CN114422122A - Quantum key negotiation method and system with semi-trusted third party - Google Patents

Quantum key negotiation method and system with semi-trusted third party Download PDF

Info

Publication number
CN114422122A
CN114422122A CN202111592162.5A CN202111592162A CN114422122A CN 114422122 A CN114422122 A CN 114422122A CN 202111592162 A CN202111592162 A CN 202111592162A CN 114422122 A CN114422122 A CN 114422122A
Authority
CN
China
Prior art keywords
particles
trusted
semi
party
key terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111592162.5A
Other languages
Chinese (zh)
Other versions
CN114422122B (en
Inventor
刘锋
高冬梅
乔小燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Technology and Business University
Original Assignee
Shandong Technology and Business University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Technology and Business University filed Critical Shandong Technology and Business University
Priority to CN202111592162.5A priority Critical patent/CN114422122B/en
Priority claimed from CN202111592162.5A external-priority patent/CN114422122B/en
Publication of CN114422122A publication Critical patent/CN114422122A/en
Application granted granted Critical
Publication of CN114422122B publication Critical patent/CN114422122B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Optical Communication System (AREA)

Abstract

The invention provides a quantum key negotiation method and system with a semi-trusted third party. After receiving third particles from a W state of a semi-trusted third party, a second negotiation key terminal selects a first rotation angle to rotate ground state particles and sends the particles to a first negotiation key terminal; after the first negotiation key terminal respectively receives the first particles from the W state of the semi-trusted third party and the particles from the second negotiation key terminal, a second rotation angle is selected to rotate the particles from the second negotiation key terminal, and joint measurement is carried out on the two particles held by the first negotiation key terminal; the semi-trusted third party measures the second particle of the own W state by using the calculation base; and the second negotiation key terminal carries out quantum operation on the W-state third particles held by the second negotiation key terminal by utilizing the first rotation angle selected by the second negotiation key terminal, the second rotation angle of the first negotiation key terminal and the information of the semi-trusted third party so as to realize bit information sharing with the first negotiation key terminal.

Description

Quantum key negotiation method and system with semi-trusted third party
Technical Field
The invention belongs to the field of secure communication based on quantum technology, and particularly relates to a quantum key negotiation method and system with a semi-trusted third party.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
The purpose of quantum key agreement is that the two communicating parties agree fairly on the keys that need to be used for future communications. Chong et al, 2011, noted that almost all quantum key agreement protocols do not really enable both parties to agree on a key fairly. Meanwhile, they propose a new quantum key agreement protocol by using unitary operation and delay measurement technology. However, in 2020 Gu and Huang research found that, although it has progressed through nearly a decade, almost all quantum key agreement protocols still cannot really achieve fair agreement of keys between two parties, because participants can always change the shared key by themselves without being discovered.
Disclosure of Invention
In order to solve the technical problems in the background art, the invention provides a quantum key negotiation method and system with a semi-trusted third party, which can resist the attack of a control key of a participant by using a rotation operator and a quantum invisible state technology.
In order to achieve the purpose, the invention adopts the following technical scheme:
the invention provides a quantum key negotiation method with a semi-trusted third party.
A quantum key negotiation method with a semi-trusted third party comprises the following steps:
after the first negotiation key terminal receives the first particles from the W state of the semi-trusted third party and the particles from the second negotiation key terminal respectively, selecting a second rotation angle to rotate the particles from the second negotiation key terminal, and performing combined measurement on the first particles and the rotated particles from the second negotiation key terminal;
the first negotiation key terminal sends the second rotation angle to the second negotiation key terminal, so that the second negotiation key terminal carries out quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the particles of the second negotiation key terminal are ground state particles which are selected to rotate by a first rotation angle after the second negotiation key terminal receives third particles from a W state of a semi-trusted third party; the information of the semi-trusted third party includes: the semi-trusted third party measures the bit information of the second particle of the held W-state using the computation basis.
A second aspect of the invention provides a quantum key agreement system with a semi-trusted third party.
A quantum key agreement system with a semi-trusted third party, comprising:
a rotation and measurement module configured to: after the first negotiation key terminal receives the first particles from the W state of the semi-trusted third party and the particles from the second negotiation key terminal respectively, selecting a second rotation angle to rotate the particles from the second negotiation key terminal, and performing combined measurement on the first particles and the rotated particles from the second negotiation key terminal;
an attack resistance module configured to: the first negotiation key terminal sends the second rotation angle to the second negotiation key terminal, so that the second negotiation key terminal carries out quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the particles of the second negotiation key terminal are ground state particles which are selected to rotate by a first rotation angle after the second negotiation key terminal receives third particles from a W state of a semi-trusted third party; the information of the semi-trusted third party includes: the semi-trusted third party measures the bit information of the second particle of the held W-state using the computation basis.
The third aspect of the invention provides a quantum key negotiation method with a semi-trusted third party.
A quantum key negotiation method with a semi-trusted third party comprises the following steps:
after the second negotiation key terminal receives the third particles from the W state of the semi-trusted third party, the first rotation angle is selected to rotate the ground state particles, and the particles are sent to the first negotiation key terminal; enabling the first negotiation key terminal to select a second rotation angle to rotate the particles from the second negotiation key terminal, and carrying out combined measurement on the W-state first particles and the rotated particles from the second negotiation key terminal;
the second negotiation key terminal carries out quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the W-state first particle is a W-state first particle from a semi-trusted third party, and the information of the semi-trusted third party comprises: the semi-trusted third party measures the bit information of the second particle of the held W-state using the computation basis.
A fourth aspect of the invention provides a quantum key agreement system with a semi-trusted third party.
A quantum key agreement system with a semi-trusted third party, comprising:
a rotation and measurement module configured to: after the second negotiation key terminal receives the third particles from the W state of the semi-trusted third party, the first rotation angle is selected to rotate the ground state particles, and the particles are sent to the first negotiation key terminal; enabling the first negotiation key terminal to select a second rotation angle to rotate the particles from the second negotiation key terminal, and carrying out combined measurement on the W-state first particles and the rotated particles from the second negotiation key terminal;
an attack resistance module configured to: the second negotiation key terminal carries out quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the W-state first particle is a W-state first particle from a semi-trusted third party, and the information of the semi-trusted third party comprises: the semi-trusted third party measures the bit information of the second particle of the held W-state using the computation basis.
The fifth aspect of the invention provides a quantum key negotiation method with a semi-trusted third party.
A quantum key negotiation method with a semi-trusted third party comprises the following steps:
the semi-trusted third party measures bit information of the held W-state second particles by using the calculation basis and sends the information to the second negotiation key terminal, so that the second negotiation key terminal performs quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the first rotation angle is the rotation angle of the selected rotating ground state particles after the second negotiation key terminal receives the W-state third particles from the semi-trusted third party; the second rotation angle is the rotation angle of the particles of the second negotiation key terminal selected to rotate after the first negotiation key terminal receives the particles from the second negotiation key terminal; the method realizes the bit information sharing with the first negotiation key terminal, and comprises the steps that the first negotiation key terminal respectively receives first particles from a W state of a semi-trusted third party, and joint measurement is carried out on the first particles and the rotated particles from the second negotiation key terminal.
A sixth aspect of the invention provides a quantum key agreement system with a semi-trusted third party.
A quantum key agreement system with a semi-trusted third party, comprising:
an attack resistance module configured to: the semi-trusted third party measures bit information of the held W-state second particles by using the calculation basis and sends the information to the second negotiation key terminal, so that the second negotiation key terminal performs quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the first rotation angle is the rotation angle of the selected rotating ground state particles after the second negotiation key terminal receives the W-state third particles from the semi-trusted third party; the second rotation angle is the rotation angle of the particles of the second negotiation key terminal selected to rotate after the first negotiation key terminal receives the particles from the second negotiation key terminal; the method realizes the bit information sharing with the first negotiation key terminal, and comprises the steps that the first negotiation key terminal respectively receives first particles from a W state of a semi-trusted third party, and joint measurement is carried out on the first particles and the rotated particles from the second negotiation key terminal.
A seventh aspect of the present invention provides a computer-readable storage medium.
A computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps in the quantum key agreement method with a semi-trusted third party as described in the first or third or fifth aspect above.
An eighth aspect of the present invention provides a computer apparatus.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps in the quantum key agreement method with a semi-trusted third party as described in the first or third or fifth aspect.
Compared with the prior art, the invention has the beneficial effects that:
the invention can resist the key control attack of the participants:
receiving from a second negotiated Key terminal
Figure BDA0003429575410000051
If the first negotiated Key terminal wants to control the Key (K) to be sharedAB) She must treat what is being delivered
Figure BDA0003429575410000052
And s are adjusted appropriately. The first negotiated key terminal needs to be
Figure BDA0003429575410000053
By replacement with other suitable particles
Figure BDA0003429575410000054
But thetaBIs the private key of the second negotiated key terminal, so the first negotiated key terminal wants to access
Figure BDA0003429575410000055
In the first negotiation key terminal, bit 0 is replaced by bit 1
Figure BDA0003429575410000056
Decodes the measurement to "1",
Figure BDA0003429575410000057
the probability of decoding the measurement to "0" (since the semi-trusted third party will randomly use { |0 in the eavesdropping detection phase>,|1>Based on measurement particles B and C). Therefore, the first negotiation key terminal only needs to replace the shared key with the length of k bits with success probability
Figure BDA0003429575410000058
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the invention and together with the description serve to explain the invention and not to limit the invention.
Fig. 1 is a flowchart illustrating a quantum key agreement method with a semi-trusted third party according to the present invention.
Detailed Description
The invention is further described with reference to the following figures and examples.
It is to be understood that the following detailed description is exemplary and is intended to provide further explanation of the invention as claimed. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments according to the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
It is noted that the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of methods and systems according to various embodiments of the present disclosure. It should be noted that each block in the flowchart or block diagrams may represent a module, a segment, or a portion of code, which may comprise one or more executable instructions for implementing the logical function specified in the respective embodiment. It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Example one
As shown in fig. 1, the present embodiment provides a quantum key negotiation method with a semi-trusted third party, and the present embodiment is illustrated by applying the method to a server, it can be understood that the method may also be applied to a terminal, and may also be applied to a system including a terminal and a server, and is implemented by interaction between the terminal and the server. The server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a network server, cloud communication, middleware service, a domain name service, a security service CDN, a big data and artificial intelligence platform, and the like. The terminal may be, but is not limited to, a smart phone, a tablet computer, a laptop computer, a desktop computer, a smart speaker, a smart watch, and the like. The terminal and the server may be directly or indirectly connected through wired or wireless communication, and the application is not limited herein. In this embodiment, the method includes the steps of:
after the first negotiation key terminal receives the first particles from the W state of the semi-trusted third party and the particles from the second negotiation key terminal respectively, selecting a second rotation angle to rotate the particles from the second negotiation key terminal, and performing combined measurement on the first particles and the rotated particles from the second negotiation key terminal;
the first negotiation key terminal sends the second rotation angle to the second negotiation key terminal, so that the second negotiation key terminal carries out quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the particles of the second negotiation key terminal are ground state particles which are selected to rotate by a first rotation angle after the second negotiation key terminal receives third particles from a W state of a semi-trusted third party; the information of the semi-trusted third party includes: the semi-trusted third party measures the bit information of the second particle of the held W-state using the computation basis.
Specifically, the implementation can be realized by adopting the following steps:
both Alice and Bob can share the secret key K according to the following process under the assistance of the semi-trusted third party CharlieAB
1) Alice, Bob and Charlie share W state:
Figure BDA0003429575410000081
wherein Alice holds a first particle A in the W state, Charlie has a second particle C in the W state, Bob holds a third particle B in the W state, and the convention is to put quantum state |0>And
Figure BDA0003429575410000082
are all encoded as "0", quantum state |1>And
Figure BDA0003429575410000083
are all encoded as "1".
2) Bob arbitrarily chooses a cornerDegree of rotation
Figure BDA0003429575410000084
Then using the rotation operator
Figure BDA0003429575410000085
Computing
Figure BDA0003429575410000086
Finally, the particles are mixed
Figure BDA0003429575410000087
And sending the data to Alice through a quantum channel (QC-I).
3) Alice is receiving
Figure BDA0003429575410000088
After the particles, an angle is arbitrarily selected
Figure BDA0003429575410000089
Then calculating by using a rotation operator R (theta)
Figure BDA00034295754100000810
Finally, Alice pairs the particle
Figure BDA00034295754100000811
Bell measurements were made with the first particle A in the W state and the measurements were retained.
4) Charlie measures the second particle C in the W state with the calculation basis { |0>, |1> }, and retains the measurement result s ∈ {0,1 }.
5) Alice sends theta through an authenticatable classical channel (ACC-I)ATelling B that Charlie randomly selects
Figure BDA0003429575410000091
And will be binary sequences (s, theta)C) Transmitting via another authenticatable classical channel (ACC-II)And sent to Bob.
6) After receiving messages from Alice and Charlie, Bob uses the appropriate rotation operator and θCMeasuring the particles B to obtain the final key KAB
To be provided with
Figure BDA0003429575410000092
For example, the flow of the above protocol is detailed:
for the following calculation convenience, note
Figure BDA0003429575410000093
Wherein | α |2+|β|21, thereby
Figure BDA0003429575410000094
Alice to the particle
Figure BDA0003429575410000095
Performing Bell measurement with the first particle A in W state, if the measurement result is in W state
Figure BDA0003429575410000096
Then K isAB=0。
Thereby, the second particles C and the third particles B in the W state are collapsed into
Figure BDA0003429575410000097
Charlie is with calculation base { |0>,|1>Measuring the quantum state
Figure BDA0003429575410000098
The first particles C:
if the measurement result is |0>Then, then
Figure BDA0003429575410000101
Is projected to the second particles B
Figure BDA0003429575410000102
If the measurement result is |1>Then, then
Figure BDA0003429575410000103
The second particle B of (B) is projected to |0 >.
After receiving messages from Alice and Charlie, Bob uses the rotation operator
Figure BDA0003429575410000104
And thetaCMeasuring
Figure BDA0003429575410000105
The second particles B of (1). Table 1 shows the relationship between Alice and Bob's classical information when s is 0:
when theta isCWhen the value is 0, Bob selects R epsilon R (-theta)A)·R(-θB) Measuring
Figure BDA0003429575410000106
The second particles B; alice should complement its classical information according to the Bell measurements to make it consistent with Bob's information. When in use
Figure BDA0003429575410000107
Then, Bob selects
Figure BDA0003429575410000108
Measuring
Figure BDA0003429575410000109
When Alice directly uses his Bell measurement as the key, he can share one bit of classical information "0" or "1" with Bob.
TABLE 1 relationship Table between Alice and Bob classical information
Figure BDA00034295754100001010
Example two
The embodiment provides a quantum key negotiation system with a semi-trusted third party.
A quantum key agreement system with a semi-trusted third party, comprising:
a rotation and measurement module configured to: after the first negotiation key terminal receives the first particles from the W state of the semi-trusted third party and the particles from the second negotiation key terminal respectively, selecting a second rotation angle to rotate the particles from the second negotiation key terminal, and performing combined measurement on the first particles and the rotated particles from the second negotiation key terminal;
an attack resistance module configured to: the first negotiation key terminal sends the second rotation angle to the second negotiation key terminal, so that the second negotiation key terminal carries out quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the particles of the second negotiation key terminal are ground state particles which are selected to rotate by a first rotation angle after the second negotiation key terminal receives third particles from a W state of a semi-trusted third party; the information of the semi-trusted third party includes: the semi-trusted third party measures the bit information of the second particle of the held W-state using the computation basis.
It should be noted here that the rotation and measurement module and the attack resisting module are the same as those of the example and application scenario realized by the steps in the first embodiment, but are not limited to the disclosure of the first embodiment.
EXAMPLE III
The embodiment provides a quantum key negotiation method with a semi-trusted third party.
A quantum key negotiation method with a semi-trusted third party comprises the following steps:
after the second negotiation key terminal receives the third particles from the W state of the semi-trusted third party, the first rotation angle is selected to rotate the ground state particles, and the particles are sent to the first negotiation key terminal; enabling the first negotiation key terminal to select a second rotation angle to rotate the particles from the second negotiation key terminal, and carrying out combined measurement on the W-state first particles and the rotated particles from the second negotiation key terminal;
the second negotiation key terminal carries out quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the W-state first particle is a W-state first particle from a semi-trusted third party, and the information of the semi-trusted third party comprises: the semi-trusted third party measures the bit information of the second particle of the held W-state using the computation basis.
Example four
The embodiment provides a quantum key negotiation system with a semi-trusted third party.
A quantum key agreement system with a semi-trusted third party, comprising:
a rotation and measurement module configured to: after the second negotiation key terminal receives the third particles from the W state of the semi-trusted third party, the first rotation angle is selected to rotate the ground state particles, and the particles are sent to the first negotiation key terminal; enabling the first negotiation key terminal to select a second rotation angle to rotate the particles from the second negotiation key terminal, and carrying out combined measurement on the W-state first particles and the rotated particles from the second negotiation key terminal;
an attack resistance module configured to: the second negotiation key terminal carries out quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the W-state first particle is a W-state first particle from a semi-trusted third party, and the information of the semi-trusted third party comprises: the semi-trusted third party measures the bit information of the second particle of the held W-state using the computation basis.
EXAMPLE five
The embodiment provides a quantum key negotiation method with a semi-trusted third party.
A quantum key negotiation method with a semi-trusted third party comprises the following steps:
the semi-trusted third party measures bit information of the held W-state second particles by using the calculation basis and sends the information to the second negotiation key terminal, so that the second negotiation key terminal performs quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the first rotation angle is the rotation angle of the selected rotating ground state particles after the second negotiation key terminal receives the W-state third particles from the semi-trusted third party; the second rotation angle is the rotation angle of the particles of the second negotiation key terminal selected to rotate after the first negotiation key terminal receives the particles from the second negotiation key terminal; the method realizes the bit information sharing with the first negotiation key terminal, and comprises the steps that the first negotiation key terminal respectively receives first particles from a W state of a semi-trusted third party, and joint measurement is carried out on the first particles and the rotated particles from the second negotiation key terminal.
EXAMPLE six
The embodiment provides a quantum key negotiation system with a semi-trusted third party.
A quantum key agreement system with a semi-trusted third party, comprising:
an attack resistance module configured to: the semi-trusted third party measures bit information of the held W-state second particles by using the calculation basis and sends the information to the second negotiation key terminal, so that the second negotiation key terminal performs quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the first rotation angle is the rotation angle of the selected rotating ground state particles after the second negotiation key terminal receives the W-state third particles from the semi-trusted third party; the second rotation angle is the rotation angle of the particles of the second negotiation key terminal selected to rotate after the first negotiation key terminal receives the particles from the second negotiation key terminal; the method realizes the bit information sharing with the first negotiation key terminal, and comprises the steps that the first negotiation key terminal respectively receives first particles from a W state of a semi-trusted third party, and joint measurement is carried out on the first particles and the rotated particles from the second negotiation key terminal.
EXAMPLE seven
The present embodiment provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps in the quantum key agreement method with a semi-trusted third party as described in the first embodiment or the third embodiment or the fifth embodiment.
Example eight
The present embodiment provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the steps in the quantum key agreement method with a semi-trusted third party as described in the first embodiment or the third embodiment or the fifth embodiment.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as methods, systems, or quantum computer program products. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a quantum computer program product embodied on one or more quantum computer-usable storage media having quantum computer-usable program code embodied in the storage media.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and quantum computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by quantum computer program instructions. These quantum computer program instructions may be provided to a quantum processor of a special purpose computer or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the quantum processor of the quantum computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A quantum key negotiation method with a semi-trusted third party is characterized by comprising the following steps:
after the first negotiation key terminal receives the first particles from the W state of the semi-trusted third party and the particles from the second negotiation key terminal respectively, selecting a second rotation angle to rotate the particles from the second negotiation key terminal, and performing combined measurement on the first particles and the rotated particles from the second negotiation key terminal;
the first negotiation key terminal sends the second rotation angle to the second negotiation key terminal, so that the second negotiation key terminal carries out quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the particles of the second negotiation key terminal are ground state particles which are selected to rotate by a first rotation angle after the second negotiation key terminal receives third particles from a W state of a semi-trusted third party; the information of the semi-trusted third party includes: the semi-trusted third party measures the bit information of the second particle of the held W-state using the computation basis.
2. The quantum key agreement method with the semi-trusted third party according to claim 1,
and the first negotiation key terminal sends the second rotation angle to the second negotiation key terminal through a second quantum channel, and meanwhile, the semi-trusted third party sends the bit information of the W-state second particles to the second negotiation key terminal through a third quantum channel.
3. A quantum key agreement system with a semi-trusted third party, comprising:
a rotation and measurement module configured to: after the first negotiation key terminal receives the first particles from the W state of the semi-trusted third party and the particles from the second negotiation key terminal respectively, selecting a second rotation angle to rotate the particles from the second negotiation key terminal, and performing combined measurement on the first particles and the rotated particles from the second negotiation key terminal;
an attack resistance module configured to: the first negotiation key terminal sends the second rotation angle to the second negotiation key terminal, so that the second negotiation key terminal carries out quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the particles of the second negotiation key terminal are ground state particles which are selected to rotate by a first rotation angle after the second negotiation key terminal receives third particles from a W state of a semi-trusted third party; the information of the semi-trusted third party includes: the semi-trusted third party measures the bit information of the second particle of the held W-state using the computation basis.
4. A quantum key negotiation method with a semi-trusted third party is characterized by comprising the following steps:
after the second negotiation key terminal receives the third particles from the W state of the semi-trusted third party, the first rotation angle is selected to rotate the ground state particles, and the particles are sent to the first negotiation key terminal; enabling the first negotiation key terminal to select a second rotation angle to rotate the particles from the second negotiation key terminal, and carrying out combined measurement on the W-state first particles and the rotated particles from the second negotiation key terminal;
the second negotiation key terminal carries out quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the W-state first particle is a W-state first particle from a semi-trusted third party, and the information of the semi-trusted third party comprises: the semi-trusted third party measures the bit information of the second particle of the held W-state using the computation basis.
5. A quantum key agreement system with a semi-trusted third party, comprising:
a rotation and measurement module configured to: after the second negotiation key terminal receives the third particles from the W state of the semi-trusted third party, the first rotation angle is selected to rotate the ground state particles, and the particles are sent to the first negotiation key terminal; enabling the first negotiation key terminal to select a second rotation angle to rotate the particles from the second negotiation key terminal, and carrying out combined measurement on the W-state first particles and the rotated particles from the second negotiation key terminal;
an attack resistance module configured to: the second negotiation key terminal carries out quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the W-state first particle is a W-state first particle from a semi-trusted third party, and the information of the semi-trusted third party comprises: the semi-trusted third party measures the bit information of the second particle of the held W-state using the computation basis.
6. A quantum key negotiation method with a semi-trusted third party is characterized by comprising the following steps:
the semi-trusted third party measures bit information of the held W-state second particles by using the calculation basis and sends the information to the second negotiation key terminal, so that the second negotiation key terminal performs quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the first rotation angle is the rotation angle of the selected rotating ground state particles after the second negotiation key terminal receives the W-state third particles from the semi-trusted third party; the second rotation angle is the rotation angle of the particles of the second negotiation key terminal selected to rotate after the first negotiation key terminal receives the particles from the second negotiation key terminal; the method realizes the bit information sharing with the first negotiation key terminal, and comprises the steps that the first negotiation key terminal respectively receives first particles from a W state of a semi-trusted third party, and joint measurement is carried out on the first particles and the rotated particles from the second negotiation key terminal.
7. The quantum key agreement method with the semi-trusted third party according to claim 6, wherein the semi-trusted third party measures the second particle in the W state using { |0>, |1> };
if the semi-trusted third party gets |0>Then the third particle in W state is projected to
Figure FDA0003429575400000031
If the semi-trusted third party gets |1>, then the third particle in the W state is projected to |0 >.
8. A quantum key agreement system with a semi-trusted third party, comprising:
an attack resistance module configured to: the semi-trusted third party measures bit information of the held W-state second particles by using the calculation basis and sends the information to the second negotiation key terminal, so that the second negotiation key terminal performs quantum measurement on the held W-state third particles according to the first rotation angle, the second rotation angle and the information of the semi-trusted third party, and bit information sharing with the first negotiation key terminal is realized;
the first rotation angle is the rotation angle of the selected rotating ground state particles after the second negotiation key terminal receives the W-state third particles from the semi-trusted third party; the second rotation angle is the rotation angle of the particles of the second negotiation key terminal selected to rotate after the first negotiation key terminal receives the particles from the second negotiation key terminal; the method realizes the bit information sharing with the first negotiation key terminal, and comprises the steps that the first negotiation key terminal respectively receives first particles from a W state of a semi-trusted third party, and joint measurement is carried out on the first particles and the rotated particles from the second negotiation key terminal.
9. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the steps in the method for quantum key agreement with a semi-trusted third party according to any one of claims 1-2 or 4 or 6-7.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps in the quantum key agreement method with a semi-trusted third party according to any one of claims 1-2 or 4 or 6-7 when executing the program.
CN202111592162.5A 2021-12-23 Quantum key negotiation method and system with semi-trusted third party Active CN114422122B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111592162.5A CN114422122B (en) 2021-12-23 Quantum key negotiation method and system with semi-trusted third party

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111592162.5A CN114422122B (en) 2021-12-23 Quantum key negotiation method and system with semi-trusted third party

Publications (2)

Publication Number Publication Date
CN114422122A true CN114422122A (en) 2022-04-29
CN114422122B CN114422122B (en) 2024-08-27

Family

ID=

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540760A (en) * 2009-04-23 2009-09-23 上海交通大学 Quantum key agreement method
US20160248581A1 (en) * 2015-01-08 2016-08-25 Alibaba Group Holding Limited Quantum key distribution system, method and apparatus based on trusted relay
CN106712936A (en) * 2016-12-20 2017-05-24 中国电子科技集团公司第三十研究所 Ring structure based multi-party quantum key agreement protocol
CN107682154A (en) * 2017-11-13 2018-02-09 苏州大学 A kind of expandable multi-user collection quantum key sharing method
CN108809644A (en) * 2018-07-17 2018-11-13 苏州大学 The multi-party quantum key agreement method of unordered high power capacity based on high level bell states
CN110098930A (en) * 2019-05-27 2019-08-06 成都信息工程大学 A kind of two side's quantum key agreement methods and system based on Bell state
CN209267589U (en) * 2018-12-29 2019-08-16 华南师范大学 A kind of unrelated quantum key distribution system of OAM measuring device of real-time tracking compensation
CN111490875A (en) * 2020-04-23 2020-08-04 成都信息工程大学 Cloud data semi-quantum secure sharing method and system based on proxy re-encryption
CN111934855A (en) * 2020-06-24 2020-11-13 南京如般量子科技有限公司 Quantum communication method and system of mobile communication terminal
CN112332988A (en) * 2021-01-06 2021-02-05 成都信息工程大学 Agile quantum privacy query method based on anti-rotation noise
CN112886970A (en) * 2021-01-11 2021-06-01 哈尔滨工业大学 Negotiation method for continuous variable quantum key distribution
US20210391988A1 (en) * 2020-06-11 2021-12-16 Western Digital Technologies, Inc. Secure optical communication link

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540760A (en) * 2009-04-23 2009-09-23 上海交通大学 Quantum key agreement method
US20160248581A1 (en) * 2015-01-08 2016-08-25 Alibaba Group Holding Limited Quantum key distribution system, method and apparatus based on trusted relay
CN106712936A (en) * 2016-12-20 2017-05-24 中国电子科技集团公司第三十研究所 Ring structure based multi-party quantum key agreement protocol
CN107682154A (en) * 2017-11-13 2018-02-09 苏州大学 A kind of expandable multi-user collection quantum key sharing method
CN108809644A (en) * 2018-07-17 2018-11-13 苏州大学 The multi-party quantum key agreement method of unordered high power capacity based on high level bell states
CN209267589U (en) * 2018-12-29 2019-08-16 华南师范大学 A kind of unrelated quantum key distribution system of OAM measuring device of real-time tracking compensation
CN110098930A (en) * 2019-05-27 2019-08-06 成都信息工程大学 A kind of two side's quantum key agreement methods and system based on Bell state
CN111490875A (en) * 2020-04-23 2020-08-04 成都信息工程大学 Cloud data semi-quantum secure sharing method and system based on proxy re-encryption
US20210391988A1 (en) * 2020-06-11 2021-12-16 Western Digital Technologies, Inc. Secure optical communication link
CN111934855A (en) * 2020-06-24 2020-11-13 南京如般量子科技有限公司 Quantum communication method and system of mobile communication terminal
CN112332988A (en) * 2021-01-06 2021-02-05 成都信息工程大学 Agile quantum privacy query method based on anti-rotation noise
CN112886970A (en) * 2021-01-11 2021-06-01 哈尔滨工业大学 Negotiation method for continuous variable quantum key distribution

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵洁;: "物联网通信信道的量子密钥协议研究", 激光杂志, no. 12, 25 December 2017 (2017-12-25) *

Similar Documents

Publication Publication Date Title
US9673977B1 (en) Refreshing public parameters in lattice-based cryptographic protocols
CN107196926B (en) Cloud outsourcing privacy set comparison method and device
CN111431713B (en) Private key storage method and device and related equipment
CN111510281B (en) Homomorphic encryption method and device
WO2019227225A1 (en) Systems and methods for establishing communications via blockchain
SE1451209A1 (en) Improved installation of a terminal in a secure system
CN113987584B (en) Hidden query method and system
CN113987583B (en) Hidden query method and system
CN116112168B (en) Data processing method and system in multiparty privacy exchange
SE1451210A1 (en) Generating a symmetric encryption key
CN116743376B (en) Multiparty secret sharing data privacy comparison method based on efficient ciphertext confusion technology
CN111726225B (en) Outsourcing privacy protection intersection calculation method based on secret sharing
CN116506124B (en) Multiparty privacy exchange system and method
CN111404943A (en) Data processing method and device, electronic equipment and computer readable storage medium
SE540133C2 (en) Improved system for establishing a secure communication channel
SE1451211A1 (en) Mutual authentication
US20220123924A1 (en) Method for providing a state channel
WO2023098294A1 (en) Heterogeneous data processing method and apparatus, and electronic device
Liu et al. Analyzing and improving the secure quantum dialogue protocol based on four-qubit cluster state
CN113806795B (en) Two-party privacy set union calculation method and device
Abulkasim et al. Secure multiparty quantum key agreement against collusive attacks
Lai et al. Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding
Sun et al. New fair multiparty quantum key agreement secure against collusive attacks
CN117714078A (en) Block chain group hidden transmission communication method, system and device and electronic equipment
Yang et al. Multi-party semi-quantum secure direct communication using Greenberger–Horne–Zeilinger states

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant