CN113872748B - Safe quantum network coding method based on quantum homomorphic encryption - Google Patents

Safe quantum network coding method based on quantum homomorphic encryption Download PDF

Info

Publication number
CN113872748B
CN113872748B CN202111133347.XA CN202111133347A CN113872748B CN 113872748 B CN113872748 B CN 113872748B CN 202111133347 A CN202111133347 A CN 202111133347A CN 113872748 B CN113872748 B CN 113872748B
Authority
CN
China
Prior art keywords
quantum
quantum state
transmitted
sender
measurement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111133347.XA
Other languages
Chinese (zh)
Other versions
CN113872748A (en
Inventor
陈玉玲
程振文
陈秀波
徐刚
杨义先
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou University
Original Assignee
Guizhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou University filed Critical Guizhou University
Priority to CN202111133347.XA priority Critical patent/CN113872748B/en
Publication of CN113872748A publication Critical patent/CN113872748A/en
Application granted granted Critical
Publication of CN113872748B publication Critical patent/CN113872748B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Optical Communication System (AREA)

Abstract

The invention belongs to the field of quantum communication network technology and quantum cryptography, and particularly relates to a safe quantum network coding method based on quantum homomorphic encryption. According to the method, quantum homomorphic encryption is applied to quantum network coding, and the quantum state of the measurement result of the sender is encrypted, so that the intermediate node in the butterfly network cannot obtain the information of the quantum state to be transmitted of the sender, and safe quantum network coding is realized.

Description

Safe quantum network coding method based on quantum homomorphic encryption
Technical Field
The invention relates to a safe quantum network coding method based on quantum homomorphic encryption, belonging to the fields of quantum communication network technology and quantum cryptography.
Background
In recent decades, the rapid development of quantum information has not been separated from the study of quantum cryptography by researchers. In particular, quantum invisible transmission technology and quantum key distribution technology are sequentially proposed, the former realizes remote transmission of quantum states by utilizing characteristics of quantum entangled states, and the latter completes perfect and safe quantum key distribution by utilizing theorem that quantum states cannot be precisely cloned, so that quantum communication network technology is also applied.
In 2006, hayashi et al propose a quantum network coding scheme based on a butterfly network model for the first time, and cross transmission of quantum states on a butterfly network is realized by a quantum universal cloning method. Since quantum universal cloning methods are not exact clones, this approach does not allow perfect transmission with fidelity of 1. In 2007, hayashi proposed a quantum network coding scheme based on quantum invisible transmission states, and perfect cross transmission of quantum states on a butterfly network was realized through entangled states shared in advance by two senders. However, if the first intermediate node in the butterfly network is dishonest, the node may obtain the quantum state from the channel and recover the information of the quantum states to be transmitted of the two senders, resulting in the security of the scheme being insufficient. From the shortcomings of this scheme, it can be found that this belongs to the security problem that the sender gives the private data to the intermediate node for encoding, and relates to both the protection of the content by the private data and the delegation of the calculation content.
The explosion of quantum information science brings about many new findings for information processing applications, wherein quantum homomorphic encryption is a considerable entrusted computing technology, which can not only ensure the privacy of ciphertext after encrypting plaintext by a client in evaluation operation performed by a server, but also make the result after performing decryption operation by the client equal to the result of directly acting on plaintext by the evaluation operation. Therefore, the invention provides a quantum network coding method based on quantum homomorphic encryption, which encrypts the quantum state of the measurement result of the sender, so that the intermediate node in the butterfly network cannot decrypt and obtain the information of the quantum state to be transmitted of the sender, but the intermediate node is not influenced to finish the function of network coding, and the safe cross transmission of the quantum state in the butterfly network is realized.
Disclosure of Invention
According to the problem of insufficient safety in the prior art, the invention provides a safe quantum network coding method based on quantum homomorphic encryption, which can improve the safety of the transmission of a quantum state to be transmitted in a butterfly network. The method mainly comprises the following steps:
step one: sender A through two rounds of quantum invisible state transmission processes 1 And A 2 Transferring the information of the quantum states to be transmitted to the opposite side, wherein A is 1 And A 2 The entangled quantum state in the hand will become the quantum state to be recovered, and A 1 And A 2 A set of measurements of classical bit sequences were also obtained, respectively.
Step two: sender a based on the respective measurements 1 And A 2 And respectively executing corresponding unitary operation on the quantum states to be recovered in the hands to obtain encrypted quantum states to be transmitted.
Step three: sender A 1 And A 2 Respectively quantizing classical bit sequences of the respective measurement results to obtain measurement quantum states; in addition, A 2 The measured quantum states in the adversary are encrypted with an encryption key,and obtaining the encrypted measurement quantum state.
Step four: sender A 1 Measured quantum state of (c) and sender a 2 Is transmitted to the intermediate node C through the channel 1 And A is 2 Transmitting the encryption key to A through quantum key distribution technology 1 The method comprises the steps of carrying out a first treatment on the surface of the In addition to A 1 And A 2 Respectively transmitting the respective encrypted quantum states to be transmitted and the encryption key to the receiver B 2 And B 1
Step five: intermediate node C 1 Performing controlled unitary operation on the two groups of measurement quantum states, and transmitting the obtained new group of measurement quantum states to the intermediate node C 2
Step six: intermediate node C 2 Copying the new measured quantum states and respectively transmitting to the receiver B 1 And B 2
Step seven: according to intermediate node C 2 New measured quantum state and sender a 2 Is the encryption key of receiver B 1 Performing decryption operation on the new measurement quantum state to obtain a decrypted measurement quantum state; based on the measured quantum state information, B 1 For the A 2 Decrypting the encrypted quantum state to be transmitted, and recovering to obtain A 1 To be transmitted.
Step eight: similarly, receiver B based on the received new measured quantum state and encryption key 2 Performing decryption operation on the new measurement quantum state to obtain a decrypted measurement quantum state; further, from the decrypted information of the measured quantum state, B 2 Pair A 1 The encrypted quantum state to be transmitted of (2) is also subjected to corresponding decryption operation to recover to obtain A 2 To be transmitted.
The invention has the beneficial effects that:
the cross transmission of quantum states in the butterfly network is realized through entanglement resources, and the method is a quantum network coding method of a more important class. However, such methods generally default that intermediate nodes in the butterfly network are honest and reliable, and do not attempt to obtain quantum state information to be transmitted of a sender. According to the method, quantum homomorphic encryption is applied to quantum network coding, whether the intermediate node is honest and reliable or not, the measured quantum state information of a sender is encrypted, the measured quantum state information is not exposed to the intermediate node, the safety and the integrity of data in the coding process are ensured, meanwhile, the intermediate node can complete the coding task, and the safe cross transmission of the quantum state in a butterfly network is realized.
Drawings
FIG. 1 is a flow chart of a secure quantum network encoding method employing quantum homomorphic encryption in accordance with the present invention;
fig. 2 is a butterfly network diagram of the secure quantum network encoding method of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions in the embodiments of the present invention will be fully and clearly described below with reference to the accompanying drawings. It will be apparent that the described embodiments are only some, but not all, embodiments of the invention.
The invention provides a safe quantum network coding method based on quantum homomorphic encryption, which mainly comprises the following steps:
step one: sender A 1 And A 2 Respectively are to be transmitted quantum statesAndwherein |α| 2 +|β| 2 =1,|γ| 2 +|λ| 2 =1。A 1 And A 2 Two pairs of Bell states are shared:
wherein sender A 1 Possessing quantum state a 1,1 And a 1,2 Sender A 2 Possessing quantum state a 2,1 And a 2,2
In the first round of quantum invisible state transmission process, the quantum state to be operated isAnd->Sender A 1 In quantum state a 1 To control bit and quantum state a 1,1 CNOT operation is performed on the target bit, and then quantum state a is performed again 1 Operate H, i.e
Wherein the method comprises the steps of
Then sender A 1 Measuring the quantum state a he owns 1 And a 1,1 One of four possible results 00, 01, 10 and 11 is obtained, the measurement of the classical bit sequence being noted as m 1 m 2 (m 1 ,m 2 E {0,1 }). Sender A at this time 2 Owned entangled quantum state a 2,1 Becomes as follows
Similarly, in the second round of quantum invisible transmission, the quantum state being operated isAnd->Sender A 2 In quantum state a 2 To control bit and quantum state a 2,2 CNOT operation is performed on the target bit, and then quantum state a is performed again 2 Operate H, i.e
Thereafter, sender A 2 Measuring the quantum state a he owns 2 And a 2,2 One of four possible outcomes 00, 01, 10 and 11 was also obtained and the classical bit sequence was noted as n 1 n 2 (n 1 ,n 2 E {0,1 }). Sender A at this time 1 Owned entangled quantum state a 1,2 Becomes as follows
Step two: according to sender A 1 Measurement result m of (2) 1 m 2 And sender A 2 Is measured by the measurement result n of (2) 1 n 2 ,A 1 And A 2 Respectively to the quantum states in the respective handsAnd->Performing corresponding unitary operations, i.e.
Thus, through this step, A 1 And A 2 Respectively obtain the encrypted quantum state to be transmittedAnd->
Step three: sender A 1 And A 2 Respectively quantizing classical bit sequences of the respective measurement results to obtain measurement quantum state |m 1 >|m 2 >And |n 1 >|n 2 >. In order to ensure the safety of the whole quantum network coding, the invention adopts the encryption keys e, f, g and h (e, f, g, h E {0,1 }) generated randomly to pair A based on the idea of quantum homomorphic encryption 2 Is (are) measured in quantum states |n 1 >|n 2 >Encrypting to obtain an encrypted measurement quantum state X e Z f |n 1 >X g Z h |n 2 >. In order not to increase the complexity of the network coding, the invention does not apply to A 1 Is of the quantum state |m 1 >|m 2 >Additional encryption is performed.
Step four: sender A 1 And A 2 The respective measured quantum states |m 1 >|m 2 >And X e Z f |n 1 >·X g Z h |n 2 >Transmitted to intermediate node C via a channel 1 And A is 2 Transmitting encryption keys e, f, g and h to A through quantum key distribution technology 1 . In addition, A 1 To encrypt the quantum state to be transmittedAnd an encryption key e, f, g, h to the receiver B 2 And A 2 The quantum state to be transmitted is encrypted>And an encryption key e, f, g, h to the receiver B 1
Step five: intermediate node C 1 Performing CNOT operation twice on the two groups of received measurement quantum states, specifically C 1 At |m 1 >To control the position, X e Z f |n 1 >Doing a first CNOT operation for target bit 2 >To control the position, X g Z h |n 2 >Doing a second CNOT operation for the target bit, i.e
Wherein the method comprises the steps ofRepresenting the exclusive or operator. C (C) 1 Will->And->As a new set of measured quantum states and sent to intermediate node C 2
Step six: intermediate node C 2 Preparation of two auxiliary Quantum states |0>And replicates the new measured quantum state. The specific operation is thatAnd->Respectively as control bits, respectively to target bits |0>Doing CNOT operation, i.e
C 2 Will beAnd->As a set of measured quanta to be sent to receiver B 1 Will leave->And->As another set of measured quanta to be sent to receiver B 2
It can be found that the two sets of measurement quanta are just unitary operators Z f Or Z is h This also simply results in the copied measured quantum state possibly lacking a global phase factor of-1 and does not affect the decryption operations in step seven, step eight.
Step seven: first, according to the encryption key e, f, g, h, the receiver B 1 Received measurement quantum statePerforming decryption operation to obtain quantum state->Next, B 1 For quantum state->Taking measurements to obtain classical bit sequence +.>Finally, based on classical bit information, B 1 For the A 2 Is to be transmitted in the form of a quantum state>Decrypting, i.e.
Recovering to obtain A 1 To be transmitted in the quantum state alpha|0>+β|1>。
Step eight: receiver B 2 Obtaining A 2 B in the process and step seven of quantum state information to be transmitted 1 Is consistent with the operation of, in particular B 2 Measuring quantum state according to information pair of encryption keyPerforming decryption operation to obtain quantum state->B 2 And then->Making measurements to obtain classical bit sequencesB 2 Finally, according to classical bit information, the bit information is derived from A 1 Is to be transmitted in the form of a quantum state>Decrypting, i.e.
Recovering to obtain A 2 To be transmitted in the quantum state gamma|0>+λ|1>。
Through the eight steps, the invention can realize safe quantum state cross transmission in the butterfly network.
The above embodiments are provided to further illustrate the objects, technical solutions and advantages of the present invention. It should be understood that the above examples are only preferred embodiments of the present invention and are not intended to limit the present invention, and any modifications, equivalent substitutions, improvements, etc. made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (1)

1. The safe quantum network coding method based on quantum homomorphic encryption improves the transmission safety of a quantum state to be transmitted in a butterfly network and is characterized by comprising the following steps:
step one: sender A through two rounds of quantum invisible state transmission processes 1 And A 2 Transferring the information of the quantum states to be transmitted to the opposite side, namely A 1 The entangled quantum state in the hand will become A 2 To be transmitted of quantum state information, A 2 The entangled quantum state in the hand will become A 1 To be transmitted with quantum state information, and A 1 And A 2 Measurement results of a group of classical bit sequences are also obtained respectively;
step two: sender a based on the respective measurements 1 And A 2 Respectively executing corresponding unitary operation on the quantum states to be transmitted in the hands of the user to obtain encrypted quantum states to be transmitted;
step three: sender A 1 And A 2 Respectively quantizing classical bit sequences of the respective measurement results to obtain measurement quantum states; in addition, A 2 Encrypting the measurement quantum state in the hand by using the encryption key to obtain an encrypted measurement quantum state;
step four: sender A 1 Measured quantum state of (c) and sender a 2 Is transmitted to the intermediate node C through the channel 1 And A is 2 Transmitting the encryption key to A through quantum key distribution technology 1 The method comprises the steps of carrying out a first treatment on the surface of the In addition to A 1 Transmitting the encrypted quantum state to be transmitted and the encryption key to the receiver B 2 ,A 2 Transmitting the encrypted quantum state to be transmitted and the encryption key to the receiver B 1
Step five: intermediate node C 1 For sender A 1 Measured quantum state of (c) and sender a 2 The encrypted measurement quantum state of (2) is subjected to controlled unitary operation, and the obtained new measurement quantum state is sent to an intermediate node C 2
Step six: intermediate node C 2 Copying the new measured quantum state, and respectively transmitting the new measured quantum state and the copied new measured quantum state to the receiver B 1 And B 2
Step seven: according to intermediate node C 2 New measured quantum state and sender a 2 Is the encryption key of receiver B 1 Performing decryption operation on the new measurement quantum state to obtain a decrypted measurement quantum state; based on the measured quantum state information, B 1 For the A 2 Decrypting the encrypted quantum state to be transmitted, and recovering to obtain a sender A 1 To be transmitted;
step eight: likewise, according to intermediate node C 2 Replication of the resulting new measured quantum states and sender A 1 Is the encryption key of receiver B 2 Decrypting the copied new measurement quantum state to obtain a decrypted measurement quantum state; further, from the decrypted information of the measured quantum state, B 2 Pair A 1 The encrypted quantum state to be transmitted of (2) is also subjected to corresponding decryption operation to recover and obtain a sender A 2 To be transmitted.
CN202111133347.XA 2021-09-26 2021-09-26 Safe quantum network coding method based on quantum homomorphic encryption Active CN113872748B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111133347.XA CN113872748B (en) 2021-09-26 2021-09-26 Safe quantum network coding method based on quantum homomorphic encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111133347.XA CN113872748B (en) 2021-09-26 2021-09-26 Safe quantum network coding method based on quantum homomorphic encryption

Publications (2)

Publication Number Publication Date
CN113872748A CN113872748A (en) 2021-12-31
CN113872748B true CN113872748B (en) 2023-08-29

Family

ID=78990885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111133347.XA Active CN113872748B (en) 2021-09-26 2021-09-26 Safe quantum network coding method based on quantum homomorphic encryption

Country Status (1)

Country Link
CN (1) CN113872748B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116743350B (en) * 2023-08-14 2023-12-12 杭州合众数据技术有限公司 Data stream fusion transmission method and system based on unidirectional optical gate and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833265A (en) * 2012-09-13 2012-12-19 北京航空航天大学 Network theory based signature scheme and secure linear network encoding method thereof
CN104780169A (en) * 2015-04-08 2015-07-15 北京航空航天大学 Quantum repeater network coding scheme based on controller
JP2015220621A (en) * 2014-05-19 2015-12-07 日本電信電話株式会社 Multicast quantum network coding method
CN105978659A (en) * 2016-04-18 2016-09-28 苏州大学 Remote preparation quantum state based network coding method
CN109379144A (en) * 2018-11-27 2019-02-22 北京航空航天大学 A kind of quantum network coding method detuning based on quantum
CN110768793A (en) * 2019-10-15 2020-02-07 国网甘肃省电力公司信息通信公司 Two-stage quantum state cooperative multicast method based on butterfly network structure
US10630478B1 (en) * 2018-12-28 2020-04-21 University Of South Florida Sender optimal, breach-resilient, and post-quantum secure cryptographic methods and systems for digital auditing
CN111064568A (en) * 2019-12-03 2020-04-24 北京易华录信息技术股份有限公司 Flow control method and device for quantum key distribution network
CN111130771A (en) * 2019-12-24 2020-05-08 北京邮电大学 Quantum network coding method based on quantum state non-loss

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833265A (en) * 2012-09-13 2012-12-19 北京航空航天大学 Network theory based signature scheme and secure linear network encoding method thereof
JP2015220621A (en) * 2014-05-19 2015-12-07 日本電信電話株式会社 Multicast quantum network coding method
CN104780169A (en) * 2015-04-08 2015-07-15 北京航空航天大学 Quantum repeater network coding scheme based on controller
CN105978659A (en) * 2016-04-18 2016-09-28 苏州大学 Remote preparation quantum state based network coding method
CN109379144A (en) * 2018-11-27 2019-02-22 北京航空航天大学 A kind of quantum network coding method detuning based on quantum
US10630478B1 (en) * 2018-12-28 2020-04-21 University Of South Florida Sender optimal, breach-resilient, and post-quantum secure cryptographic methods and systems for digital auditing
CN110768793A (en) * 2019-10-15 2020-02-07 国网甘肃省电力公司信息通信公司 Two-stage quantum state cooperative multicast method based on butterfly network structure
CN111064568A (en) * 2019-12-03 2020-04-24 北京易华录信息技术股份有限公司 Flow control method and device for quantum key distribution network
CN111130771A (en) * 2019-12-24 2020-05-08 北京邮电大学 Quantum network coding method based on quantum state non-loss

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于蝶型网络模型的量子网络编码;张璇;施荣华;郭迎;;计算机应用研究(03);全文 *

Also Published As

Publication number Publication date
CN113872748A (en) 2021-12-31

Similar Documents

Publication Publication Date Title
EP3913852B1 (en) Method for protecting data transfer using neural cryptography
CN113688999B (en) Training method of transverse federated xgboost decision tree
CN110612696A (en) Post-quantum secure private stream aggregation
CN108847934B (en) Multi-dimensional quantum homomorphic encryption method
CN102801521B (en) Quantum steganography protocol based on quantum electrodynamics (QED)
CN104158880A (en) User-end cloud data sharing solution
Tao et al. Two semi-quantum direct communication protocols with mutual authentication based on bell states
CN105978689B (en) Secret key leakage resistant cloud data secure sharing method
Qu et al. Anti-noise bidirectional quantum steganography protocol with large payload
CN113872748B (en) Safe quantum network coding method based on quantum homomorphic encryption
Huang et al. Quantum secure direct communication based on quantum homomorphic encryption
Zhu et al. Efficient quantum blind signature scheme based on quantum fourier transform
CN110247768B (en) Certificable semi-quantum secret sharing method and system based on GHZ state
You-Bang et al. Quantum dialogue by using non-symmetric quantum channel
CN108092772A (en) A kind of quantum commission combined calculation method of two client
Wang et al. Multiparty controlled quantum secure direct communication with phase encryption
Kumari et al. Data encryption and decryption using graph plotting
CN116471012A (en) Single-state multi-party half-quantum secret sharing method based on d-dimensional Bell state
CN114745111B (en) Quantum short key cryptography method based on key-controlled non-sum coin operator
Yuan et al. Efficient multiparty quantum secret sharing of secure direct communication based on Bell states and continuous variable operations
Yin et al. Efficient quantum dialogue without information leakage
CN112332988B (en) Agile quantum privacy query method based on anti-rotation noise
Zhang et al. Controlled quantum secure direct communication by using four particle cluster states
CN110932848B (en) Multi-party quantum key negotiation method based on non-maximum entanglement Bell state with known parameters
Shen et al. Improvement of a controlled quantum secure direct communication protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant