CN113904780A - Quantum-based batch identity authentication method, system, equipment and storage medium - Google Patents
Quantum-based batch identity authentication method, system, equipment and storage medium Download PDFInfo
- Publication number
- CN113904780A CN113904780A CN202111504507.7A CN202111504507A CN113904780A CN 113904780 A CN113904780 A CN 113904780A CN 202111504507 A CN202111504507 A CN 202111504507A CN 113904780 A CN113904780 A CN 113904780A
- Authority
- CN
- China
- Prior art keywords
- user
- sequence
- identity information
- key
- quantum
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/70—Photonic quantum communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Optics & Photonics (AREA)
- Collating Specific Patterns (AREA)
- Optical Communication System (AREA)
Abstract
The application relates to a quantum-based batch identity authentication method, system, device and storage medium. The method comprises the following steps: a user A and a user B share a Key with the length of m through a quantum Key distribution protocol; user A prepares a set of random single photon sequencesAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesPerforming encryption, single photon sequenceThrough excessive amountObtaining the sequence after sub-Fourier transform(ii) a The user B sequentially pairs the sequences based on the Key KeyObtaining an execution particle after executing a group of operations, and delivering the execution particle to a user C; user C according to the measurement sequenceThe first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequenceAnd calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed. The invention saves the time of identity authentication and improves the efficiency and the precision of the identity authentication.
Description
Technical Field
The present application relates to the field of identity recognition, and in particular, to a quantum-based batch identity authentication method, system, device, and storage medium.
Background
In the existing identity authentication, in the process of simultaneously authenticating and identifying in large batch, artificial intelligence identification based on large data is generally adopted, however, in the batch authentication process, because the data acquisition amount is large and the identification process is complex, the authentication efficiency is low, and the identification precision can become low along with the change of the acquired original data, so that the problems of precision and efficiency exist in the existing batch identity identification.
For example, CN111614638A discloses a face recognition data distribution system based on a big data platform and a distribution method thereof, including: the system comprises at least one application device and a database server, wherein the database server comprises a processor, a data acquisition module for collecting face recognition data, a data processing module for adding labels and carrying out encryption processing, a data storage module for storing face information files, an identity verification module for authenticating and managing the application device, a wireless network module for connecting the application device and the database server, and an authority module for configuring authority, and the processor is respectively connected with the data processing module, the data storage module, the identity verification module, the wireless network module and the authority module. The traditional identification method is slow in calculation process and low in accuracy. How to improve the technical problem of batch identity recognition needs further technical innovation.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a quantum-based batch identity authentication method, system, device and storage medium.
In a first aspect, an embodiment of the present invention provides a quantum-based batch identity authentication method, where the method includes:
a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n;
User A prepares a set of random single photon sequencesAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesPerforming encryption on the single-photon sequenceObtaining the sequence after quantum Fourier transform;
The user B sequentially pairs the sequences based on the Key KeyExecuting a group of operations to obtain execution particles, and delivering the execution particles to a user C;
user C according to the measurement sequenceThe first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequenceAnd calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed.
Further, the user A prepares a group of followersSingle photon sequence of machineAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesEncrypting, and obtaining the sequence after the single-photon sequence is subjected to quantum Fourier transform(ii) a The method comprises the following steps:
random single photon sequence prepared by user ATherein containA single photon, said sequenceExpressed as: (ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbersWherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transformEncryption is performed, and the encryption formula is expressed as:
Further, the user B sequentially pairs the sequences based on the Key KeyObtaining an execution particle after executing a group of operations, and delivering the execution particle to a user C, wherein the steps of:
selecting a single user from user BTo the sequencePerforming a set of operations, the operators being represented as:
based on secret keyI.e. byUser ofTo the sequenceParticle execution ofAfter the operation, the operation is delivered to the user B who is not operated;
user' sRespectively for the sequencesExecuteAfter the operation, the last user is handed over to user C.
Further, the user C is according to a sum sequenceThe first identity information is obtained by calculation of the particles in the system, and the user A obtains the first identity information according to the Key and the single-photon sequenceCalculating to obtain second identity information, and when the first identity information and the second identity information are equal, the user B passes the identity authentication, including:
two-dimensional classical random number published by user AWhere m is the length of the Key Key, user C selects the correct measurement base, measures the sequenceThe particles of (1);
if it is notSelectingCorresponding measurement basis isIf, ifSelectingCorresponding measurement basis is;
User C based on the measurement resultsBy calculatingPublish first identity information, user A computeAnd obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
On the other hand, the embodiment of the invention also provides a quantum-based batch identity authentication system, which comprises:
a Key distribution module, configured to share a Key with a length of m by a user a and a user B through a quantum Key distribution protocol, where the user B is a batch group set with an individual n;
Particle preparation module for use withPreparation of a group of random single photon sequences by Huo AAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesPerforming encryption on the single-photon sequenceObtaining the sequence after quantum Fourier transform;
A particle operation module used for the user B to sequentially align the sequences based on the Key KeyExecuting a group of operations to obtain execution particles, and delivering the execution particles to a user C;
identity comparison module for user C based on the measurement sequenceThe first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequenceAnd calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed.
Further, the particle preparation module comprises a sequence conversion unit configured to:
random single photon sequence prepared by user ATherein containA single photon, said sequenceExpressed as: (ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbersWherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transformEncryption is performed, and the encryption formula is expressed as:
Further, the particle operation module includes a particle state execution unit, and the particle state execution unit is configured to:
selecting a single user from user BTo the sequencePerforming a set of operations, the operators being represented as:
based on secret keyI.e. byUser ofTo the sequenceParticle execution ofAfter the operation, the operation is delivered to the user B who is not operated;
user' sRespectively for the sequencesExecuteAfter the operation, the last user is handed over to user C.
Further, the identity comparing module includes an identity calculating unit, and the identity calculating unit is configured to:
two-dimensional classical random number published by user AWhere m is the length of the Key Key, user C selects the correct measurement base, measures the sequenceThe particles of (1);
if it is notSelectingCorresponding measurement basis isIf, ifSelectingCorresponding measurement basis is;
User C based on the measurement resultsBy calculatingPublish first identity information, user A computeAnd obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, otherwise, failing the verification, and re-authenticating。
The embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and when the processor executes the computer program, the following steps are implemented:
a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n;
User A prepares a set of random single photon sequencesAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesPerforming encryption on the single-photon sequenceObtaining the sequence after quantum Fourier transform;
The user B sequentially pairs the sequences based on the Key KeyExecuting a group of operations to obtain execution particles, and delivering the execution particles to a user C;
user C according to the measurement sequenceThe first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequenceCalculating to obtain second identity information as the first identity informationWhen the information is equal to the second identity information, the identity authentication of the user B is passed.
An embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the following steps:
a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n;
User A prepares a set of random single photon sequencesAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesPerforming encryption on the single-photon sequenceObtaining the sequence after quantum Fourier transform;
The user B sequentially pairs the sequences based on the Key KeyExecuting a group of operations to obtain execution particles, and delivering the execution particles to a user C;
user C according to the measurement sequenceThe first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequenceCalculating to obtain second identity information as the first identityWhen the information is equal to the second identity information, the identity authentication of the user B is passed.
The quantum-based batch identity authentication method, system, device and storage medium comprise: a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n(ii) a User A prepares a set of random single photon sequencesAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesPerforming encryption on the single-photon sequenceObtaining the sequence after quantum Fourier transform(ii) a The user B sequentially pairs the sequences based on the Key KeyExecuting a group of operations to obtain execution particles, and delivering the execution particles to a user C; user C according to the measurement sequenceThe first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequenceAnd calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed. The batch identity authentication scheme based on the quantum Fourier transform provided by the embodiment of the invention firstly adds the quantum Fourier transformAnd the simultaneous identity verification of a plurality of users is completed by the measurement and calculation of a third party, wherein the multi-user batch operation only needs one-time verification, so that the time spent by identity authentication is saved, and the efficiency of quantum identity authentication is improved. In addition, the identity authentication in the embodiment of the invention uses the modulo addition operation of the high-dimensional quantum key space, does not need the preparation of an entangled state, saves quantum entangled resources, and simultaneously, the application of the high-dimensional key space greatly reduces the success probability of collision attack and improves the authentication precision.
Drawings
FIG. 1 is a schematic flow chart diagram illustrating a quantum-based bulk authentication method in one embodiment;
FIG. 2 is a schematic flow diagram of single photon sequence preparation and conversion in one embodiment;
FIG. 3 is a flow diagram illustrating the performance of particle state operations in one embodiment;
FIG. 4 is a flow diagram illustrating a process for performing identity information calculation in one embodiment;
FIG. 5 is a block diagram of a quantum-based batch authentication system in one embodiment;
FIG. 6 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In one embodiment, as shown in fig. 1, there is provided a quantum-based bulk identity authentication method, the method comprising:
step 101, a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n;
103, the user B sequentially compares the sequences based on the Key KeyExecuting a group of operations to obtain execution particles, and delivering the execution particles to a user C;
Specifically, in this embodiment, it is assumed that the user a is Alice, the user C is Charlie of the third-party certification authority, and the user B is CharlieThen Alice wants to target multiple usersThe identity of (2) is verified. The scheme is implemented by the aid of a third-party certification authority CharlieThe process of identity authentication and the publishing of the authentication results. The default third party Charlie in the scheme is semi-honest (semi-host), i.e. the third party certification authority Charlie will follow the rules of the scheme and honestly publish the measurement results, but may eavesdrop on the user's key information. According to the batch identity authentication scheme based on the quantum Fourier transform, simultaneous identity authentication of a plurality of users is completed through quantum Fourier transform encryption, third-party measurement and calculation, wherein multi-user batch operation only needs one-time authentication, time spent in identity authentication is saved, and efficiency of quantum identity authentication is improved. In addition, the identity authentication in the embodiment of the invention uses the modulo addition operation of the high-dimensional quantum key space, does not need the preparation of an entangled state, saves quantum entangled resources, and simultaneously, the application of the high-dimensional key space greatly reduces the success probability of collision attack and improves the authentication precision.
In one embodiment, as shown in figure 2, the process of performing single photon sequence preparation and conversion comprises the following steps:
step 201, user A prepares a random single photon sequenceTherein containA single photon, said sequenceExpressed as: (ii) a Wherein d is a positive integer greater than 1;
Specifically, in this embodiment, it is assumed that the user a is Alice, the user C is Charlie of the third-party certification authority, and the user B is CharlieAlice respectively with the userA length m-Key is shared by a quantum Key distribution protocol (QKD), such as the BB84 protocol, as shown in the following equation.
Here, only Alice andknowing the classical bit string Key, d is a positive integer greater than 2 and satisfiesRepresenting user identity information.
Alice prepares a group of random single photon sequencesAs shown in equation 7, the sequenceTherein containThe number of single-photon lasers is one,
alice generates a set of two-dimensional classical random numbersAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesThe encryption is formulated as follows
Here, the first and second liquid crystal display panels are,. Sequence in Alice's hand after QFT transformationIs converted into。
In one embodiment, as shown in fig. 3, the process of performing the particle status operation execution includes:
In one embodiment, as shown in fig. 4, the process of performing the identity information calculation process includes:
In step 403, the user C measures the measurement resultBy calculatingPublish first identity information, user A computeAnd obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
Specifically, after the particle preparation is completed, Alice sends the particle preparation to n users for identity verification, and the specific process is as follows.
1) Individual userTo the sequencePerforming a set of operations, the operators may be represented as
Wherein the content of the first and second substances,,representing a modulo addition operation. This operation may produce both bit flipping and phase flipping,inAndthe transformed state is shown in the following table
Based on secret keyI.e. byUser ofTo the sequenceParticle execution ofAnd the operation is delivered to other users.
2) User' sRespectively align the sequencesExecuteAfter the operation, the last user is handed over to the third party Charlie.
3) Random number published by AliceCharlie selects the correct measurement base, the measurement sequenceOf (2) is used. If it is notSelectingCorresponding measuring baseIf, ifSelectingCorresponding measurement basis is. Here, if the wrong measurement basis is selected, the measurement results are random, and the accuracy is only 50%.
5) Alice calculationAnd comparing with the result published by Charlie, if the result is equal, the identity verification is passed, otherwise, the verification fails, and the authentication is carried out again.
It should be understood that, although the steps in the above-described flowcharts are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in the above-described flowcharts may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or the stages is not necessarily sequential, but may be performed alternately or alternatingly with other steps or at least a portion of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 5, there is provided a quantum-based bulk authentication system, including:
a Key distribution module 501, configured to share a Key with a length of m by a user a and a user B through a quantum Key distribution protocol, where the user B is a batch group set with an individual n;
A particle preparation module 502 for user A to prepare a set of random single photon sequencesAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesPerforming encryption on the single-photon sequenceObtaining the sequence after quantum Fourier transform;
A particle manipulation module 503, configured to sequentially pair the sequences based on the Key by the user BExecuting a group of operations to obtain execution particles, and delivering the execution particles to a user C;
In one embodiment, as shown in fig. 5, the particle preparation module 502 comprises a sequence conversion unit 5021, the sequence conversion unit 5021 is configured to:
random single photon sequence prepared by user ATherein containA single photon, said sequenceExpressed as: (ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbersWherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transformEncryption is performed, and the encryption formula is expressed as:
In one embodiment, as shown in fig. 5, the particle manipulation module includes a particle state execution unit, and the particle state execution unit is configured to:
selecting a single user from user BTo the sequencePerforming a set of operations, the operators being represented as:
based on secret keyI.e. byUser ofTo the sequenceParticle execution ofAfter the operation, the operation is delivered to the user B who is not operated;
user' sRespectively for the sequencesExecuteAfter operation, by the last bitThe user is handed over to user C.
In one embodiment, as shown in fig. 5, the identity comparison module includes an identity calculation unit configured to:
two-dimensional classical random number published by user AWhere m is the length of the Key Key, user C selects the correct measurement base, measures the sequenceThe particles of (1);
if it is notSelectingCorresponding measurement basis isIf, ifSelectingCorresponding measurement basis is;
User C based on the measurement resultsBy calculatingPublish first identity information, user A computeTo obtain a second bodyAnd comparing the identity information with the first identity information published by the user C, if the identity information is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
For specific limitations of the quantum-based batch authentication system, reference may be made to the above limitations of the quantum-based batch authentication method, which are not described herein again. The modules in the quantum-based batch identity authentication system can be wholly or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
FIG. 6 is a diagram illustrating an internal structure of a computer device in one embodiment. As shown in fig. 6, the computer apparatus includes a processor, a memory, a network interface, an input device, and a display screen connected through a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement a quantum-based bulk authentication method. The internal memory may also have stored therein a computer program that, when executed by the processor, causes the processor to perform a quantum-based bulk authentication method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n;
User A prepares a set of random single photon sequencesAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesPerforming encryption on the single-photon sequenceObtaining the sequence after quantum Fourier transform;
The user B sequentially pairs the sequences based on the Key KeyExecuting a group of operations to obtain execution particles, and delivering the execution particles to a user C;
user C according to the measurement sequenceThe first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequenceCalculating to obtain second identity information, when the first identity information and the second identity information areWhen the two identity information are equal, the identity authentication of the user B passes.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
for single photon sequenceEncrypting, and obtaining the sequence after the single-photon sequence is subjected to quantum Fourier transform(ii) a The method comprises the following steps:
random single photon sequence prepared by user ATherein containA single photon, said sequenceExpressed as: (ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbersWherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transformEncryption is performed, and the encryption formula is expressed as:
In one embodiment, the processor, when executing the computer program, further performs the steps of:
selecting a single user from user BTo the sequencePerforming a set of operations, the operators being represented as:
based on secret keyI.e. byUser ofTo the sequenceParticle execution ofAfter the operation, the operation is delivered to the user B who is not operated;
user' sRespectively for the sequencesExecuteAfter the operation, the last user is handed over to user C.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
two-dimensional classical random number published by user AWhere m is the length of the Key Key, user C selects the correct measurement base, measures the sequenceThe particles of (1);
if it is notSelectingCorresponding measurement basis isIf, ifSelectingCorresponding measurement basis is;
User C based on the measurement resultsBy calculatingPublish first identity information, user A computeAnd obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n;
User A prepares a set of random single photon sequencesAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesPerforming encryption on the single-photon sequenceObtaining the sequence after quantum Fourier transform;
The user B sequentially pairs the sequences based on the Key KeyExecuting a group of operations to obtain execution particles, and delivering the execution particles to a user C;
user C according to the measurement sequenceThe first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequenceAnd calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
for single photon sequenceEncrypting, and obtaining the sequence after the single-photon sequence is subjected to quantum Fourier transform(ii) a The method comprises the following steps:
random single photon sequence prepared by user ATherein containA single photon, said sequenceExpressed as: (ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbersWherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transformEncryption is performed, and the encryption formula is expressed as:
In one embodiment, the processor, when executing the computer program, further performs the steps of:
selecting a single user from user BTo the sequencePerforming a set of operations, the operators being represented as:
based on secret keyI.e. byUser ofTo the sequenceParticle execution ofAfter the operation, the operation is delivered to the user B who is not operated;
user' sRespectively for the sequencesExecuteAfter the operation, the last user is handed over to user C.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
two-dimensional classical random number published by user AWhere m is the length of the Key Key, user C selects the correct measurement base, measures the sequenceThe particles of (1);
if it is notSelectingCorresponding measurement basis isIf, ifSelectingCorresponding measurement basis is;
User C based on the measurement resultsBy calculatingPublish first identity information, user A computeAnd obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A quantum-based batch identity authentication method is characterized by comprising the following steps:
a user A and a user B share a Key Key with the length of m through a quantum Key distribution protocol, wherein the user B is a batch group set with an individual n;
User A prepares a set of random single photon sequencesAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesPerforming encryption on the single-photon sequenceObtaining the sequence after quantum Fourier transform;
The user B sequentially pairs the sequences based on the Key KeyExecuting a group of operations to obtain execution particles, and delivering the execution particles to a user C;
user C according to the measurement sequenceThe first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequenceAnd calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed.
2. The quantum-based batch identity authentication method of claim 1, wherein the user a prepares a set of random single-photon sequencesAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesPerforming encryption on the single-photon sequenceObtaining the sequence after quantum Fourier transform(ii) a The method comprises the following steps:
random single photon sequence prepared by user ATherein containA single photon, said sequenceExpressed as: (ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbersWherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transformEncryption is performed, and the encryption formula is expressed as:
3. The quantum-based batch identity authentication method of claim 1, wherein the user B pairs the sequence in order based on the KeyObtaining an execution particle after executing a group of operations, and delivering the execution particle to a user C, wherein the steps of:
selecting a single user from user BTo the sequencePerforming a set of operations, the operators being represented as:
based on secret keyI.e. byUser ofTo the sequenceParticle execution ofAfter the operation, the operation is delivered to the user B who is not operated;
4. The quantum-based batch identity authentication method of claim 1, wherein the user C is in accordance with a sum sequenceThe first identity information is obtained by calculation of the particles in the system, and the user A obtains the first identity information according to the Key and the single-photon sequenceCalculating to obtain second identity information, and when the first identity information and the second identity information are equal, the user B passes the identity authentication, including:
two-dimensional classical random number published by user AWhere m is the length of the Key Key, user C selects the correct measurement base, measures the sequenceThe particles of (1);
if it is notSelectingCorresponding measurement basis isIf, ifSelectingCorresponding measurement basis is;
User C based on the measurement resultsBy calculatingPublish first identity information, user A computeAnd obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
5. A quantum-based batch identity authentication system, comprising:
a Key distribution module, configured to share a Key with a length of m by a user a and a user B through a quantum Key distribution protocol, where the user B is a batch group set with an individual n;
A particle preparation module for preparing a group of random single photon sequences by a user AAnd using high-dimensional quantum Fourier transform to pair single-photon sequencesPerforming encryption on the single-photon sequenceObtaining the sequence after quantum Fourier transform;
A particle operation module used for the user B to sequentially align the sequences based on the Key KeyExecuting a group of operations to obtain execution particles, and delivering the execution particles to a user C;
identity comparison module for user C based on the measurement sequenceThe first identity information is obtained by calculating the particles in the single photon sequence, and the user A obtains the first identity information according to the single photon sequenceAnd calculating to obtain second identity information, and when the first identity information and the second identity information are equal, the identity authentication of the user B is passed.
6. The quantum-based bulk authentication system of claim 5, wherein the particle preparation module comprises a sequence conversion unit to:
user A prepared randomSingle photon sequenceTherein containA single photon, said sequenceExpressed as: (ii) a Wherein d is a positive integer greater than 1;
user A prepares a set of two-dimensional classical random numbersWherein m is the length of the Key;
user A pairs single photon sequences using high-dimensional quantum Fourier transformEncryption is performed, and the encryption formula is expressed as:
7. The quantum-based batch identity authentication system of claim 5, wherein the particle manipulation module comprises a particle state execution unit to:
selecting a single user from user BTo the sequencePerforming a set of operations, the operators being represented as:
based on secret keyI.e. byUser ofTo the sequenceParticle execution ofAfter the operation, the operation is delivered to the user B who is not operated;
8. The quantum-based bulk authentication system of claim 5, wherein the identity comparison module comprises an identity computation unit configured to:
two-dimensional classical random number published by user AWhere m is the length of the Key Key, user C selects the correct measurement base, measures the sequenceThe particles of (1);
if it is notSelectingCorresponding measurement basis isIf, ifSelectingCorresponding measurement basis is;
User C based on the measurement resultsBy calculatingPublish first identity information, user A computeAnd obtaining second identity information, comparing the result with the first identity information published by the user C, if the result is equal to the first identity information, passing the identity verification, and otherwise, failing the verification, and re-authenticating.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 4 are implemented when the computer program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111504507.7A CN113904780B (en) | 2021-12-10 | 2021-12-10 | Quantum-based batch identity authentication method, system, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111504507.7A CN113904780B (en) | 2021-12-10 | 2021-12-10 | Quantum-based batch identity authentication method, system, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113904780A true CN113904780A (en) | 2022-01-07 |
CN113904780B CN113904780B (en) | 2022-03-04 |
Family
ID=79025575
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111504507.7A Active CN113904780B (en) | 2021-12-10 | 2021-12-10 | Quantum-based batch identity authentication method, system, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113904780B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114553419A (en) * | 2022-03-24 | 2022-05-27 | 上海循态量子科技有限公司 | Quantum identity authentication method and system based on continuous variable quantum key distribution |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100293380A1 (en) * | 2008-01-25 | 2010-11-18 | Qinetiq Limited | Quantum cryptography apparatus |
US20110126011A1 (en) * | 2009-11-24 | 2011-05-26 | Electronics And Telecommunications Research Institute | Method of user-authenticated quantum key distribution |
CN105515779A (en) * | 2015-12-31 | 2016-04-20 | 中国工程物理研究院电子工程研究所 | Quantum security authentication system based on optical PUF |
CN108092770A (en) * | 2018-02-11 | 2018-05-29 | 成都信息工程大学 | Quanta identity authentication method, computer, computer program, readable storage medium storing program for executing |
CN108737079A (en) * | 2017-04-14 | 2018-11-02 | 广东国盾量子科技有限公司 | Distributed quantum key manages system and method |
CN108833087A (en) * | 2018-05-18 | 2018-11-16 | 西安建筑科技大学 | A kind of multi-user quantum identity identifying method based on orbital angular momentum |
US20180351738A1 (en) * | 2017-05-30 | 2018-12-06 | Ut-Battelle, Llc | Quantum self-authenticating timing system |
CN109327308A (en) * | 2018-10-30 | 2019-02-12 | 成都信息工程大学 | A kind of quantum key delivering method and system with bidirectional identity authentication function |
CN111082937A (en) * | 2020-01-10 | 2020-04-28 | 华北电力大学 | Bidirectional identity authentication method based on single photon |
CN111404691A (en) * | 2020-03-02 | 2020-07-10 | 成都信息工程大学 | Quantum secret sharing method and system with credible authentication based on quantum walking |
CN112713943A (en) * | 2020-11-30 | 2021-04-27 | 安徽澄小光智能科技有限公司 | Quantum secure communication system |
-
2021
- 2021-12-10 CN CN202111504507.7A patent/CN113904780B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100293380A1 (en) * | 2008-01-25 | 2010-11-18 | Qinetiq Limited | Quantum cryptography apparatus |
US20110126011A1 (en) * | 2009-11-24 | 2011-05-26 | Electronics And Telecommunications Research Institute | Method of user-authenticated quantum key distribution |
CN105515779A (en) * | 2015-12-31 | 2016-04-20 | 中国工程物理研究院电子工程研究所 | Quantum security authentication system based on optical PUF |
CN108737079A (en) * | 2017-04-14 | 2018-11-02 | 广东国盾量子科技有限公司 | Distributed quantum key manages system and method |
US20180351738A1 (en) * | 2017-05-30 | 2018-12-06 | Ut-Battelle, Llc | Quantum self-authenticating timing system |
CN108092770A (en) * | 2018-02-11 | 2018-05-29 | 成都信息工程大学 | Quanta identity authentication method, computer, computer program, readable storage medium storing program for executing |
CN108833087A (en) * | 2018-05-18 | 2018-11-16 | 西安建筑科技大学 | A kind of multi-user quantum identity identifying method based on orbital angular momentum |
CN109327308A (en) * | 2018-10-30 | 2019-02-12 | 成都信息工程大学 | A kind of quantum key delivering method and system with bidirectional identity authentication function |
CN111082937A (en) * | 2020-01-10 | 2020-04-28 | 华北电力大学 | Bidirectional identity authentication method based on single photon |
CN111404691A (en) * | 2020-03-02 | 2020-07-10 | 成都信息工程大学 | Quantum secret sharing method and system with credible authentication based on quantum walking |
CN112713943A (en) * | 2020-11-30 | 2021-04-27 | 安徽澄小光智能科技有限公司 | Quantum secure communication system |
Non-Patent Citations (3)
Title |
---|
XIAOPING LOU: "Sequential Quantum Multiparty Signature Based on Quantum Fourier Transform and Chaotic System", 《IEEE ACCESS 》 * |
刘文杰: "基于互认证的三维单光子量子安全直接通信", 《2009年中国智能自动化会议论文集(第六分册)[中南大学学报(增刊)]中国自动化学会智能自动化专业委员会会议论文集》 * |
周楝淞等: "身份认证技术及其发展趋势", 《通信技术》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114553419A (en) * | 2022-03-24 | 2022-05-27 | 上海循态量子科技有限公司 | Quantum identity authentication method and system based on continuous variable quantum key distribution |
CN114553419B (en) * | 2022-03-24 | 2024-05-17 | 上海循态量子科技有限公司 | Quantum identity authentication method and system based on continuous variable quantum key distribution |
Also Published As
Publication number | Publication date |
---|---|
CN113904780B (en) | 2022-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xu et al. | VerifyNet: Secure and verifiable federated learning | |
CN107145791B (en) | K-means clustering method and system with privacy protection function | |
CN110086626B (en) | Quantum secret communication alliance chain transaction method and system based on asymmetric key pool pair | |
Zhou et al. | ExpSOS: Secure and verifiable outsourcing of exponentiation operations for mobile cloud computing | |
Cheng et al. | Secure similar sequence query on outsourced genomic data | |
CN116561789B (en) | Processing method and device of privacy data, electronic equipment and readable storage medium | |
CN104468476B (en) | Method and apparatus without certificate multi-proxy signature | |
Hu et al. | Achieving privacy-preserving and verifiable support vector machine training in the cloud | |
JP6753403B2 (en) | Information processing equipment, authentication systems, authentication methods, and computer programs | |
Mashhadi | General secret sharing based on quantum Fourier transform | |
KR20130085491A (en) | Multi-user searchable encryption system with index validation and tracing and method thereof | |
CN114417414A (en) | Privacy protection method based on edge calculation | |
CN108737116B (en) | Voting protocol method based on d-dimensional three-quantum entangled state | |
JP7209431B2 (en) | Digital signature method, signature information verification method, related device and electronic device | |
CN113836556A (en) | Federal learning-oriented decentralized function encryption privacy protection method and system | |
Fan et al. | PPMCK: Privacy-preserving multi-party computing for K-means clustering | |
Xu et al. | DNA similarity search with access control over encrypted cloud data | |
CN113904780B (en) | Quantum-based batch identity authentication method, system, equipment and storage medium | |
CN115664629A (en) | Homomorphic encryption-based data privacy protection method for intelligent Internet of things platform | |
CN113626831A (en) | CP-ABE method supporting privacy protection and decryption in cloud | |
CN109740383B (en) | Privacy protection control method for fog computing-oriented medical system | |
CN113364595A (en) | Power grid private data signature aggregation method and device and computer equipment | |
CN110336775B (en) | Quantum group authentication method based on Grover algorithm | |
CN113904779B (en) | Identity authentication method, system, equipment and storage medium based on super-secret code | |
CN113792282B (en) | Identity data verification method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |