CN113904780A - Quantum-based batch identity authentication method, system, equipment and storage medium - Google Patents

Quantum-based batch identity authentication method, system, equipment and storage medium Download PDF

Info

Publication number
CN113904780A
CN113904780A CN202111504507.7A CN202111504507A CN113904780A CN 113904780 A CN113904780 A CN 113904780A CN 202111504507 A CN202111504507 A CN 202111504507A CN 113904780 A CN113904780 A CN 113904780A
Authority
CN
China
Prior art keywords
user
sequence
identity information
key
quantum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111504507.7A
Other languages
Chinese (zh)
Other versions
CN113904780B (en
Inventor
娄小平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Normal University
Original Assignee
Hunan Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Normal University filed Critical Hunan Normal University
Priority to CN202111504507.7A priority Critical patent/CN113904780B/en
Publication of CN113904780A publication Critical patent/CN113904780A/en
Application granted granted Critical
Publication of CN113904780B publication Critical patent/CN113904780B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/70Photonic quantum communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Optics & Photonics (AREA)
  • Collating Specific Patterns (AREA)
  • Optical Communication System (AREA)

Abstract

The application relates to a quantum-based batch identity authentication method, system, device and storage medium. The method comprises the following steps: a user A and a user B share a Key with the length of m through a quantum Key distribution protocol; user A prepares a set of random single photon sequences
Figure 757665DEST_PATH_IMAGE001
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 248821DEST_PATH_IMAGE001
Performing encryption, single photon sequence
Figure 807978DEST_PATH_IMAGE001
Through excessive amountObtaining the sequence after sub-Fourier transform
Figure 520719DEST_PATH_IMAGE002
(ii) a The user B sequentially pairs the sequences based on the Key Key
Figure 507130DEST_PATH_IMAGE002
Obtaining an execution particle after executing a group of operations, and delivering the execution particle to a user C; user C according to the measurement sequence
Figure 659150DEST_PATH_IMAGE002
The first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequence
Figure 756419DEST_PATH_IMAGE001
And calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed. The invention saves the time of identity authentication and improves the efficiency and the precision of the identity authentication.

Description

Quantum-based batch identity authentication method, system, equipment and storage medium
Technical Field
The present application relates to the field of identity recognition, and in particular, to a quantum-based batch identity authentication method, system, device, and storage medium.
Background
In the existing identity authentication, in the process of simultaneously authenticating and identifying in large batch, artificial intelligence identification based on large data is generally adopted, however, in the batch authentication process, because the data acquisition amount is large and the identification process is complex, the authentication efficiency is low, and the identification precision can become low along with the change of the acquired original data, so that the problems of precision and efficiency exist in the existing batch identity identification.
For example, CN111614638A discloses a face recognition data distribution system based on a big data platform and a distribution method thereof, including: the system comprises at least one application device and a database server, wherein the database server comprises a processor, a data acquisition module for collecting face recognition data, a data processing module for adding labels and carrying out encryption processing, a data storage module for storing face information files, an identity verification module for authenticating and managing the application device, a wireless network module for connecting the application device and the database server, and an authority module for configuring authority, and the processor is respectively connected with the data processing module, the data storage module, the identity verification module, the wireless network module and the authority module. The traditional identification method is slow in calculation process and low in accuracy. How to improve the technical problem of batch identity recognition needs further technical innovation.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a quantum-based batch identity authentication method, system, device and storage medium.
In a first aspect, an embodiment of the present invention provides a quantum-based batch identity authentication method, where the method includes:
a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n
Figure 402813DEST_PATH_IMAGE001
User A prepares a set of random single photon sequences
Figure 382270DEST_PATH_IMAGE003
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 224325DEST_PATH_IMAGE003
Performing encryption on the single-photon sequence
Figure 947430DEST_PATH_IMAGE003
Obtaining the sequence after quantum Fourier transform
Figure 650550DEST_PATH_IMAGE005
The user B sequentially pairs the sequences based on the Key Key
Figure 535330DEST_PATH_IMAGE005
Executing a group of operations to obtain execution particles, and delivering the execution particles to a user C;
user C according to the measurement sequence
Figure 864680DEST_PATH_IMAGE005
The first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequence
Figure 627362DEST_PATH_IMAGE003
And calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed.
Further, the user A prepares a group of followersSingle photon sequence of machine
Figure 624137DEST_PATH_IMAGE003
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 883080DEST_PATH_IMAGE003
Encrypting, and obtaining the sequence after the single-photon sequence is subjected to quantum Fourier transform
Figure 699726DEST_PATH_IMAGE005
(ii) a The method comprises the following steps:
random single photon sequence prepared by user A
Figure 280747DEST_PATH_IMAGE003
Therein contain
Figure 194345DEST_PATH_IMAGE006
A single photon, said sequence
Figure 686507DEST_PATH_IMAGE003
Expressed as:
Figure 757493DEST_PATH_IMAGE007
Figure 94934DEST_PATH_IMAGE008
(ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbers
Figure 800721DEST_PATH_IMAGE009
Wherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transform
Figure 401467DEST_PATH_IMAGE003
Encryption is performed, and the encryption formula is expressed as:
Figure 691241DEST_PATH_IMAGE010
(ii) a Wherein the content of the first and second substances,
Figure 97951DEST_PATH_IMAGE011
the sequence obtained after quantum Fourier transform
Figure 658246DEST_PATH_IMAGE005
Is shown as
Figure 492209DEST_PATH_IMAGE012
Further, the user B sequentially pairs the sequences based on the Key Key
Figure 6630DEST_PATH_IMAGE005
Obtaining an execution particle after executing a group of operations, and delivering the execution particle to a user C, wherein the steps of:
selecting a single user from user B
Figure 951452DEST_PATH_IMAGE013
To the sequence
Figure 366253DEST_PATH_IMAGE005
Performing a set of operations, the operators being represented as:
Figure 371118DEST_PATH_IMAGE014
wherein, in the step (A),
Figure 375764DEST_PATH_IMAGE015
Figure 858698DEST_PATH_IMAGE017
represents a modulo addition operation;
based on secret key
Figure 128005DEST_PATH_IMAGE018
I.e. by
Figure 303771DEST_PATH_IMAGE019
User of
Figure 792784DEST_PATH_IMAGE013
To the sequence
Figure 79409DEST_PATH_IMAGE020
Particle execution of
Figure 203222DEST_PATH_IMAGE021
After the operation, the operation is delivered to the user B who is not operated;
user' s
Figure 549890DEST_PATH_IMAGE022
Respectively for the sequences
Figure 788848DEST_PATH_IMAGE023
Execute
Figure 613585DEST_PATH_IMAGE024
After the operation, the last user is handed over to user C.
Further, the user C is according to a sum sequence
Figure 857484DEST_PATH_IMAGE005
The first identity information is obtained by calculation of the particles in the system, and the user A obtains the first identity information according to the Key and the single-photon sequence
Figure 375053DEST_PATH_IMAGE025
Calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the user B passes the identity authentication, including:
two-dimensional classical random number published by user A
Figure 573079DEST_PATH_IMAGE026
Where m is the length of the Key Key, user C selects the correct measurement base, measures the sequence
Figure 201506DEST_PATH_IMAGE005
The particles of (1);
if it is not
Figure 565491DEST_PATH_IMAGE027
Selecting
Figure 988382DEST_PATH_IMAGE028
Corresponding measurement basis is
Figure 196073DEST_PATH_IMAGE029
If, if
Figure 628192DEST_PATH_IMAGE030
Selecting
Figure 581104DEST_PATH_IMAGE031
Corresponding measurement basis is
Figure 440476DEST_PATH_IMAGE032
User C based on the measurement results
Figure 613093DEST_PATH_IMAGE033
By calculating
Figure 176799DEST_PATH_IMAGE034
Publish first identity information, user A compute
Figure 249797DEST_PATH_IMAGE035
And obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
On the other hand, the embodiment of the invention also provides a quantum-based batch identity authentication system, which comprises:
a Key distribution module, configured to share a Key with a length of m by a user a and a user B through a quantum Key distribution protocol, where the user B is a batch group set with an individual n
Figure 952174DEST_PATH_IMAGE001
Particle preparation module for use withPreparation of a group of random single photon sequences by Huo A
Figure 937054DEST_PATH_IMAGE003
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 710975DEST_PATH_IMAGE003
Performing encryption on the single-photon sequence
Figure 638480DEST_PATH_IMAGE003
Obtaining the sequence after quantum Fourier transform
Figure 341119DEST_PATH_IMAGE005
A particle operation module used for the user B to sequentially align the sequences based on the Key Key
Figure 986864DEST_PATH_IMAGE005
Executing a group of operations to obtain execution particles, and delivering the execution particles to a user C;
identity comparison module for user C based on the measurement sequence
Figure 298896DEST_PATH_IMAGE005
The first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequence
Figure 18591DEST_PATH_IMAGE003
And calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed.
Further, the particle preparation module comprises a sequence conversion unit configured to:
random single photon sequence prepared by user A
Figure 390666DEST_PATH_IMAGE003
Therein contain
Figure 355998DEST_PATH_IMAGE006
A single photon, said sequence
Figure 143825DEST_PATH_IMAGE003
Expressed as:
Figure 373818DEST_PATH_IMAGE007
Figure 418260DEST_PATH_IMAGE008
(ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbers
Figure 773018DEST_PATH_IMAGE009
Wherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transform
Figure 692432DEST_PATH_IMAGE003
Encryption is performed, and the encryption formula is expressed as:
Figure 449036DEST_PATH_IMAGE010
(ii) a Wherein the content of the first and second substances,
Figure 661449DEST_PATH_IMAGE011
the sequence obtained after quantum Fourier transform
Figure 769082DEST_PATH_IMAGE005
Is shown as
Figure 226609DEST_PATH_IMAGE012
Further, the particle operation module includes a particle state execution unit, and the particle state execution unit is configured to:
selecting a single user from user B
Figure 837718DEST_PATH_IMAGE013
To the sequence
Figure 489542DEST_PATH_IMAGE005
Performing a set of operations, the operators being represented as:
Figure 818892DEST_PATH_IMAGE014
wherein, in the step (A),
Figure 80109DEST_PATH_IMAGE015
Figure 545726DEST_PATH_IMAGE017
represents a modulo addition operation;
based on secret key
Figure 461178DEST_PATH_IMAGE018
I.e. by
Figure 277824DEST_PATH_IMAGE019
User of
Figure 77153DEST_PATH_IMAGE013
To the sequence
Figure 662855DEST_PATH_IMAGE005
Particle execution of
Figure 656481DEST_PATH_IMAGE021
After the operation, the operation is delivered to the user B who is not operated;
user' s
Figure 694844DEST_PATH_IMAGE022
Respectively for the sequences
Figure 297864DEST_PATH_IMAGE005
Execute
Figure 3652DEST_PATH_IMAGE024
After the operation, the last user is handed over to user C.
Further, the identity comparing module includes an identity calculating unit, and the identity calculating unit is configured to:
two-dimensional classical random number published by user A
Figure 899670DEST_PATH_IMAGE026
Where m is the length of the Key Key, user C selects the correct measurement base, measures the sequence
Figure 690909DEST_PATH_IMAGE023
The particles of (1);
if it is not
Figure 566461DEST_PATH_IMAGE027
Selecting
Figure 126755DEST_PATH_IMAGE028
Corresponding measurement basis is
Figure 196605DEST_PATH_IMAGE029
If, if
Figure 475139DEST_PATH_IMAGE030
Selecting
Figure 419961DEST_PATH_IMAGE031
Corresponding measurement basis is
Figure 834762DEST_PATH_IMAGE032
User C based on the measurement results
Figure 344022DEST_PATH_IMAGE033
By calculating
Figure 844273DEST_PATH_IMAGE034
Publish first identity information, user A compute
Figure 327207DEST_PATH_IMAGE035
And obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, otherwise, failing the verification, and re-authenticating。
The embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and when the processor executes the computer program, the following steps are implemented:
a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n
Figure 862094DEST_PATH_IMAGE036
User A prepares a set of random single photon sequences
Figure 273746DEST_PATH_IMAGE003
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 261293DEST_PATH_IMAGE003
Performing encryption on the single-photon sequence
Figure 547918DEST_PATH_IMAGE003
Obtaining the sequence after quantum Fourier transform
Figure 937311DEST_PATH_IMAGE005
The user B sequentially pairs the sequences based on the Key Key
Figure 782514DEST_PATH_IMAGE005
Executing a group of operations to obtain execution particles, and delivering the execution particles to a user C;
user C according to the measurement sequence
Figure 257358DEST_PATH_IMAGE005
The first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequence
Figure 82094DEST_PATH_IMAGE003
Calculating to obtain second identity information as the first identity informationWhen the information is equal to the second identity information, the identity authentication of the user B is passed.
An embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the following steps:
a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n
Figure 591573DEST_PATH_IMAGE001
User A prepares a set of random single photon sequences
Figure 610607DEST_PATH_IMAGE003
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 572747DEST_PATH_IMAGE003
Performing encryption on the single-photon sequence
Figure 201174DEST_PATH_IMAGE003
Obtaining the sequence after quantum Fourier transform
Figure 299580DEST_PATH_IMAGE005
The user B sequentially pairs the sequences based on the Key Key
Figure 480726DEST_PATH_IMAGE005
Executing a group of operations to obtain execution particles, and delivering the execution particles to a user C;
user C according to the measurement sequence
Figure 930162DEST_PATH_IMAGE005
The first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequence
Figure 831122DEST_PATH_IMAGE003
Calculating to obtain second identity information as the first identityWhen the information is equal to the second identity information, the identity authentication of the user B is passed.
The quantum-based batch identity authentication method, system, device and storage medium comprise: a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n
Figure 315193DEST_PATH_IMAGE001
(ii) a User A prepares a set of random single photon sequences
Figure 676030DEST_PATH_IMAGE003
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 347182DEST_PATH_IMAGE003
Performing encryption on the single-photon sequence
Figure 582992DEST_PATH_IMAGE003
Obtaining the sequence after quantum Fourier transform
Figure 390411DEST_PATH_IMAGE005
(ii) a The user B sequentially pairs the sequences based on the Key Key
Figure 919219DEST_PATH_IMAGE005
Executing a group of operations to obtain execution particles, and delivering the execution particles to a user C; user C according to the measurement sequence
Figure 77668DEST_PATH_IMAGE005
The first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequence
Figure 586009DEST_PATH_IMAGE003
And calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed. The batch identity authentication scheme based on the quantum Fourier transform provided by the embodiment of the invention firstly adds the quantum Fourier transformAnd the simultaneous identity verification of a plurality of users is completed by the measurement and calculation of a third party, wherein the multi-user batch operation only needs one-time verification, so that the time spent by identity authentication is saved, and the efficiency of quantum identity authentication is improved. In addition, the identity authentication in the embodiment of the invention uses the modulo addition operation of the high-dimensional quantum key space, does not need the preparation of an entangled state, saves quantum entangled resources, and simultaneously, the application of the high-dimensional key space greatly reduces the success probability of collision attack and improves the authentication precision.
Drawings
FIG. 1 is a schematic flow chart diagram illustrating a quantum-based bulk authentication method in one embodiment;
FIG. 2 is a schematic flow diagram of single photon sequence preparation and conversion in one embodiment;
FIG. 3 is a flow diagram illustrating the performance of particle state operations in one embodiment;
FIG. 4 is a flow diagram illustrating a process for performing identity information calculation in one embodiment;
FIG. 5 is a block diagram of a quantum-based batch authentication system in one embodiment;
FIG. 6 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In one embodiment, as shown in fig. 1, there is provided a quantum-based bulk identity authentication method, the method comprising:
step 101, a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n
Figure 779093DEST_PATH_IMAGE036
Step 102, user A prepares a group of random single photonsSequence of
Figure 747311DEST_PATH_IMAGE003
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 127477DEST_PATH_IMAGE003
Performing encryption on the single-photon sequence
Figure 439510DEST_PATH_IMAGE003
Obtaining the sequence after quantum Fourier transform
Figure 487100DEST_PATH_IMAGE005
103, the user B sequentially compares the sequences based on the Key Key
Figure 629150DEST_PATH_IMAGE005
Executing a group of operations to obtain execution particles, and delivering the execution particles to a user C;
step 104, user C measures the sequence according to the measurement sequence
Figure 762191DEST_PATH_IMAGE005
The first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequence
Figure 674652DEST_PATH_IMAGE003
And calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed.
Specifically, in this embodiment, it is assumed that the user a is Alice, the user C is Charlie of the third-party certification authority, and the user B is Charlie
Figure 140531DEST_PATH_IMAGE001
Then Alice wants to target multiple users
Figure 152349DEST_PATH_IMAGE037
The identity of (2) is verified. The scheme is implemented by the aid of a third-party certification authority CharlieThe process of identity authentication and the publishing of the authentication results. The default third party Charlie in the scheme is semi-honest (semi-host), i.e. the third party certification authority Charlie will follow the rules of the scheme and honestly publish the measurement results, but may eavesdrop on the user's key information. According to the batch identity authentication scheme based on the quantum Fourier transform, simultaneous identity authentication of a plurality of users is completed through quantum Fourier transform encryption, third-party measurement and calculation, wherein multi-user batch operation only needs one-time authentication, time spent in identity authentication is saved, and efficiency of quantum identity authentication is improved. In addition, the identity authentication in the embodiment of the invention uses the modulo addition operation of the high-dimensional quantum key space, does not need the preparation of an entangled state, saves quantum entangled resources, and simultaneously, the application of the high-dimensional key space greatly reduces the success probability of collision attack and improves the authentication precision.
In one embodiment, as shown in figure 2, the process of performing single photon sequence preparation and conversion comprises the following steps:
step 201, user A prepares a random single photon sequence
Figure 507107DEST_PATH_IMAGE003
Therein contain
Figure 925056DEST_PATH_IMAGE006
A single photon, said sequence
Figure 681660DEST_PATH_IMAGE003
Expressed as:
Figure 395538DEST_PATH_IMAGE007
Figure 503171DEST_PATH_IMAGE008
(ii) a Wherein d is a positive integer greater than 1;
step 202, user A prepares a set of two-dimensional classical random numbers
Figure 462162DEST_PATH_IMAGE009
Where m is the length of the KeyDegree;
step 203, the user A uses high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 338851DEST_PATH_IMAGE003
Encryption is performed, and the encryption formula is expressed as:
Figure 817106DEST_PATH_IMAGE010
(ii) a Wherein the content of the first and second substances,
Figure 131411DEST_PATH_IMAGE011
step 204, the sequence obtained after the quantum Fourier transform
Figure 392628DEST_PATH_IMAGE005
Is shown as
Figure 717299DEST_PATH_IMAGE012
Specifically, in this embodiment, it is assumed that the user a is Alice, the user C is Charlie of the third-party certification authority, and the user B is Charlie
Figure 743286DEST_PATH_IMAGE036
Alice respectively with the user
Figure 887829DEST_PATH_IMAGE038
A length m-Key is shared by a quantum Key distribution protocol (QKD), such as the BB84 protocol, as shown in the following equation.
Figure 421578DEST_PATH_IMAGE039
Here, only Alice and
Figure 99291DEST_PATH_IMAGE040
knowing the classical bit string Key, d is a positive integer greater than 2 and satisfies
Figure 794714DEST_PATH_IMAGE041
Representing user identity information.
Alice prepares a group of random single photon sequences
Figure 193597DEST_PATH_IMAGE042
As shown in equation 7, the sequence
Figure 265458DEST_PATH_IMAGE042
Therein contain
Figure 971246DEST_PATH_IMAGE006
The number of single-photon lasers is one,
Figure 732178DEST_PATH_IMAGE043
alice generates a set of two-dimensional classical random numbers
Figure 726679DEST_PATH_IMAGE009
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 726865DEST_PATH_IMAGE003
The encryption is formulated as follows
Figure 257466DEST_PATH_IMAGE010
Here, the first and second liquid crystal display panels are,
Figure 419326DEST_PATH_IMAGE011
. Sequence in Alice's hand after QFT transformation
Figure 166702DEST_PATH_IMAGE003
Is converted into
Figure 937955DEST_PATH_IMAGE005
Figure 821598DEST_PATH_IMAGE044
Sequence of
Figure 655824DEST_PATH_IMAGE003
Figure 624917DEST_PATH_IMAGE005
The medium particle state and
Figure 966905DEST_PATH_IMAGE046
the rule of correspondence is shown in the following table
Figure 197730DEST_PATH_IMAGE003
Figure 966972DEST_PATH_IMAGE005
The medium particle state and
Figure 423361DEST_PATH_IMAGE046
corresponding rule of
Figure 477030DEST_PATH_IMAGE047
In one embodiment, as shown in fig. 3, the process of performing the particle status operation execution includes:
step 301, selecting a single user from user B
Figure 459898DEST_PATH_IMAGE013
To the sequence
Figure 9828DEST_PATH_IMAGE005
Performing a set of operations, the operators being represented as:
Figure 311103DEST_PATH_IMAGE014
wherein, in the step (A),
Figure 666998DEST_PATH_IMAGE015
Figure 114160DEST_PATH_IMAGE017
represents a modulo addition operation;
step 302, based on the secret key
Figure 726669DEST_PATH_IMAGE018
I.e. by
Figure 954388DEST_PATH_IMAGE019
User of
Figure 51657DEST_PATH_IMAGE013
To the sequence
Figure 247933DEST_PATH_IMAGE005
Particle execution of
Figure 139666DEST_PATH_IMAGE021
After the operation, the operation is delivered to the user B who is not operated;
step 303, the user
Figure 589102DEST_PATH_IMAGE048
Respectively for the sequences
Figure 850581DEST_PATH_IMAGE005
Execute
Figure 537914DEST_PATH_IMAGE049
After the operation, the last user is handed over to user C.
In one embodiment, as shown in fig. 4, the process of performing the identity information calculation process includes:
step 401, user A publishes two-dimensional classical random number
Figure 662865DEST_PATH_IMAGE026
Where m is the length of the Key Key, user C selects the correct measurement base, measures the sequence
Figure 426028DEST_PATH_IMAGE005
The particles of (1);
step 402, if
Figure 599521DEST_PATH_IMAGE027
Selecting
Figure 938098DEST_PATH_IMAGE028
Corresponding measurement basis is
Figure 797732DEST_PATH_IMAGE029
If, if
Figure 425022DEST_PATH_IMAGE030
Selecting
Figure 308532DEST_PATH_IMAGE031
Corresponding measurement basis is
Figure 970457DEST_PATH_IMAGE032
In step 403, the user C measures the measurement result
Figure 765107DEST_PATH_IMAGE033
By calculating
Figure 912317DEST_PATH_IMAGE034
Publish first identity information, user A compute
Figure 286666DEST_PATH_IMAGE035
And obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
Specifically, after the particle preparation is completed, Alice sends the particle preparation to n users for identity verification, and the specific process is as follows.
1) Individual user
Figure 599836DEST_PATH_IMAGE013
To the sequence
Figure 939288DEST_PATH_IMAGE005
Performing a set of operations, the operators may be represented as
Figure 134646DEST_PATH_IMAGE014
Wherein the content of the first and second substances,
Figure 719211DEST_PATH_IMAGE050
Figure 716248DEST_PATH_IMAGE017
representing a modulo addition operation. This operation may produce both bit flipping and phase flipping,
Figure 728067DEST_PATH_IMAGE005
in
Figure 446274DEST_PATH_IMAGE051
And
Figure 568951DEST_PATH_IMAGE052
the transformed state is shown in the following table
To pair
Figure 450188DEST_PATH_IMAGE005
Execute
Figure 868793DEST_PATH_IMAGE053
Particle state of operation
Figure 569902DEST_PATH_IMAGE054
Based on secret key
Figure 496269DEST_PATH_IMAGE055
I.e. by
Figure 199390DEST_PATH_IMAGE056
User of
Figure 553011DEST_PATH_IMAGE013
To the sequence
Figure 242880DEST_PATH_IMAGE005
Particle execution of
Figure 972939DEST_PATH_IMAGE021
And the operation is delivered to other users.
2) User' s
Figure DEST_PATH_IMAGE057
Respectively align the sequences
Figure 649340DEST_PATH_IMAGE005
Execute
Figure DEST_PATH_IMAGE058
After the operation, the last user is handed over to the third party Charlie.
3) Random number published by Alice
Figure DEST_PATH_IMAGE059
Charlie selects the correct measurement base, the measurement sequence
Figure 659016DEST_PATH_IMAGE005
Of (2) is used. If it is not
Figure 944504DEST_PATH_IMAGE027
Selecting
Figure 101422DEST_PATH_IMAGE028
Corresponding measuring base
Figure 890387DEST_PATH_IMAGE029
If, if
Figure 710444DEST_PATH_IMAGE030
Selecting
Figure 984693DEST_PATH_IMAGE031
Corresponding measurement basis is
Figure 181188DEST_PATH_IMAGE032
. Here, if the wrong measurement basis is selected, the measurement results are random, and the accuracy is only 50%.
4) Charlie according to the measurement results
Figure 886975DEST_PATH_IMAGE028
Computing
Figure 523274DEST_PATH_IMAGE034
And published.
5) Alice calculation
Figure 642409DEST_PATH_IMAGE035
And comparing with the result published by Charlie, if the result is equal, the identity verification is passed, otherwise, the verification fails, and the authentication is carried out again.
It should be understood that, although the steps in the above-described flowcharts are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in the above-described flowcharts may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or the stages is not necessarily sequential, but may be performed alternately or alternatingly with other steps or at least a portion of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 5, there is provided a quantum-based bulk authentication system, including:
a Key distribution module 501, configured to share a Key with a length of m by a user a and a user B through a quantum Key distribution protocol, where the user B is a batch group set with an individual n
Figure 252382DEST_PATH_IMAGE036
A particle preparation module 502 for user A to prepare a set of random single photon sequences
Figure 110878DEST_PATH_IMAGE003
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 210421DEST_PATH_IMAGE003
Performing encryption on the single-photon sequence
Figure 49808DEST_PATH_IMAGE003
Obtaining the sequence after quantum Fourier transform
Figure 260210DEST_PATH_IMAGE005
A particle manipulation module 503, configured to sequentially pair the sequences based on the Key by the user B
Figure 143852DEST_PATH_IMAGE005
Executing a group of operations to obtain execution particles, and delivering the execution particles to a user C;
identity comparison module 504 for user C based on the measurement sequence
Figure 243657DEST_PATH_IMAGE005
The first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequence
Figure 947171DEST_PATH_IMAGE003
And calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed.
In one embodiment, as shown in fig. 5, the particle preparation module 502 comprises a sequence conversion unit 5021, the sequence conversion unit 5021 is configured to:
random single photon sequence prepared by user A
Figure 289160DEST_PATH_IMAGE003
Therein contain
Figure 340159DEST_PATH_IMAGE006
A single photon, said sequence
Figure 984767DEST_PATH_IMAGE003
Expressed as:
Figure DEST_PATH_IMAGE060
Figure DEST_PATH_IMAGE061
(ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbers
Figure 395151DEST_PATH_IMAGE009
Wherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transform
Figure 275251DEST_PATH_IMAGE003
Encryption is performed, and the encryption formula is expressed as:
Figure 428759DEST_PATH_IMAGE010
(ii) a Wherein the content of the first and second substances,
Figure 713110DEST_PATH_IMAGE011
the sequence obtained after quantum Fourier transform
Figure 781429DEST_PATH_IMAGE005
Is shown as
Figure 842051DEST_PATH_IMAGE012
In one embodiment, as shown in fig. 5, the particle manipulation module includes a particle state execution unit, and the particle state execution unit is configured to:
selecting a single user from user B
Figure 679426DEST_PATH_IMAGE013
To the sequence
Figure 665836DEST_PATH_IMAGE020
Performing a set of operations, the operators being represented as:
Figure 460267DEST_PATH_IMAGE014
wherein, in the step (A),
Figure 151011DEST_PATH_IMAGE015
Figure 750882DEST_PATH_IMAGE017
represents a modulo addition operation;
based on secret key
Figure 236090DEST_PATH_IMAGE018
I.e. by
Figure 511957DEST_PATH_IMAGE019
User of
Figure 678496DEST_PATH_IMAGE013
To the sequence
Figure 693726DEST_PATH_IMAGE005
Particle execution of
Figure 648037DEST_PATH_IMAGE021
After the operation, the operation is delivered to the user B who is not operated;
user' s
Figure 788032DEST_PATH_IMAGE022
Respectively for the sequences
Figure 109992DEST_PATH_IMAGE005
Execute
Figure 651832DEST_PATH_IMAGE024
After operation, by the last bitThe user is handed over to user C.
In one embodiment, as shown in fig. 5, the identity comparison module includes an identity calculation unit configured to:
two-dimensional classical random number published by user A
Figure 275580DEST_PATH_IMAGE026
Where m is the length of the Key Key, user C selects the correct measurement base, measures the sequence
Figure 404335DEST_PATH_IMAGE005
The particles of (1);
if it is not
Figure 974994DEST_PATH_IMAGE027
Selecting
Figure 168078DEST_PATH_IMAGE028
Corresponding measurement basis is
Figure 461263DEST_PATH_IMAGE029
If, if
Figure 575849DEST_PATH_IMAGE030
Selecting
Figure 982822DEST_PATH_IMAGE031
Corresponding measurement basis is
Figure 233675DEST_PATH_IMAGE032
User C based on the measurement results
Figure 199226DEST_PATH_IMAGE033
By calculating
Figure 305503DEST_PATH_IMAGE034
Publish first identity information, user A compute
Figure 14702DEST_PATH_IMAGE035
To obtain a second bodyAnd comparing the identity information with the first identity information published by the user C, if the identity information is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
For specific limitations of the quantum-based batch authentication system, reference may be made to the above limitations of the quantum-based batch authentication method, which are not described herein again. The modules in the quantum-based batch identity authentication system can be wholly or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
FIG. 6 is a diagram illustrating an internal structure of a computer device in one embodiment. As shown in fig. 6, the computer apparatus includes a processor, a memory, a network interface, an input device, and a display screen connected through a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement a quantum-based bulk authentication method. The internal memory may also have stored therein a computer program that, when executed by the processor, causes the processor to perform a quantum-based bulk authentication method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n
Figure 385640DEST_PATH_IMAGE001
User A prepares a set of random single photon sequences
Figure 23557DEST_PATH_IMAGE003
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 378315DEST_PATH_IMAGE003
Performing encryption on the single-photon sequence
Figure 327423DEST_PATH_IMAGE003
Obtaining the sequence after quantum Fourier transform
Figure 677502DEST_PATH_IMAGE005
The user B sequentially pairs the sequences based on the Key Key
Figure 125801DEST_PATH_IMAGE005
Executing a group of operations to obtain execution particles, and delivering the execution particles to a user C;
user C according to the measurement sequence
Figure 62795DEST_PATH_IMAGE005
The first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequence
Figure 989163DEST_PATH_IMAGE003
Calculating to obtain second identity information, when the first identity information and the second identity information areWhen the two identity information are equal, the identity authentication of the user B passes.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
for single photon sequence
Figure 241020DEST_PATH_IMAGE003
Encrypting, and obtaining the sequence after the single-photon sequence is subjected to quantum Fourier transform
Figure 922537DEST_PATH_IMAGE005
(ii) a The method comprises the following steps:
random single photon sequence prepared by user A
Figure 986308DEST_PATH_IMAGE003
Therein contain
Figure 342465DEST_PATH_IMAGE006
A single photon, said sequence
Figure 135977DEST_PATH_IMAGE003
Expressed as:
Figure 752510DEST_PATH_IMAGE007
Figure 631473DEST_PATH_IMAGE008
(ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbers
Figure 197846DEST_PATH_IMAGE009
Wherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transform
Figure 377024DEST_PATH_IMAGE003
Encryption is performed, and the encryption formula is expressed as:
Figure 108000DEST_PATH_IMAGE010
(ii) a Wherein the content of the first and second substances,
Figure 208680DEST_PATH_IMAGE011
the sequence obtained after quantum Fourier transform
Figure 906640DEST_PATH_IMAGE005
Is shown as
Figure 674745DEST_PATH_IMAGE012
In one embodiment, the processor, when executing the computer program, further performs the steps of:
selecting a single user from user B
Figure 633080DEST_PATH_IMAGE013
To the sequence
Figure 486636DEST_PATH_IMAGE005
Performing a set of operations, the operators being represented as:
Figure 925969DEST_PATH_IMAGE014
wherein, in the step (A),
Figure 814160DEST_PATH_IMAGE015
Figure 937537DEST_PATH_IMAGE017
represents a modulo addition operation;
based on secret key
Figure 684913DEST_PATH_IMAGE018
I.e. by
Figure 426473DEST_PATH_IMAGE019
User of
Figure 936214DEST_PATH_IMAGE013
To the sequence
Figure 675500DEST_PATH_IMAGE005
Particle execution of
Figure 736604DEST_PATH_IMAGE021
After the operation, the operation is delivered to the user B who is not operated;
user' s
Figure 813013DEST_PATH_IMAGE022
Respectively for the sequences
Figure 911681DEST_PATH_IMAGE005
Execute
Figure DEST_PATH_IMAGE062
After the operation, the last user is handed over to user C.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
two-dimensional classical random number published by user A
Figure 513214DEST_PATH_IMAGE026
Where m is the length of the Key Key, user C selects the correct measurement base, measures the sequence
Figure 563078DEST_PATH_IMAGE005
The particles of (1);
if it is not
Figure 475801DEST_PATH_IMAGE027
Selecting
Figure 334036DEST_PATH_IMAGE028
Corresponding measurement basis is
Figure 975977DEST_PATH_IMAGE029
If, if
Figure 309875DEST_PATH_IMAGE030
Selecting
Figure 698393DEST_PATH_IMAGE031
Corresponding measurement basis is
Figure 676713DEST_PATH_IMAGE032
User C based on the measurement results
Figure 725441DEST_PATH_IMAGE033
By calculating
Figure 62748DEST_PATH_IMAGE034
Publish first identity information, user A compute
Figure 753493DEST_PATH_IMAGE035
And obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n
Figure 415681DEST_PATH_IMAGE001
User A prepares a set of random single photon sequences
Figure 900889DEST_PATH_IMAGE003
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 911177DEST_PATH_IMAGE003
Performing encryption on the single-photon sequence
Figure 874453DEST_PATH_IMAGE003
Obtaining the sequence after quantum Fourier transform
Figure 656727DEST_PATH_IMAGE005
The user B sequentially pairs the sequences based on the Key Key
Figure 578415DEST_PATH_IMAGE005
Executing a group of operations to obtain execution particles, and delivering the execution particles to a user C;
user C according to the measurement sequence
Figure 816279DEST_PATH_IMAGE005
The first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequence
Figure 943767DEST_PATH_IMAGE003
And calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
for single photon sequence
Figure 79082DEST_PATH_IMAGE003
Encrypting, and obtaining the sequence after the single-photon sequence is subjected to quantum Fourier transform
Figure 670207DEST_PATH_IMAGE005
(ii) a The method comprises the following steps:
random single photon sequence prepared by user A
Figure 563076DEST_PATH_IMAGE003
Therein contain
Figure 399314DEST_PATH_IMAGE006
A single photon, said sequence
Figure 952918DEST_PATH_IMAGE003
Expressed as:
Figure 302560DEST_PATH_IMAGE007
Figure 745042DEST_PATH_IMAGE008
(ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbers
Figure 683174DEST_PATH_IMAGE009
Wherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transform
Figure 26037DEST_PATH_IMAGE003
Encryption is performed, and the encryption formula is expressed as:
Figure 788325DEST_PATH_IMAGE010
(ii) a Wherein the content of the first and second substances,
Figure 485148DEST_PATH_IMAGE011
the sequence obtained after quantum Fourier transform
Figure 335293DEST_PATH_IMAGE020
Is shown as
Figure 538522DEST_PATH_IMAGE012
In one embodiment, the processor, when executing the computer program, further performs the steps of:
selecting a single user from user B
Figure 674974DEST_PATH_IMAGE013
To the sequence
Figure 764153DEST_PATH_IMAGE023
Performing a set of operations, the operators being represented as:
Figure 778507DEST_PATH_IMAGE014
wherein, in the step (A),
Figure 331848DEST_PATH_IMAGE015
Figure 606578DEST_PATH_IMAGE017
represents a modulo addition operation;
based on secret key
Figure 776529DEST_PATH_IMAGE018
I.e. by
Figure 797837DEST_PATH_IMAGE019
User of
Figure 471263DEST_PATH_IMAGE013
To the sequence
Figure 872156DEST_PATH_IMAGE005
Particle execution of
Figure 998244DEST_PATH_IMAGE021
After the operation, the operation is delivered to the user B who is not operated;
user' s
Figure 619980DEST_PATH_IMAGE022
Respectively for the sequences
Figure 882334DEST_PATH_IMAGE005
Execute
Figure 938015DEST_PATH_IMAGE062
After the operation, the last user is handed over to user C.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
two-dimensional classical random number published by user A
Figure 49934DEST_PATH_IMAGE026
Where m is the length of the Key Key, user C selects the correct measurement base, measures the sequence
Figure 442738DEST_PATH_IMAGE005
The particles of (1);
if it is not
Figure 264326DEST_PATH_IMAGE027
Selecting
Figure 553225DEST_PATH_IMAGE028
Corresponding measurement basis is
Figure 955037DEST_PATH_IMAGE029
If, if
Figure 354795DEST_PATH_IMAGE030
Selecting
Figure 529424DEST_PATH_IMAGE031
Corresponding measurement basis is
Figure 287427DEST_PATH_IMAGE032
User C based on the measurement results
Figure 875403DEST_PATH_IMAGE033
By calculating
Figure 249490DEST_PATH_IMAGE034
Publish first identity information, user A compute
Figure 403260DEST_PATH_IMAGE035
And obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A quantum-based batch identity authentication method is characterized by comprising the following steps:
a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n
Figure 90876DEST_PATH_IMAGE001
User A prepares a set of random single photon sequences
Figure 9153DEST_PATH_IMAGE002
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 113375DEST_PATH_IMAGE002
Performing encryption on the single-photon sequence
Figure 82600DEST_PATH_IMAGE002
Obtaining the sequence after quantum Fourier transform
Figure 410813DEST_PATH_IMAGE003
The user B sequentially pairs the sequences based on the Key Key
Figure 550807DEST_PATH_IMAGE003
Executing a group of operations to obtain execution particles, and delivering the execution particles to a user C;
user C according to the measurement sequence
Figure 504725DEST_PATH_IMAGE003
The first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequence
Figure 46565DEST_PATH_IMAGE002
And calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed.
2. The quantum-based batch identity authentication method of claim 1, wherein the user a prepares a set of random single-photon sequences
Figure 545680DEST_PATH_IMAGE002
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 172970DEST_PATH_IMAGE002
Performing encryption on the single-photon sequence
Figure 166465DEST_PATH_IMAGE002
Obtaining the sequence after quantum Fourier transform
Figure 562811DEST_PATH_IMAGE003
(ii) a The method comprises the following steps:
random single photon sequence prepared by user A
Figure 232827DEST_PATH_IMAGE002
Therein contain
Figure 347414DEST_PATH_IMAGE004
A single photon, said sequence
Figure 114906DEST_PATH_IMAGE002
Expressed as:
Figure 631338DEST_PATH_IMAGE005
Figure 472255DEST_PATH_IMAGE006
(ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbers
Figure 74138DEST_PATH_IMAGE007
Wherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transform
Figure 409435DEST_PATH_IMAGE002
Encryption is performed, and the encryption formula is expressed as:
Figure 780374DEST_PATH_IMAGE008
(ii) a Wherein the content of the first and second substances,
Figure 792192DEST_PATH_IMAGE009
the sequence obtained after quantum Fourier transform
Figure 615791DEST_PATH_IMAGE003
Is shown as
Figure 253315DEST_PATH_IMAGE010
3. The quantum-based batch identity authentication method of claim 1, wherein the user B pairs the sequence in order based on the Key
Figure 478760DEST_PATH_IMAGE003
Obtaining an execution particle after executing a group of operations, and delivering the execution particle to a user C, wherein the steps of:
selecting a single user from user B
Figure 458217DEST_PATH_IMAGE011
To the sequence
Figure 785425DEST_PATH_IMAGE003
Performing a set of operations, the operators being represented as:
Figure 711792DEST_PATH_IMAGE012
wherein, in the step (A),
Figure 791744DEST_PATH_IMAGE013
Figure 410944DEST_PATH_IMAGE014
represents a modulo addition operation;
based on secret key
Figure 461333DEST_PATH_IMAGE015
I.e. by
Figure 191391DEST_PATH_IMAGE016
User of
Figure 125849DEST_PATH_IMAGE011
To the sequence
Figure 915951DEST_PATH_IMAGE003
Particle execution of
Figure 952171DEST_PATH_IMAGE017
After the operation, the operation is delivered to the user B who is not operated;
user' s
Figure 220341DEST_PATH_IMAGE018
Respectively for the sequences
Figure 274885DEST_PATH_IMAGE003
Execute
Figure 235888DEST_PATH_IMAGE019
After the operation, the last user is handed over to user C.
4. The quantum-based batch identity authentication method of claim 1, wherein the user C is in accordance with a sum sequence
Figure 992360DEST_PATH_IMAGE003
The first identity information is obtained by calculation of the particles in the system, and the user A obtains the first identity information according to the Key and the single-photon sequence
Figure 64221DEST_PATH_IMAGE020
Calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the user B passes the identity authentication, including:
two-dimensional classical random number published by user A
Figure 238851DEST_PATH_IMAGE021
Where m is the length of the Key Key, user C selects the correct measurement base, measures the sequence
Figure 105176DEST_PATH_IMAGE003
The particles of (1);
if it is not
Figure 115988DEST_PATH_IMAGE022
Selecting
Figure 725961DEST_PATH_IMAGE023
Corresponding measurement basis is
Figure 755097DEST_PATH_IMAGE024
If, if
Figure 792323DEST_PATH_IMAGE025
Selecting
Figure 526317DEST_PATH_IMAGE026
Corresponding measurement basis is
Figure 205560DEST_PATH_IMAGE027
User C based on the measurement results
Figure 89203DEST_PATH_IMAGE028
By calculating
Figure 562909DEST_PATH_IMAGE029
Publish first identity information, user A compute
Figure 17155DEST_PATH_IMAGE030
And obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
5. A quantum-based batch identity authentication system, comprising:
a Key distribution module, configured to share a Key with a length of m by a user a and a user B through a quantum Key distribution protocol, where the user B is a batch group set with an individual n
Figure 968931DEST_PATH_IMAGE001
A particle preparation module for preparing a group of random single photon sequences by a user A
Figure 972659DEST_PATH_IMAGE031
And using high-dimensional quantum Fourier transform to pair single-photon sequences
Figure 351688DEST_PATH_IMAGE031
Performing encryption on the single-photon sequence
Figure 57344DEST_PATH_IMAGE031
Obtaining the sequence after quantum Fourier transform
Figure 812811DEST_PATH_IMAGE032
A particle operation module used for the user B to sequentially align the sequences based on the Key Key
Figure 671045DEST_PATH_IMAGE032
Executing a group of operations to obtain execution particles, and delivering the execution particles to a user C;
identity comparison module for user C based on the measurement sequence
Figure 34025DEST_PATH_IMAGE032
The first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequence
Figure 180972DEST_PATH_IMAGE031
And calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed.
6. The quantum-based bulk authentication system of claim 5, wherein the particle preparation module comprises a sequence conversion unit to:
user A prepared randomSingle photon sequence
Figure 474550DEST_PATH_IMAGE031
Therein contain
Figure 187292DEST_PATH_IMAGE033
A single photon, said sequence
Figure 173702DEST_PATH_IMAGE031
Expressed as:
Figure 641900DEST_PATH_IMAGE005
Figure 473589DEST_PATH_IMAGE006
(ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbers
Figure 588307DEST_PATH_IMAGE034
Wherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transform
Figure 745619DEST_PATH_IMAGE031
Encryption is performed, and the encryption formula is expressed as:
Figure 663896DEST_PATH_IMAGE035
(ii) a Wherein the content of the first and second substances,
Figure 299277DEST_PATH_IMAGE036
the sequence obtained after quantum Fourier transform
Figure 235878DEST_PATH_IMAGE032
Is shown as
Figure 564091DEST_PATH_IMAGE037
7. The quantum-based batch identity authentication system of claim 5, wherein the particle manipulation module comprises a particle state execution unit to:
selecting a single user from user B
Figure 704085DEST_PATH_IMAGE038
To the sequence
Figure 143157DEST_PATH_IMAGE032
Performing a set of operations, the operators being represented as:
Figure 435729DEST_PATH_IMAGE039
wherein, in the step (A),
Figure 934844DEST_PATH_IMAGE013
Figure 562134DEST_PATH_IMAGE040
represents a modulo addition operation;
based on secret key
Figure 804897DEST_PATH_IMAGE041
I.e. by
Figure 453440DEST_PATH_IMAGE042
User of
Figure 123456DEST_PATH_IMAGE011
To the sequence
Figure 238042DEST_PATH_IMAGE003
Particle execution of
Figure 18917DEST_PATH_IMAGE017
After the operation, the operation is delivered to the user B who is not operated;
user' s
Figure 286081DEST_PATH_IMAGE018
Respectively for the sequences
Figure 923736DEST_PATH_IMAGE003
Execute
Figure 525618DEST_PATH_IMAGE043
After the operation, the last user is handed over to user C.
8. The quantum-based bulk authentication system of claim 5, wherein the identity comparison module comprises an identity computation unit configured to:
two-dimensional classical random number published by user A
Figure 359451DEST_PATH_IMAGE021
Where m is the length of the Key Key, user C selects the correct measurement base, measures the sequence
Figure 730390DEST_PATH_IMAGE003
The particles of (1);
if it is not
Figure 945470DEST_PATH_IMAGE022
Selecting
Figure 565807DEST_PATH_IMAGE023
Corresponding measurement basis is
Figure 704796DEST_PATH_IMAGE024
If, if
Figure 930241DEST_PATH_IMAGE025
Selecting
Figure 112960DEST_PATH_IMAGE026
Corresponding measurement basis is
Figure 689435DEST_PATH_IMAGE027
User C based on the measurement results
Figure 868000DEST_PATH_IMAGE028
By calculating
Figure 947952DEST_PATH_IMAGE029
Publish first identity information, user A compute
Figure 567152DEST_PATH_IMAGE030
And obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 4 are implemented when the computer program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 4.
CN202111504507.7A 2021-12-10 2021-12-10 Quantum-based batch identity authentication method, system, equipment and storage medium Active CN113904780B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111504507.7A CN113904780B (en) 2021-12-10 2021-12-10 Quantum-based batch identity authentication method, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111504507.7A CN113904780B (en) 2021-12-10 2021-12-10 Quantum-based batch identity authentication method, system, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113904780A true CN113904780A (en) 2022-01-07
CN113904780B CN113904780B (en) 2022-03-04

Family

ID=79025575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111504507.7A Active CN113904780B (en) 2021-12-10 2021-12-10 Quantum-based batch identity authentication method, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113904780B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114553419A (en) * 2022-03-24 2022-05-27 上海循态量子科技有限公司 Quantum identity authentication method and system based on continuous variable quantum key distribution

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100293380A1 (en) * 2008-01-25 2010-11-18 Qinetiq Limited Quantum cryptography apparatus
US20110126011A1 (en) * 2009-11-24 2011-05-26 Electronics And Telecommunications Research Institute Method of user-authenticated quantum key distribution
CN105515779A (en) * 2015-12-31 2016-04-20 中国工程物理研究院电子工程研究所 Quantum security authentication system based on optical PUF
CN108092770A (en) * 2018-02-11 2018-05-29 成都信息工程大学 Quanta identity authentication method, computer, computer program, readable storage medium storing program for executing
CN108737079A (en) * 2017-04-14 2018-11-02 广东国盾量子科技有限公司 Distributed quantum key manages system and method
CN108833087A (en) * 2018-05-18 2018-11-16 西安建筑科技大学 A kind of multi-user quantum identity identifying method based on orbital angular momentum
US20180351738A1 (en) * 2017-05-30 2018-12-06 Ut-Battelle, Llc Quantum self-authenticating timing system
CN109327308A (en) * 2018-10-30 2019-02-12 成都信息工程大学 A kind of quantum key delivering method and system with bidirectional identity authentication function
CN111082937A (en) * 2020-01-10 2020-04-28 华北电力大学 Bidirectional identity authentication method based on single photon
CN111404691A (en) * 2020-03-02 2020-07-10 成都信息工程大学 Quantum secret sharing method and system with credible authentication based on quantum walking
CN112713943A (en) * 2020-11-30 2021-04-27 安徽澄小光智能科技有限公司 Quantum secure communication system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100293380A1 (en) * 2008-01-25 2010-11-18 Qinetiq Limited Quantum cryptography apparatus
US20110126011A1 (en) * 2009-11-24 2011-05-26 Electronics And Telecommunications Research Institute Method of user-authenticated quantum key distribution
CN105515779A (en) * 2015-12-31 2016-04-20 中国工程物理研究院电子工程研究所 Quantum security authentication system based on optical PUF
CN108737079A (en) * 2017-04-14 2018-11-02 广东国盾量子科技有限公司 Distributed quantum key manages system and method
US20180351738A1 (en) * 2017-05-30 2018-12-06 Ut-Battelle, Llc Quantum self-authenticating timing system
CN108092770A (en) * 2018-02-11 2018-05-29 成都信息工程大学 Quanta identity authentication method, computer, computer program, readable storage medium storing program for executing
CN108833087A (en) * 2018-05-18 2018-11-16 西安建筑科技大学 A kind of multi-user quantum identity identifying method based on orbital angular momentum
CN109327308A (en) * 2018-10-30 2019-02-12 成都信息工程大学 A kind of quantum key delivering method and system with bidirectional identity authentication function
CN111082937A (en) * 2020-01-10 2020-04-28 华北电力大学 Bidirectional identity authentication method based on single photon
CN111404691A (en) * 2020-03-02 2020-07-10 成都信息工程大学 Quantum secret sharing method and system with credible authentication based on quantum walking
CN112713943A (en) * 2020-11-30 2021-04-27 安徽澄小光智能科技有限公司 Quantum secure communication system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
XIAOPING LOU: "Sequential Quantum Multiparty Signature Based on Quantum Fourier Transform and Chaotic System", 《IEEE ACCESS 》 *
刘文杰: "基于互认证的三维单光子量子安全直接通信", 《2009年中国智能自动化会议论文集(第六分册)[中南大学学报(增刊)]中国自动化学会智能自动化专业委员会会议论文集》 *
周楝淞等: "身份认证技术及其发展趋势", 《通信技术》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114553419A (en) * 2022-03-24 2022-05-27 上海循态量子科技有限公司 Quantum identity authentication method and system based on continuous variable quantum key distribution
CN114553419B (en) * 2022-03-24 2024-05-17 上海循态量子科技有限公司 Quantum identity authentication method and system based on continuous variable quantum key distribution

Also Published As

Publication number Publication date
CN113904780B (en) 2022-03-04

Similar Documents

Publication Publication Date Title
Xu et al. VerifyNet: Secure and verifiable federated learning
CN107145791B (en) K-means clustering method and system with privacy protection function
CN110086626B (en) Quantum secret communication alliance chain transaction method and system based on asymmetric key pool pair
Zhou et al. ExpSOS: Secure and verifiable outsourcing of exponentiation operations for mobile cloud computing
Cheng et al. Secure similar sequence query on outsourced genomic data
CN116561789B (en) Processing method and device of privacy data, electronic equipment and readable storage medium
CN104468476B (en) Method and apparatus without certificate multi-proxy signature
Hu et al. Achieving privacy-preserving and verifiable support vector machine training in the cloud
JP6753403B2 (en) Information processing equipment, authentication systems, authentication methods, and computer programs
Mashhadi General secret sharing based on quantum Fourier transform
KR20130085491A (en) Multi-user searchable encryption system with index validation and tracing and method thereof
CN114417414A (en) Privacy protection method based on edge calculation
CN108737116B (en) Voting protocol method based on d-dimensional three-quantum entangled state
JP7209431B2 (en) Digital signature method, signature information verification method, related device and electronic device
CN113836556A (en) Federal learning-oriented decentralized function encryption privacy protection method and system
Fan et al. PPMCK: Privacy-preserving multi-party computing for K-means clustering
Xu et al. DNA similarity search with access control over encrypted cloud data
CN113904780B (en) Quantum-based batch identity authentication method, system, equipment and storage medium
CN115664629A (en) Homomorphic encryption-based data privacy protection method for intelligent Internet of things platform
CN113626831A (en) CP-ABE method supporting privacy protection and decryption in cloud
CN109740383B (en) Privacy protection control method for fog computing-oriented medical system
CN113364595A (en) Power grid private data signature aggregation method and device and computer equipment
CN110336775B (en) Quantum group authentication method based on Grover algorithm
CN113904779B (en) Identity authentication method, system, equipment and storage medium based on super-secret code
CN113792282B (en) Identity data verification method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant