Data security sharing block chain system based on quantum key distribution |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017001850A1 (en) * | 2015-07-02 | 2017-01-05 | Adrian Kent | Quantum tokens |
CN107493168A (en) * | 2017-09-07 | 2017-12-19 | 中国电子科技集团公司第三十研究所 | Quanta identity authentication method and its application process during quantum key distribution |
CN109586909A (en) * | 2019-01-21 | 2019-04-05 | 成都信息工程大学 | Based on Bell state quantal data library access control and Bidirectional identity authentication method |
CN110061787A (en) * | 2019-04-25 | 2019-07-26 | 成都信息工程大学 | A kind of half quantum safety direct communication method and system based on Bell's state |
CN110166251A (en) * | 2019-05-17 | 2019-08-23 | 成都信息工程大学 | A kind of half quantum group signature method and system based on quantum walking |
CN110213060A (en) * | 2019-07-05 | 2019-09-06 | 成都信息工程大学 | A kind of quantum Proxy Signature method and system that the nothing based on quantum walking is tangled |
CN110445609A (en) * | 2019-08-23 | 2019-11-12 | 成都信息工程大学 | A kind of quantum secret sharing method and shared system based on quantum walking |
CN111082937A (en) * | 2020-01-10 | 2020-04-28 | 华北电力大学 | Bidirectional identity authentication method based on single photon |
CN111404691A (en) * | 2020-03-02 | 2020-07-10 | 成都信息工程大学 | Quantum secret sharing method and system with credible authentication based on quantum walking |
CN111464314A (en) * | 2020-04-02 | 2020-07-28 | 北京工业大学 | Quantum synchronization bidirectional identity authentication method based on single photon |
CN112822006A (en) * | 2020-12-22 | 2021-05-18 | 华北电力大学 | Quantum one-vote privacy voting method based on single photon |
-
2021
- 2021-09-15 CN CN202111077376.9A patent/CN113517986B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017001850A1 (en) * | 2015-07-02 | 2017-01-05 | Adrian Kent | Quantum tokens |
CN107493168A (en) * | 2017-09-07 | 2017-12-19 | 中国电子科技集团公司第三十研究所 | Quanta identity authentication method and its application process during quantum key distribution |
CN109586909A (en) * | 2019-01-21 | 2019-04-05 | 成都信息工程大学 | Based on Bell state quantal data library access control and Bidirectional identity authentication method |
CN110061787A (en) * | 2019-04-25 | 2019-07-26 | 成都信息工程大学 | A kind of half quantum safety direct communication method and system based on Bell's state |
CN110166251A (en) * | 2019-05-17 | 2019-08-23 | 成都信息工程大学 | A kind of half quantum group signature method and system based on quantum walking |
CN110213060A (en) * | 2019-07-05 | 2019-09-06 | 成都信息工程大学 | A kind of quantum Proxy Signature method and system that the nothing based on quantum walking is tangled |
CN110445609A (en) * | 2019-08-23 | 2019-11-12 | 成都信息工程大学 | A kind of quantum secret sharing method and shared system based on quantum walking |
CN111082937A (en) * | 2020-01-10 | 2020-04-28 | 华北电力大学 | Bidirectional identity authentication method based on single photon |
CN111404691A (en) * | 2020-03-02 | 2020-07-10 | 成都信息工程大学 | Quantum secret sharing method and system with credible authentication based on quantum walking |
CN111464314A (en) * | 2020-04-02 | 2020-07-28 | 北京工业大学 | Quantum synchronization bidirectional identity authentication method based on single photon |
CN112822006A (en) * | 2020-12-22 | 2021-05-18 | 华北电力大学 | Quantum one-vote privacy voting method based on single photon |
Non-Patent Citations (2)
Title |
---|
XIAOPING LOU: "Quantum Distributed Ballot Scheme based on entanglement swapping", 《2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11》 * |
娄小平: "一种可验证的量子匿名通信方案", 《小型微型计算机系统》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113904779A (en) * | 2021-12-10 | 2022-01-07 | 湖南师范大学 | Identity authentication method, system, equipment and storage medium based on super-secret code |
CN114640448A (en) * | 2022-03-25 | 2022-06-17 | 重庆邮电大学 | Quantum privacy ordering method based on quantum random walk |
CN114640448B (en) * | 2022-03-25 | 2024-05-28 | 北京神州数码云科信息技术有限公司 | Quantum privacy ordering method based on quantum random walk |
CN114826605A (en) * | 2022-03-28 | 2022-07-29 | 华南理工大学 | Data security sharing block chain system based on quantum key distribution |
CN114826605B (en) * | 2022-03-28 | 2023-08-18 | 华南理工大学 | Data security sharing method and blockchain system based on quantum key distribution |
Also Published As
Publication number | Publication date |
---|---|
CN113517986B (en) | 2021-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113517986B (en) | Identity authentication method based on quantum walking and related equipment | |
US9471279B2 (en) | Random number generation using untrusted quantum devices | |
Datta | Quantum discord between relatively accelerated observers | |
US9471280B2 (en) | Extraction of random numbers from physical systems | |
Pironio et al. | Focus on device independent quantum information | |
TWI804832B (en) | Systems and methods for facilitating and hardening key exchange procedures against quantum computing threats | |
JP5488596B2 (en) | Signature device, signature verification device, anonymous authentication system, signature method, signature authentication method, and programs thereof | |
Navascués et al. | Characterizing finite-dimensional quantum behavior | |
CN105474575B (en) | Secure Verification System, certificate server, intermediate server, Secure authentication method and program | |
Mironowicz et al. | Experimentally feasible semi-device-independent certification of four-outcome positive-operator-valued measurements | |
US10812265B1 (en) | Using cryptographic co-processors in a supersingular isogeny-based cryptosystem | |
CN107645376B (en) | Long code private key amplification method for continuous variable quantum key distribution | |
Mironowicz et al. | Properties of dimension witnesses and their semidefinite programming relaxations | |
Wortman et al. | P2M‐based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices | |
JP2022095852A (en) | Digital signature method, signature information verification method, related device, and electronic device | |
Galetsky et al. | Comparison of Quantum PUF models | |
Ikken et al. | Bidirectional quantum teleportation of even and odd coherent states through the multipartite Glauber coherent state: Theory and implementation | |
JPWO2013129084A1 (en) | Information processing apparatus, information processing method, and program | |
US11477021B1 (en) | Systems and methods for universal three-dimensional quantum random number generation and encryption | |
CN116170144B (en) | Smart power grid anonymous authentication method, electronic equipment and storage medium | |
Khan et al. | Soteria: A quantum-based device attestation technique for the Internet of Things | |
CN114448613B (en) | Physical layer key generation method and device of communication system and electronic equipment | |
Wu et al. | Cryptanalysis and improvement of Ye et al’s quantum private comparison protocol | |
Lou et al. | Quantum identity authentication scheme based on quantum walks on graphs with ibm quantum cloud platform | |
CN116137564A (en) | Ciphertext decryption method and related equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |