CN115189868A - Authenticated multi-party quantum key agreement method and system based on Bell state - Google Patents
Authenticated multi-party quantum key agreement method and system based on Bell state Download PDFInfo
- Publication number
- CN115189868A CN115189868A CN202210749870.3A CN202210749870A CN115189868A CN 115189868 A CN115189868 A CN 115189868A CN 202210749870 A CN202210749870 A CN 202210749870A CN 115189868 A CN115189868 A CN 115189868A
- Authority
- CN
- China
- Prior art keywords
- participant
- terminal
- participant terminal
- bit
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses an authenticable multi-party quantum key agreement method and system based on Bell state, wherein m-1 participants, P i (i =1, 2.... M-1), which each hold its own n-bit secret stringEach participant has an identity information ID of length l i . To ensure the validity of the participant's identity, P i (i =1,2, \ 8230;, N-1) requires the assistance of a semi-trusted third party P 0 Authentication is accomplished and they are separately associated with P 0 Sharing. After performing the following steps, the participants will obtain a length of aboutIs negotiated a keyIt can be seen that the identity of the user is authenticated with the help of the semi-trusted third party by using the characteristics of the Bell state, so that the impersonation attack is resisted. The Bell states are used as information carriers and are transmitted among participants, and the encoding operation is designed by utilizing quantum state discrimination, so that the proposed protocol is ensured to be correct and safe, and collusion attack of the participants can be resisted.
Description
Technical Field
The invention relates to the technical field of information transmission, in particular to an authenticatable multi-party quantum key agreement method and system based on Bell state.
Background
Quantum key agreement protocol (QKA) is an important branch of quantum cryptography, which means that two or more users can agree on the same key, with both having an impact on the key. Compared with quantum key distribution, quantum key negotiation pays more attention to fairness of protocols and privacy of users. As a main key management method, key agreement is an important cryptographic primitive, and is widely applied in the fields of multiparty security calculation, access control, electronic auction and the like.
In 2004, zhou et al proposed the first QKA protocol, in which two users agreed on a key using quantum invisible states. Later, in 2013, shi and Zhong proposed the QKA protocol (MQKA) for the first multiple parties based on entanglement swapping. Unfortunately, however, both protocols are insecure. Subsequently, some MQKA protocols have been proposed using different properties of quantum mechanics. These protocols can be divided into three categories according to the transmission structure of the signal particles: full pattern, tree and ring. Compared with the former two types, the ring type MQKA (CMQKA) has higher efficiency and feasibility. Therefore, most of the existing MQKA protocols belong to the third type. However, the existing research shows that most CMQKA protocols are not secure because they cannot resist collusion attack, and in addition, there is a impersonation attack that can occur during the actual execution of the protocol, and the attacker can be an attacker outside the protocol or a dishonest participant within the protocol, and they want to impersonate a legitimate participant to directly participate in the protocol, normally execute each step of the protocol without being discovered, and obtain the final negotiation key or privacy information of other participants.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: an authenticatable multiparty quantum key agreement method and system based on Bell state are provided to prevent collusion attack and ensure the proposed protocol is correct and safe.
In order to solve the technical problems, the invention adopts the technical scheme that:
an authenticatable multi-party quantum key agreement method based on Bell state includes the steps:
s1, third party terminal P 0 Obtaining participant terminal P i (i =1, 2.., m-1), the authentication information B of each participant terminal is calculated i Obtaining the hash value of the third party terminal
S2, each participant terminal P i Generating a set of random bit strings A i Then according to A i And holding secret character stringsCalculating to obtain a bit string C i ;
S3, each participant terminal P i N Bell states were randomly generated, resulting in two ordered particle sequences:
each participant terminal P i All willTo the next participant terminalWherein the last participant terminal P m-1 Will Q m-1→0 To a first participant terminal P 0 ;
S4, setting l =1, repeatedly executing the following contents m-1 times:
according to the received signal particle sequenceEach participant P i (i = 1.., m-1) according to its character string a i [l]、B i [l]And C i [l]Performing coding operations to obtain
Each participant terminal P i All will be newTo the next participant terminalWherein the last participant terminal P m-1 Will Q m-1→0 To the first participant terminal P 0 Let l = l +1;
s5, each participant terminal P i For two particle sequencesAnd R i Each two-particle pair is subjected to Bell state measurement, and the Bell state measurement is obtained according to the measurement result
S6, all participant terminals P i According toPerforming eavesdropping detection, if passing, all participant terminals P i And eavesdropping the key generated in the detection process, and abandoning the protocol if the key does not pass the detection process.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
an authenticatable multi-party quantum key agreement system based on Bell state comprises a third party terminal and at least two participant terminals, wherein the third party terminal and the participant terminals respectively comprise a memory, a processor and a computer program which is stored on the memory and can run on the processor, and the processor realizes the method when executing the computer program.
The invention has the beneficial effects that: an authenticatable multi-party quantum key agreement method and a system based on Bell state are disclosed, wherein Bell state is used as an information carrier and is transmitted among participants, and the participants embed their secrets into travel particles through specific encoding operations. In this way, all participants can obtain the same agreed-upon key, i.e. the sum of their secret inputs, at the end of the protocol at the same time. Here, the encoding operation is designed using quantum state discrimination techniques, ensuring that the proposed protocol is correct and secure, and can withstand collusion attacks by multiple participants.
Drawings
Fig. 1 is a schematic flowchart of an authenticatable multiparty quantum key agreement method based on a Bell state according to an embodiment of the present invention;
FIG. 2 is a data flow diagram of database modeling according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an authenticatable multi-party quantum key agreement system based on the Bell state according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a third party terminal according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a participant terminal according to an embodiment of the present invention.
Description of reference numerals:
1. an authenticable multi-party quantum key agreement system based on Bell state; 2. a third party terminal; 3. a participant terminal.
Detailed Description
In order to explain the technical contents, the objects and the effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1-2, a method,
an authenticatable multi-party quantum key agreement method based on Bell state includes the steps:
s1, third party terminal P 0 Obtaining participant terminal P i (i =1, 2.., m-1), the authentication information B of each participant terminal is calculated i To obtain the hash value of the third party terminal
S2, each participant terminal P i Generating a set of random bit strings A i Then according to A i And holding secret character stringsCalculating to obtain a bit string C i ;
S3, each participant terminal P i N Bell states were randomly generated, resulting in two ordered particle sequences:
each participant terminal P i All willTo the next participant terminalWherein the last participant terminal P m-1 Will Q m-1→0 To a first participant terminal P 0 ;
S4, setting l =1, repeatedly executing the following contents m-1 times:
according to the received signal particle sequenceEach participant P i (i = 1...., m-1) according to its character string a i [l]、B i [l]And C i [l]Performing coding operations to obtain
Each participant terminal P i All will be newTo the next participant terminalWherein the last participant terminal P m-1 Will Q m-1→0 To the first participant terminal P 0 Let l = l +1;
s5, each participant terminal P i For two particle sequencesAnd R i Each two-particle pair is subjected to Bell state measurement, and the Bell state measurement is obtained according to the measurement result
S6, all participant terminals P i According toPerforming eavesdropping detection, if passing, all participant terminals P i And eavesdropping the key generated in the detection process, and abandoning the protocol if the key does not pass the detection process.
As can be seen from the above description, the beneficial effects of the present invention are: an authenticatable multi-party quantum key agreement method and a system based on Bell state are disclosed, wherein Bell state is used as an information carrier and is transmitted among participants, and the participants embed their secrets into travel particles through specific encoding operations. In this way, all participants can simultaneously obtain the same negotiation key, i.e. the sum of their secret inputs, at the end of the protocol. Here, the encoding operation is designed using quantum state discrimination techniques, ensuring that the proposed protocol is correct and secure, and can withstand collusion attacks by multiple participants.
The step S1 specifically includes:
s1, third party terminal P 0 Obtaining participant terminal P i (i =1,2,. Lam., m-1), generating a random number r 0 And is disclosed to all participant terminals and acquires the random numbers r generated by all participant terminals i Selecting a hash function h from the hash family: 2 * →2 (m-1)n And discloses to all participant terminals, calculates authentication information of each participant terminalTo obtain the hash value of the third party terminalWhere, | | represents a string connection, ID i Representing the ith participant terminal P i Identity information of r i A random number generated for participant i;
the authentication information B of each participant terminal is calculated i Specifically, the calculation is performed according to the following formula:
wherein the functionIs to beExtending to a bit string with the same length as IDi ri r0, and then carrying out bit-by-bit XOR operation on the two bit strings to obtain the bit stringPerforming hash operation on the bit string to obtain a corresponding hash value Bi, whereinAs participant P i The held private key.
As can be seen from the above description, a calculation method of the authentication information is given.
Further, the step S2 specifically includes:
each participant terminal P i Each generates a random string of (m-1) n bits long:
A i ={A i [1],A i [2],…,A i [m-1]|A i [k]=a i 1 [k]…a i n [k],a i j [k]∈{0,1}};
in the formula, A i Is the ith participant terminal P i A generated random string;
each participant terminal P i According to its own random string A i And held n-bit secret stringCalculating to obtain a string of m-1 n long bit strings:
C i ={C i [1],C i [2],…,C i [m-1]|C i [k]=c i 1 [k]...c i n [k],c i j [k]∈{0,1}};
In this embodiment, the third party terminal P 0 Corresponding value A 0 =C 0 =00…0
As can be seen from the above description, a method and a specific embodiment of calculating a secret string are given.
Further, in step S3, in the two ordered particle sequences, the initial state of each two quantum pairs is:
from the above description, constraints are given for the generation of two particle sequences.
Further, in the step S4, each participant P i According to its character string A i [l]、B i [l]And C i [l]The encoding operation is performed on the sequenceThe j (th) particle ofPerforming local unitary operation to obtain new
As can be seen from the above description, an encoding operation is achieved.
U 0,0 =I=|0><0|+|1><1|,U 0,1 =X=|0><1|+|1><0|;
U 1,0 =Z=|0><0|-|1><1|,U 1,1 =iY=|0><1|-|1><0|;
as can be seen from the above description, a specific embodiment of unitary operation is given.
Further, the step S5 specifically includes:
each participant terminal P i For two particle sequencesAnd R i The Bell state measurement was performed for each two particle pair to obtain the results:
From the above description, specific embodiments of Bell state measurements and Si are given.
Further, the step S6 specifically includes:
third party terminal P 0 According to B 0 A bit sequence of length n is calculated, i.e.All take part inA terminal P i According to bit sequence DDividing into sample sequencesAnd information sequence
Each participant terminal P i Calculating δ = (D) from D 1 ×2 n-1 +d 2 ×2 n-2 +…+d n ×2 0 ) Modulo n 1 And disclose T i ',Each participant terminal P i M strings of T i ' New n of composition 1 Bit sequence T' and its own T i Making a comparison if all T i All equal T', then all participants accept K = K 0 =K 1 =…=K m-1 As the original negotiated key, otherwise the protocol is aborted.
As can be seen from the above description, a specific method of eavesdropping detection is given.
Further, the sequence is determined according to the bit sequence DDividing into sample sequencesAnd information sequenceThe method comprises the following steps:
if d is j Is equal to 0, the corresponding bit is selectedComposing a sample sequence as a sample The remaining bits constitute the information sequence
As can be seen from the above description, it is achieved that the sequence is formed from the bit sequence DDividing into sample sequencesAnd information sequence
An authenticatable multi-party quantum key agreement system based on Bell state comprises a third party terminal and at least two participant terminals, wherein the third party terminal and the participant terminals respectively comprise a memory, a processor and a computer program which is stored on the memory and can run on the processor, and the processor realizes the method when executing the computer program.
The invention is applied to information transmission with a plurality of participants to avoid collusion attack.
Referring to fig. 1 to fig. 2, a first embodiment of the present invention is:
an authenticatable multi-party quantum key agreement method based on Bell state includes the following steps:
s1, third party terminal P 0 Obtaining participant terminal P i (i =1,2, \ 8230;, m-1) number (m-1), authentication information B of each participant terminal is calculated i Obtaining the hash value of the third party terminal
In particular, the third party terminal P 0 Obtaining participant terminal P i (i =1,2, \ 8230;, m-1) number (m-1), generating a random number r 0 And is disclosed to all participant terminals and acquires the random numbers r generated by all participant terminals i Selecting a hash function h:2 from the hash family * →2 (m-1)n And discloses to all participant terminals, calculates authentication information of each participant terminalTo obtain the hash value of the third party terminalWhere | | | represents string concatenation, ID i Representing the ith participant terminal P i Identity information of r i A random number generated for participant i.
Specifically, it is calculated according to the following formula:
here, functionFirstly, theExtending to a bit string with the same length as IDi ri r0, and then carrying out bit-by-bit XOR operation on the two bit strings to obtain the bit stringFinally, the bit string is subjected to hash operation to obtain a corresponding hash value B i
S2, each participant terminal P i Generating a set of random bit strings A i Then according to A i And holding secret character stringsCalculating to obtain a bit string C i ;
In particular, each participant terminal P i Each generates a random string of (m-1) n bits long:
A i ={A i [1],A i [2],...,A i [m-1]|A i [k]=a i 1 [k]...a i n [k],a i j [k]∈{0,1}};
in the formula, A i Is the ith participant terminal P i A generated random string;
each participant terminal P i According to its own random string A i And held n-bit secret stringCalculating to obtain a string of m-1 n long bit strings:
C i ={C i [1],C i [2],...,C i [m-1]|C i [k]=c i 1 [k]...c i n [k],c i j [k]∈{0,1}};
S3, each participant terminal P i N Bell states were prepared, resulting in two ordered particle sequences:
R i ={r i 1 ,r i 2 ,...,r i n };
each participant terminal P i All willTo the next participant terminalWherein the last participant terminal P m-1 Will Q m-1→0 To the first participant terminal P 0 。
Specifically, in the two ordered particle sequences, the initial state of each two-quantum pair is:
s4, setting l =1, repeatedly executing the following contents m-1 times:
from the received signal particle sequenceEach participant P i (i = 1...., m-1) according to its character string a i [l]、B i [l]And C i [l]Performing coding operations to obtain
Each participant terminal P i All will be newTo the next participant terminalWherein the last participant terminal P m-1 Will be provided withTo the first participant terminal P 1 Let l = l +1.
In particular, each participant P i According to its character string A i [l]、B i [l]And C i [l]The encoding operation is performed on the sequenceThe jth particle of (1)Performing local unitary operation to obtain new
Wherein:
U 0,0 =I=|0><0|+|1><1|,U 0,1 =X=|0><1|+|1><0|;
U 1,0 =Z=|0><0|-|1><1|,U 1,1 =iY=|0><1|-|1><0|;
s5, each participant terminal P i For two particle sequencesAnd R i Each two-particle pair is subjected to Bell state measurement, and the Bell state measurement is obtained according to the measurement result
In particular, each participant terminal P i For two particle sequencesAnd R i The Bell state measurement was performed for each two particle pair, resulting in:
S6, all participant terminals P i According toPerforming eavesdropping detection, if passing, all participant terminals P i And eavesdropping the key generated in the detection process, and abandoning the protocol if the key does not pass the detection process.
In particular, the third party terminal P 0 According to B 0 A bit sequence of length n is calculated, i.e.All participant terminals P i Sequencing according to bit sequence DDividing into sample sequencesAnd information sequenceSpecifically, if d j Is equal to 0, the corresponding bit is selectedComposing a sample sequence as a sampleThe remaining bits constitute the information sequence
Each participant terminal P i Calculating δ = (D) from D 1 ×2 n-1 +d 2 ×2 n-2 +…+d n ×2 0 ) Modulo n of 1 And disclose T i ',Each participant terminal P i M strings of T i ' novel n of composition 1 Bit sequence T' and its own T i Making a comparison if all T i All equal T', then all participants accept K = K 0 =K 1 =…=K m-1 As the original negotiated key, otherwise the protocol is aborted.
Referring to fig. 3-5, the second embodiment of the present invention is:
an authenticatable multi-party quantum key agreement system 1 based on the Bell state includes a third party terminal 2 and at least two participant terminals 3, where the third party terminal and the participant terminals each include a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and is characterized in that the processor implements the steps of the first embodiment when executing the computer program.
In summary, the present invention provides a method and a terminal,
the above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.
Claims (10)
1. An authenticatable multi-party quantum key agreement method based on Bell state is characterized by comprising the following steps:
s1, third party terminal P 0 Obtaining participant terminal P i (i =1, 2.., m-1), the authentication information B of each participant terminal is calculated i Obtaining the hash value of the third party terminal
S2, each participant terminal P i Generating a set of random bit strings A i Then according to A i And holding secret character stringsCalculating to obtain a bit string C i ;
S3, each participant terminal P i N Bell states were randomly generated, resulting in two ordered particle sequences:
R i ={r i 1 ,r i 2 ,...,r i n };
each participant terminal P i All willTo the next participant terminalWherein the last participant terminal P m-1 Will Q m-1→0 To the first participant terminal P 0 ;
S4, setting l =1, repeatedly executing the following contents m-1 times:
according to the received signal particle sequenceEach participant P i (i = 1.., m-1) according to its character string a i [l]、B i [l]And C i [l]Performing coding operations to obtain
Each participant terminal P i All will be newIs sent toThe next participant terminalWherein the last participant terminal P m-1 Will Q m-1→0 To a first participant terminal P 0 Let l = l +1;
s5, each participant terminal P i For two particle sequencesAnd R i Each two-particle pair is subjected to Bell state measurement, and the Bell state measurement is obtained according to the measurement result
2. The method as claimed in claim 1, wherein the step S1 specifically includes:
s1, third party terminal P 0 Obtaining participant terminal P i (i =1, 2.., m-1), generating a random number r 0 And is disclosed to all participant terminals and acquires random numbers r generated by all participant terminals i Selecting a hash function h from the hash family: 2 * →2 (m-1)n And discloses to all participant terminals, calculates authentication information of each participant terminalTo obtain the hash value of the third party terminalWhere, | | represents a string connection, ID i Representing the ith participant terminal P i Identity information of r i A random number generated for participant i;
the calculation of authentication information B for each participant terminal i Specifically, the calculation is performed according to the following formula:
wherein the functionIs to beExtending to a bit string with the same length as IDi ri r0, and then carrying out bit-by-bit XOR operation on the two bit strings to obtain the bit stringPerforming hash operation on the bit string to obtain a corresponding hash value Bi, whereinAs participant P i The held private key.
3. The method as claimed in claim 2, wherein the step S2 specifically includes:
each participant terminal P i Each generates a random string of (m-1) n bits long:
A i ={A i [1],A i [2],...,A i [m-1]|A i [k]=a i 1 [k]...a i n [k],a i j [k]∈{0,1}};
in the formula, A i Is the ith participantTerminal P i A generated random string;
each participant terminal P i According to its own random string A i And held n-bit secret stringA string of m-1 n long bit strings is obtained by calculation:
C i ={C i [1],C i [2],...,C i [m-1]|C i [k]=c i 1 [k]...c i n [k],c i j [k]∈{0,1}};
5. the Bell-state-based authenticatable multi-party quantum key agreement method as claimed in claim 4, wherein in the step S4, each participant P i According to its character string A i [l]、B i [l]And C i [l]The encoding operation is performed on the sequenceThe jth particle of (1)Performing local unitary operation to obtain new
6. The Bell-state-based authenticatable multi-party quantum key agreement method as claimed in claim 5, wherein the jth particle pairExecuting a local unitary operation, specifically:
U 0,0 =I=|0><0|+|1><1|,U 0,1 =X=|0><1|+|1><0|;
U 1,0 =Z=|0><0|-|1><1|,U 1,1 =iY=|0><1|-|1><0|;
8. The method as claimed in claim 7, wherein the step S6 specifically includes:
third party terminal P 0 According to B 0 A bit sequence of length n is calculated, i.e.All participant terminals P i According to bit sequence DDividing into sample sequencesAnd information sequence
Each participant terminal P i Calculating δ = (D) from D 1 ×2 n-1 +d 2 ×2 n-2 +…+d n ×2 0 ) Modulo n of 1 And disclose T i ',Each participant terminal P i Will m strings T i ' novel n of composition 1 Bit sequence T' and its own T i Making a comparison if all T i All equal T', then all participants accept K = K 0 =K 1 =…=K m-1 As the original negotiated key, otherwise the protocol is aborted.
9. The method as claimed in claim 8, wherein the sequence is determined according to a bit sequence DDividing into sample sequencesAnd information sequenceThe method comprises the following steps:
10. An authenticatable multi-party quantum key agreement system based on Bell states, comprising a third party terminal and at least two participant terminals, wherein each of the third party terminal and the participant terminals comprises a memory, a processor and a computer program stored in the memory and executable on the processor, and the processor implements the method of any one of claims 1 to 9 when executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210749870.3A CN115189868A (en) | 2022-06-29 | 2022-06-29 | Authenticated multi-party quantum key agreement method and system based on Bell state |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210749870.3A CN115189868A (en) | 2022-06-29 | 2022-06-29 | Authenticated multi-party quantum key agreement method and system based on Bell state |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115189868A true CN115189868A (en) | 2022-10-14 |
Family
ID=83515372
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210749870.3A Pending CN115189868A (en) | 2022-06-29 | 2022-06-29 | Authenticated multi-party quantum key agreement method and system based on Bell state |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115189868A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116961883A (en) * | 2023-09-21 | 2023-10-27 | 山东高速建设管理集团有限公司 | Quantum privacy comparison method based on three-particle GHZ-like state |
-
2022
- 2022-06-29 CN CN202210749870.3A patent/CN115189868A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116961883A (en) * | 2023-09-21 | 2023-10-27 | 山东高速建设管理集团有限公司 | Quantum privacy comparison method based on three-particle GHZ-like state |
CN116961883B (en) * | 2023-09-21 | 2023-11-21 | 山东高速建设管理集团有限公司 | Quantum privacy comparison method based on three-particle GHZ-like state |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11936774B2 (en) | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys | |
CN107579819B (en) | A kind of SM9 digital signature generation method and system | |
Samiullah et al. | An image encryption scheme based on DNA computing and multiple chaotic systems | |
CN113364576B (en) | Data encryption evidence storing and sharing method based on block chain | |
CN110959163B (en) | Computer-implemented system and method for enabling secure storage of large blockchains on multiple storage nodes | |
CN113111373B (en) | Random number generation method of VBFT (visual basic FT) consensus mechanism and consensus mechanism system | |
CN108418686A (en) | A kind of how distributed SM9 decryption methods and medium and key generation method | |
CN111191280A (en) | Block chain transaction method based on encrypted data, electronic equipment and storage medium | |
CN111147246A (en) | Multi-party collaborative signature method and system based on SM2 | |
CN109660345A (en) | Anti- quantum calculation block chain method of commerce and system based on unsymmetrical key pool server | |
CN109547199A (en) | A kind of method that multi-party joint generates SM2 digital signature | |
Hazra et al. | A Review on DNA Based Cryptographic Techniques. | |
Sun et al. | Efficient Multiparty Quantum Key Agreement With a Single $ d $-Level Quantum System Secure Against Collusive Attack | |
CN114666032A (en) | Block chain transaction data privacy protection method based on homomorphic encryption | |
Alwen et al. | Collusion-free multiparty computation in the mediated model | |
CN115189868A (en) | Authenticated multi-party quantum key agreement method and system based on Bell state | |
CN108199836B (en) | Method and device for binding and unbinding key and equipment | |
WO2023207735A1 (en) | Method and system for realizing secure multi-party computation by using hardware chips | |
Hitaswi et al. | A bio-inspired model to provide data security in cloud storage | |
KR100505335B1 (en) | Quantum signature method using arbitrator | |
Feng et al. | Quantum blind signature scheme for supply chain financial | |
CN114710294A (en) | Novel block chain privacy protection method | |
CN110766400B (en) | Transaction record processing method based on block chain, accounting node and medium | |
CN113362065A (en) | Online signature transaction implementation method based on distributed private key | |
CN116318636A (en) | SM 2-based threshold signature method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |