CN109462473A - A kind of quantum secret information equality exchange method and system - Google Patents
A kind of quantum secret information equality exchange method and system Download PDFInfo
- Publication number
- CN109462473A CN109462473A CN201811272430.3A CN201811272430A CN109462473A CN 109462473 A CN109462473 A CN 109462473A CN 201811272430 A CN201811272430 A CN 201811272430A CN 109462473 A CN109462473 A CN 109462473A
- Authority
- CN
- China
- Prior art keywords
- user
- party
- particle
- secret information
- state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention belongs to technical field of network information, disclose a kind of quantum secret information equality exchange method and system, prepare GHZ state by third party, two particles in GHZ state are sent respectively to the first user and the second user of communication;First user of the communication after receiving particle and second user are operated using Pauli is loaded into secret information on particle respectively, returns again to third party;The first user and second user of communication measure new GHZ state and announce measurement result;The first user and second user of communication obtain the secret information of other side according to the measurement result of announcement.The first user and second user that the present invention communicates measure new GHZ state and announce measurement result;The first user and second user of communication can deduce the secret information of other side according to the measurement result of announcement;It can ensure that third party is safe and reliable, meanwhile, this method is able to carry out detection eavesdropping during realization, resists and intercepts and captures multi-sending attack, man-in-the-middle attack and participant's attack.
Description
Technical field
Method is exchanged the invention belongs to technical field of network information more particularly to a kind of quantum secret information equality and is
System.
Background technique
Currently, the prior art commonly used in the trade is such that
In actual life, if two users respectively possess a secret information, user 1 goes for the secret of user 2
Information, while user 2 goes for the secret information of user 1, two users can be obtained more by the exchange of secret information
Information.But during information exchange, previous communication means is usually that user 1 sends secret information to user first
2, after user 2 acknowledges receipt of secret information, the secret information of oneself is just sent to user 1.This secret information exchange
There are risks for mode, it is possible to user 2 obtains the secret information of user 1, but user cheating 1, send false secret information to
Family 1.What user 1 obtained is false secret information, but the secret information of oneself has been leaked to user 2.
Such as Liang Ge company wants win-win progress, shares the advantageous resource of company, but Liang Ge company all refuses to send out first
Give the classified information of oneself company, it is assumed that company 1 sends secret information to company 2 first, and company 2 obtains the secret letter of company 1
Breath, but refusal sends secret information to company 1.
In conclusion problem of the existing technology is:
In the prior art, the both sides of communication cannot be made while obtaining the secret information of other side, can not achieve secret information
Equality is exchanged;
In the prior art, third party is not introduced, while third-party identity cannot be verified;
Detection eavesdropping can not be carried out in information interactive process, resisted and intercepted and captured multi-sending attack, man-in-the-middle attack and participation
Person's attack.
Solve the meaning of above-mentioned technical problem:
Third party is introduced, GHZ state is prepared by third party, two particles therein are sent respectively to the both sides of communication, is led to
First user of letter and second user carry out Pauli operation to the particle received respectively, are then sent to third party.Third party couple
New GHZ state measures and announces measurement result, and the first user of communication and second user deduce the secret of other side simultaneously
Information.
Third-party identity can be authenticated, it is ensured that third party correctly prepares GHZ state, and third party is responsible for carrying out particle
Distribution and measurement, but secret information cannot be obtained.
Summary of the invention
In view of the problems of the existing technology, method is exchanged the present invention provides a kind of quantum secret information equality and be
System.The quantum secret information equality that the present invention designs, which exchanges method, may be implemented the secret information for obtaining other side simultaneously, be a kind of
The Information Exchange Agreement of equality.
The invention is realized in this way a kind of quantum secret information equality exchanges method, the quantum secret information equality
Exchange method includes:
GHZ state is prepared by third party, two particles in GHZ state are sent respectively to the first user of communication and second and are used
Family;
First user of the communication after receiving particle and second user are operated using Pauli is loaded into secret information respectively
On particle, return again to third party;
The first user and second user of communication measure new GHZ state and announce measurement result;
The first user and second user of communication obtain the secret information of other side according to the measurement result of announcement.
Further, in the quantum secret information equality exchange method, the first user possesses secret information X (x1,
x2.......xn), second user possesses secret information Y (y1,y2.......yn), wherein each xiTwo binary systems corresponding with yi
Bit;It specifically includes:
The first step, the first user and second user inform third party, prepare m+n pairs by third partyState, by 1 all particle composition sequence S1;2 all particle composition sequence S2;All 3
Particle composition sequence S3;Third party is by sequence S1Oneself retains, in sequence S2With sequence S3Middle radom insertion inveigles particle | 0 >, | 1
>, |+>, | ->, then it is sent respectively to the first user and second user;
Laggard commit theft of particle that second step, the first user and second user receive third party's transmission listens detection, and third party is public
Cloth inveigle particle position and corresponding measurement base, if insertion be | 0 > or | 1 > if announce Z base, if insertion be |+>
Or | -> then announce X base;First user and second user extract the particle of corresponding position with X base or the measurement of Z base;If surveying
It measures result mistake and is higher than threshold value, then abandon communicating, otherwise carry out third step.
Third step authenticates third-party identity, and the first user and second user are randomly assigned m particle and correspondence
The position of particle, it is desirable that third party is measured with X base and classical channel is used to announce measurement result, the first user and second user
Receive the particle for using X base to measure corresponding position after measurement result;If third party is correctly prepared for GHZ state, meet third party
Announce | when+> state, the first user is identical with the measurement result of second user;Third party announces | when -> state, the first user and second
The measurement result of user is opposite;If verifying third party is accurately prepared for GHZ state, the 4th step is carried out;
4th step, the first user executes four kinds of Paulis to n particle according to the secret information X of oneself and operates, if xiFor
00 executes σ00Operation;If xiσ is executed for 0101Operation;If xiσ is executed for 1010Operation;If xiIt is executed for 11
σ11Operation.Alice forms new sequence S' after executing Pauli operation2;
Similarly, second user forms new sequence S after executing Pauli operation according to the secret information Y of oneself3';First
User is in sequence S'2Middle radom insertion inveigles particle | 0 >, | 1 >, |+>, | ->, it is then sent to third party, similarly, second user
Radom insertion is inveigled the S of particle3' it is also sent to third party;
5th step, after third party receives the particle that Alice and Bob are sent, the first user and second user are announced respectively
Inveigle position and the measurement base of particle;
6th step, third party, which takes out, inveigles particle to obtain S' later2And S3', then with the sequence S of oneself1Combined measurement,
Third party announces the GHZ state of measurement;
7th step, the first user obtain information Y' according to the measurement result that third party announces;Bob is announced according to third party
Measurement result obtains information X ';First user announces Y' exclusive or X's as a result, second user is announced with classical channel with classical channel
X ' exclusive or Y's as a result, if the first user is identical with the content that second user is announced, not there is deception in third party;Then first
User obtains the secret information Y of second user, and second user obtains the secret information X of the first user.
Further, four kinds of Pauli matrices are as follows:
It is right | 0 > with | 1 > it executes four kinds of Paulis and operates to obtain following result:
8 kinds of GHZ states are as follows:
Entangled StateBeing expressed as follows under X base:
By (4) formula it is found that Entangled StateIn three particles have following relationship: when first grain
Son is state |+> when, second is identical with third particle state;When first particle is | when -> state, second and third grain
Sub- state is opposite;According to this characteristic for verify Entangled State whether be | Ψ >aState.
Another object of the present invention is to provide the computer program that a kind of quantum secret information equality is exchanged, the quantum
The computer program that secret information equality is exchanged exchanges method for realizing the quantum secret information equality.
Another object of the present invention is to provide a kind of terminal, the terminal, which is at least carried, realizes the quantum secret information
The controller of equality exchange method.
Another object of the present invention is to provide a kind of computer readable storage mediums, including instruction, when it is in computer
When upper operation, so that computer executes the quantum secret information equality and exchanges method.
Another object of the present invention is to provide a kind of quantum for realizing the quantum secret information equality exchange method is secret
Confidential information equality interchange system, the quantum secret information equality interchange system include:
Third party prepares GHZ morphotype block, prepares GHZ state for third party, two particles in GHZ state are sent respectively to
First user of communication and second user;
Third-party authentication module, for being authenticated to third-party identity, the first user and second user with
Machine specifies the position of m particle and corresponding particle, it is desirable that third party is measured with X base and classical channel is used to announce measurement knot
Fruit, the first user and second user receive the particle for using X base to measure corresponding position after measurement result;If third party correctly makes
For GHZ state, meeting third party's announcement | when+> state, the first user is identical with the measurement result of second user;Third party announces |-
When > state, the measurement result of the first user and second user is opposite;
The double hairs of communication announce information modules, for after third party receives the first user and second user is sent particle,
First user and second user announce the position for inveigling particle and measurement base respectively;
Third party announces GHZ morphotype block, takes out for third party and obtains S' after inveigling particle2And S3', then with oneself
Sequence S1Combined measurement announces the GHZ state of measurement;
First user of communication and second user information acquisition module, the measurement knot announced with the first user according to third party
Fruit obtains information Y';Bob obtains information X ' according to the measurement result that third party announces;First user is different with classical channel announcement Y'
Or X's as a result, second user with classical channel announce X ' exclusive or Y's as a result, if the first user and second user announce it is interior
Hold identical, third party's not presence deception;Then the first user obtains the secret information Y of second user, and second user obtains first
The secret information X of user.
Further, the quantum secret information equality interchange system further comprises:
First user of communication and second user detection module receive third party for the first user and second user and send
Laggard commit theft of particle listen detection, third party announce inveigle particle position and corresponding measurement base;
Pauli operation module executes four kinds of Pauli behaviour to n particle according to the secret information X of oneself for the first user
Make, second user executes Pauli according to the secret information Y of oneself and operates to form new sequence S3'。
Another object of the present invention is to provide a kind of two-sided information Internet platform, the two-sided information Internet
Platform at least carries the quantum secret information equality interchange system.
In conclusion advantages of the present invention and good effect are as follows:
The present invention prepares GHZ state by third party first, and two particles therein are sent respectively to the first user of communication
And second user.Although introducing third party, third-party identity can be verified, reduce to it is third-party according to
Rely.First user of the communication after receiving particle and second user are operated using Pauli is loaded into particle for secret information respectively
On, it returns again to third party, the first user of communication and second user measure new GHZ state and announce measurement result.
The first user and second user of communication can deduce the secret information of other side according to the measurement result of announcement.This method can be with
Make the both sides of communication while obtaining the secret information of other side, realizes that the equality of secret information is exchanged, avoid secret information exchanged
Cheat the case where another party in the side Cheng Zhongyi.By analyzing it is found that third-party identity can be verified, it can be ensured that third party is
It is safe and reliable, meanwhile, this method is able to carry out detection eavesdropping during realization, resists and intercepts and captures multi-sending attack, go-between attacks
It hits and is attacked with participant.
Detailed description of the invention
Fig. 1 is that quantum secret information equality provided in an embodiment of the present invention exchanges method flow diagram.
Fig. 2 is the equality information exchange flow chart provided in an embodiment of the present invention that there is attack.
Fig. 3 is quantum secret information equality interchange system schematic diagram provided in an embodiment of the present invention.
In figure: 1, third party prepares GHZ morphotype block;2, the first user communicated and second user detection module;3, third
The authentication module of side;4, Pauli operation module;5, the double hairs of communication announce information module;6, third party announces GHZ morphotype block;
7, the first user communicated and second user information acquisition module.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention
It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to
Limit the present invention.
In the prior art, the both sides of communication cannot be made while obtaining the secret information of other side, can not achieve secret information
Equality is exchanged;
In the prior art, third party is not introduced, while third-party identity cannot be verified.
The present invention prepares GHZ state by third party, and two particles therein are sent respectively to the both sides of communication.The of communication
One user and second user carry out Pauli operation to the particle received respectively, are then sent to third party.Third party is to new GHZ
State measures and announces measurement result, and the first user of communication and second user can be deduced according to the measurement result of announcement
The secret information of other side.This method can make the both sides of communication while obtain the secret information of other side, realize the flat of secret information
Deng exchange, a case where side cheats another party in secret information exchange process is avoided.
In quantum secret information equality exchange method provided in an embodiment of the present invention, it is related to:
Four kinds of Pauli matrices are as follows:
It is right | 0 > with | 1 > it executes four kinds of Paulis and operates to obtain following result:
8 kinds of GHZ states are as follows:
Entangled StateBeing expressed as follows under X base:
By (4) formula it is found that Entangled StateIn three particles have following relationship: when first grain
Son is state |+> when, second is identical with third particle state;When first particle is | when -> state, second and third grain
Sub- state is opposite.According to this characteristic can verify an Entangled State whether be | Ψ >aState.
Such as Fig. 3, this hair provides a kind of quantum secret information equality realized the quantum secret information equality and exchange method
Interchange system, the quantum secret information equality interchange system include:
Third party prepares GHZ morphotype block 1, prepares GHZ state for third party, two particles in GHZ state are sent respectively
To the first user of communication and second user;
First user of communication and second user detection module 2 receive third party's hair for the first user and second user
Laggard commit theft of the particle sent listens detection, and third party announces the position for inveigling particle and corresponding measurement base;
Third-party authentication module 3, for being authenticated to third-party identity, the first user and second user with
Machine specifies the position of m particle and corresponding particle, it is desirable that third party is measured with X base and classical channel is used to announce measurement knot
Fruit, the first user and second user receive the particle for using X base to measure corresponding position after measurement result;If third party correctly makes
For GHZ state, meeting third party's announcement | when+> state, the first user is identical with the measurement result of second user;Third party announces |-
When > state, the measurement result of the first user and second user is opposite;
Pauli operation module 4 executes four kinds of Pauli behaviour to n particle according to the secret information X of oneself for the first user
Make, second user executes Pauli according to the secret information Y of oneself and operates to form new sequence S3'。
The double hairs of communication announce information modules 5, for after third party receives the first user and second user is sent particle,
First user and second user announce the position for inveigling particle and measurement base respectively;
Third party announces GHZ morphotype block 6, takes out for third party and obtains S' after inveigling particle2And S3', then with oneself
Sequence S1Combined measurement announces the GHZ state of measurement;
First user of communication and second user information acquisition module 7, the measurement announced with the first user according to third party
As a result information Y' is obtained;Bob obtains information X ' according to the measurement result that third party announces;First user announces Y' with classical channel
Exclusive or X's as a result, second user with classical channel announce X ' exclusive or Y's as a result, if what the first user and second user were announced
Content is identical, and third party does not have deception;Then the first user obtains the secret information Y of second user, and second user obtains
The secret information X of one user.
The invention will be further described combined with specific embodiments below.
Embodiment:
Fig. 1, quantum secret information equality provided in an embodiment of the present invention exchange method, comprising:
Alice possesses secret information X (x1,x2.......xn), Bob possesses secret information Y (y1, y2.......yn),
In each xiWith yiCorresponding two binary bits.Alice and Bob wants to carry out the exchange of secret information, and agreement is as follows:
(1) Alice and Bob informs third party, prepares m+n pairs by third partyState, by institute
1 particle composition sequence S having1;2 all particle composition sequence S2;3 all particle composition sequence S3.Third party is by sequence S1
Oneself retains, in sequence S2With sequence S3Middle radom insertion inveigles particle | 0 >, | 1 >, |+>, | ->, then it is sent respectively to Alice
And Bob.
(2) laggard commit theft of particle that Alice and Bob receives third party's transmission listens detection, and third party, which announces, inveigles particle
Position and corresponding measurement base, if insertion be | 0 > or | 1 > if announce Z base, if insertion be |+> or | -> if announce X
Base.Alice and Bob extracts the particle of corresponding position with X base or the measurement of Z base.If measurement result mistake is higher than threshold value,
It abandons communicating, otherwise carries out (3) step.
(3) third-party identity being authenticated, Alice and Bob are randomly assigned m particle and correspond to the position of particle,
It is required that third party is measured with X base and classical channel is used to announce measurement result, Alice and Bob are received after measurement result
With the particle of X base measurement corresponding position.If third party is correctly prepared for GHZ state, it should meet third party's announcement | when+> state,
The measurement result of Alice and Bob is identical;Third party announces | and when -> state, the measurement result of Alice and Bob are opposite.If verifying
Third party is accurately prepared for GHZ state, then carries out (4) step.
(4) Alice executes four kinds of Pauli operations to n particle according to the secret information X of oneself, if xiIt is executed for 00
σ00Operation;If xiσ is executed for 0101Operation;If xiσ is executed for 1010Operation;If xiσ is executed for 1111Operation.
Alice forms new sequence S' after executing Pauli operation2, similarly, Bob executes Pauli according to the secret information Y of oneself and operates
New sequence S is formed later3'.Alice radom insertion in sequence S'2 inveigles particle | 0 >, | 1 >, |+>, | ->, then send
To third party, similarly, Bob inveigles radom insertion the S of particle3' it is also sent to third party.
(5) after third party receives the particle that Alice and Bob are sent, Alice and Bob announce the position for inveigling particle respectively
Base is set and measures, the mode announced with (2) step third party is identical.
(6) third party, which takes out, inveigles particle to obtain S' later2And S3', then with the sequence S of oneself1Combined measurement, measurement
The results are shown in Table 1, and third party announces the GHZ state of measurement.
(7) Alice can deduce information Y' according to the measurement result that 1 third party of table announces, and similarly, Bob is according to third
The measurement result of Fang Gongbu can deduce information X '.Alice announces Y' exclusive or X's as a result, the classical letter of Bob with classical channel
X ' exclusive or Y's as a result, if the content announced of the two is identical is announced in road, illustrates that third party does not have deception, Alice obtains
The secret information Y, Bob of Bob obtains the secret information X of Alice.
Fig. 2 is the equality information exchange flow chart provided in an embodiment of the present invention that there is attack.
Below with reference to concrete analysis, the invention will be further described.
1) Correctness Analysis of agreement:
If the both sides Alice and Bob of communication want to carry out the exchange of secret information, GHZ state is prepared by third partyParticle 2 is sent to Alice, particle 3 is sent to Bob.Alice and Bob are according to secret
Information carries out Pauli operation to particle, is then sent to third party, third party by the particle in the particle of return and oneself hand into
Row measures and announces measurement result.The measurement result and the secret information of oneself announced such as table 1, Alice according to third party can
The secret information of Bob is deduced, similarly, Bob can also deduce the secret information of Alice.The simplification that secret information equality is exchanged
Flow chart is as shown in Figure 1.
Agreement citing: assuming that Alice possesses secret information 001011, Bob possesses secret information 110011.Alice and Bob
It informs third party, prepares m+n pairs by third partyState inveigles 2 all particle radom insertions
It is sent to Alice after particle, is sent to Bob after 3 all particle radom insertions are inveigled particle.Alice and Bob receive third
Laggard commit theft of the particle just sent listens detection, it was demonstrated that verifies after channel safety to third-party identity.Alice and Bob
It is randomly assigned the position of particle, it is desirable that third party is measured with X base, when what third party announced is | when+> state, Alice and Bob
The measurement result measured with X base is identical.When what third party announced is | when -> state, measurement result that Alice and Bob are measured with X base
On the contrary.After verifying third party correctly prepares GHZ state, secret information is loaded on respective particle by Alice and Bob respectively.
Alice executes σ to 2 particles respectively00、σ10、σ11Operation;Bob executes σ to 3 particles respectively11、σ00、σ11Operation.Alice and Bob
Particle is inveigled to be sent to third party later the particle insertion executed after Pauli operates.Third party receives particle, detection eavesdropping
Particle will be inveigled to extract later, combines all particles 1 and carry out GHZ measurement.Announce measurement result | Ψ >b|Ψ>d|Ψ>a,
According to the measurement result of GHZ state after the operation of 1 Pauli of table, Alice obtains information 110011, and Bob obtains information 001011.Alice
Obtained information 110011 and 001011 exclusive or of secret information of oneself are obtained 111000 and announced with classical channel;Bob is incited somebody to action
To information 001011 and oneself 110011 exclusive or of secret information obtain 111000 and also announced with classical channel, Alice and Bob are public
The information of cloth is identical, illustrates that, without there is deception or attack, Alice and Bob realize that the equality of secret information is exchanged.
2) foundation of safety analysis model:
Quantum secret information equality exchanges the carry out information exchange that method is accomplished that two user security.As shown in Fig. 2,
In the exchange process of secret information, the attacker that faces of secret information exchange may have third-party attack, and (including preparation is wrong
GHZ state accidentally and announce false signal), the man-in-the-middle attack in communication process or intercept and capture multi-sending attack, participant's attack.
(1) third party attack:
In this agreement, third party is needed to do two pieces thing, first: correct preparation GHZ state;Second: Alice and Bob executes bubble
Benefit operation
Third party is returned to later, and third party correctly announces the result of the GHZ state of combined measurement.
Third party's preparationParticle 2 and particle 3 are simultaneously distributed to Alice and Bob by state, false
If third party attempts to prepare false GHZ state, the secret information exchange of Alice and Bob is destroyed, it will in verifying third party's identity
It is found in the process.It in the realization process of agreement, needs to authenticate third party, Alice and Bob receive 2 particles and 3 respectively
Some particles are randomly selected after particle to be verified.It is required that third party is measured with X base and classical channel is used to announce measurement
As a result, Alice and Bob receive the particle for also using X base to measure corresponding position after measurement result, and if third party announces |+> state,
The measurement result of Alice and Bob is identical;If third party announces | the measurement result of -> state, Alice and Bob are opposite.In satisfaction
Relationship is stated, then illustrates that third party is correctly prepared for GHZ state, otherwise there may be deceptions by third party.
If third party wants to prevent the secret information exchange between Alice and Bob, attacked using glitch, by S'2And S3'
With the sequence S of oneself1False GHZ state is announced after combined measurement, it is intended to so that Alice is obtained false secret information Y', similarly,
Bob obtains false secret information X '.Alice deduces information Y' according to the measurement result that third party announces, similarly, Bob according to
The measurement result that third party announces can deduce information X '.If Y' is not identical as Y, X ' is not identical as X, and Alice and Bob divide
Not Yong classical channel announce the result of Y' exclusive or X and the result of X ' exclusive or Y will be different, Alice and Bob will be apparent that third party
False information may be disclosed, but third party cannot accurately obtain the message of Alice and Bob.Such as third party obtains in table 1
|Ψ>aState, but it is not aware that the Pauli operation of Alice and Bob is 00 or 11, the quantity of binary bits is more, third
The probability that side obtains correct message is smaller.
(2) man-in-the-middle attack or intercepting and capturing multi-sending attack:
When channel is dangerous, it is understood that there may be man-in-the-middle attack intercepts and captures multi-sending attack.Alice and Bob receive particle it
Afterwards, need to carry out channel safety detection, third party announces the position for inveigling particle.Alice and Bob is by the particle of corresponding position
It extracting and measures and announce measurement result with X base or Z base, attacker will interfere particle once selecting wrong measurement base,
If different from the trick particle state of third party's insertion, illustrate there may be man-in-the-middle attack or intercept and capture multi-sending attack, the
Tripartite retransmits new GHZ state.Third-party process is returned to after Alice and Bob execution Pauli operation to also need to steal
Detection is listened, Alice and Bob can also be attacked by whether identical judge whether there is of result of Y' exclusive or X and X ' the exclusive or Y of announcement
The person of hitting, if there is attacker, then it is not the real secret of Bob that the GHZ state that Alice is announced by third party, which obtains information Y',
Confidential information Y, similarly, Bob obtain the real secret information X that information X ' is not Alice, therefore the result of Y' exclusive or X and X ' exclusive or Y
It will be different.Analysis is it is found that this agreement can effectively resist man-in-the-middle attack or intercept and capture multi-sending attack.
(3) participant attacks:
Assuming that Bob attempts to cheat Alice in communication process, Bob does not execute Pauli operation according to correct secret information Y.
Such as the secret information of Alice is " 01 ", the secret information of Bob is " 00 ", but Bob but executes σ to the particle received11Behaviour
Make, it is intended to gain the secret information of Alice by cheating.Particle after executing Pauli operation is returned to third party by Alice and Bob, the
Announced after tripartite's measurement | Ψ >fIf (Bob correctly execute Pauli operation should announce be | Ψ >e), Bob according to oneself
It is corresponding in secret information " 00 " and table 1 | Ψ >fIt obtains " 10 ", and the secret information of Alice is " 01 ", Bob can not pass through
This attack method obtains the secret information of Alice.
The measurement result of GHZ state after the operation of 1 Pauli of table
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real
It is existing.When using entirely or partly realizing in the form of a computer program product, the computer program product include one or
Multiple computer instructions.When loading on computers or executing the computer program instructions, entirely or partly generate according to
Process described in the embodiment of the present invention or function.The computer can be general purpose computer, special purpose computer, computer network
Network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or from one
Computer readable storage medium is transmitted to another computer readable storage medium, for example, the computer instruction can be from one
A web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)
Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center
Transmission).The computer-readable storage medium can be any usable medium or include one that computer can access
The data storage devices such as a or multiple usable mediums integrated server, data center.The usable medium can be magnetic Jie
Matter, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid
State Disk (SSD)) etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (9)
1. a kind of quantum secret information equality exchanges method, which is characterized in that the quantum secret information equality exchanges method packet
It includes:
GHZ state is prepared by third party, two particles in GHZ state are sent respectively to the first user and the second user of communication;
First user of the communication after receiving particle and second user are operated using Pauli is loaded into particle for secret information respectively
On, it returns again to third party;
The first user and second user of communication measure new GHZ state and announce measurement result;
The first user and second user of communication obtain the secret information of other side according to the measurement result of announcement.
2. quantum secret information equality as described in claim 1 exchanges method, which is characterized in that the quantum secret information is flat
In equal exchanges method, the first user possesses secret information X (x1,x2.......xn), second user possesses secret information Y (y1,
y2.......yn), each xiWith yiCorresponding two binary bits;It specifically includes:
The first step, the first user and second user inform third party, prepare m+n pairs by third party
State, by 1 all particle composition sequence S1;2 all particle composition sequence S2;3 all particle composition sequence S3;Third party
By sequence S1Oneself retains, in sequence S2With sequence S3Middle radom insertion inveigles particle | 0 >, | 1 >, |+>, | ->, then send out respectively
Give the first user and second user;
Laggard commit theft of particle that second step, the first user and second user receive third party's transmission listens detection, and third party announces and lures
Deceive particle position and corresponding measurement base, if insertion be | 0 > or | 1 > if announce Z base, if insertion be |+> or | ->
Then announce X base;First user and second user extract the particle of corresponding position with X base or the measurement of Z base;If measurement result
Mistake is higher than threshold value, then abandons communicating, otherwise carry out third step.
Third step authenticates third-party identity, and the first user and second user are randomly assigned m particle and corresponding particle
Position, it is desirable that third party is measured with X base and classical channel is used to announce measurement result, and the first user and second user receive
The particle of X base measurement corresponding position is used after measurement result;If third party is correctly prepared for GHZ state, meet third party's announcement |
When+> state, the first user is identical with the measurement result of second user;Third party announces | when -> state, the first user and second user
Measurement result it is opposite;If verifying third party is accurately prepared for GHZ state, the 4th step is carried out;
4th step, the first user executes four kinds of Paulis to n particle according to the secret information X of oneself and operates, if xiIt is held for 00
Row σ00Operation;If xiσ is executed for 0101Operation;If xiσ is executed for 1010Operation;If xiσ is executed for 1111Behaviour
Make;First user forms new sequence S' after executing Pauli operation2;
Similarly, second user forms new sequence S after executing Pauli operation according to the secret information Y of oneself3';First user exists
Sequence S'2Middle radom insertion inveigles particle | 0 >, | 1 >, |+>, | ->, it is then sent to third party, similarly, second user is random
The S of particle is inveigled in insertion3' it is also sent to third party;
5th step, after the particle that third party receives the first user and second user is sent, the first user and second user difference
Announce the position for inveigling particle and measurement base;
6th step, third party, which takes out, inveigles particle to obtain S' later2And S'3, then with the sequence S of oneself1Combined measurement, third
The GHZ state of Fang Gongbu measurement;
7th step, the first user obtain information Y' according to the measurement result that third party announces;Second user is announced according to third party
Measurement result obtain information X ';First user announces Y' exclusive or X's as a result, second user is public with classical channel with classical channel
Cloth X ' exclusive or Y's as a result, if the first user is identical with the content that second user is announced, not there is deception in third party;Then
One user obtains the secret information Y of second user, and second user obtains the secret information X of the first user.
3. quantum secret information equality as described in claim 1 exchanges method, which is characterized in that four kinds of Pauli matrices are as follows:
It is right | 0 > with | 1 > it executes four kinds of Paulis and operates to obtain following result:
8 kinds of GHZ states are as follows:
Entangled StateBeing expressed as follows under X base:
By (4) formula it is found that Entangled StateIn three particles have following relationship: when first particle is
State |+> when, second is identical with third particle state;When first particle is | when -> state, second and third particle shape
State is opposite;According to this characteristic for verify Entangled State whether be | Ψ >aState.
4. the computer program that a kind of quantum secret information equality is exchanged, which is characterized in that the quantum secret information equality is mutual
The computer program changed exchanges method for realizing quantum secret information equality described in claims 1 to 3 any one.
5. a kind of terminal, which is characterized in that the terminal, which is at least carried, realizes that quantum described in claims 1 to 3 any one is secret
The controller of confidential information equality exchange method.
6. a kind of computer readable storage medium, including instruction, when run on a computer, so that computer is executed as weighed
Benefit requires quantum secret information equality described in 1-3 any one to exchange method.
7. a kind of quantum secret information equality exchange system for realizing quantum secret information equality described in claim 1 and exchanging method
System, which is characterized in that the quantum secret information equality interchange system includes:
Third party prepares GHZ morphotype block, prepares GHZ state for third party, two particles in GHZ state are sent respectively to communicate
The first user and second user;
Third-party authentication module, for authenticating to third-party identity, the first user and second user refer at random
Determining the position of m particle and corresponding particle, it is desirable that third party is measured with X base and classical channel is used to announce measurement result, the
One user and second user receive the particle for using X base to measure corresponding position after measurement result;If third party is correctly prepared for
GHZ state meets third party's announcement | and when+> state, the first user is identical with the measurement result of second user;Third party announces | -> state
When, the measurement result of the first user and second user is opposite;
The double hairs of communication announce information modules, for after third party receives the first user and second user is sent particle, first
User and second user announce the position for inveigling particle and measurement base respectively;
Third party announces GHZ morphotype block, takes out for third party and obtains S' after inveigling particle2And S3', then with the sequence of oneself
Arrange S1Combined measurement announces the GHZ state of measurement;
First user of communication and second user information acquisition module, are obtained with the first user according to the measurement result that third party announces
Information Y' out;Second user obtains information X ' according to the measurement result that third party announces;First user announces Y' with classical channel
Exclusive or X's as a result, second user with classical channel announce X ' exclusive or Y's as a result, if what the first user and second user were announced
Content is identical, and third party does not have deception;Then the first user obtains the secret information Y of second user, and second user obtains
The secret information X of one user.
8. quantum secret information equality interchange system as claimed in claim 7, which is characterized in that the quantum secret information is flat
Equal interchange systems further comprise:
First user of communication and second user detection module receive the grain of third party's transmission for the first user and second user
Sub laggard commit theft listens detection, and third party announces the position for inveigling particle and corresponding measurement base;
Pauli operation module executes four kinds of Pauli operations to n particle according to the secret information X of oneself for the first user, the
Two users execute Pauli according to the secret information Y of oneself and operate to form new sequence S3'。
9. a kind of two-sided information Internet platform, which is characterized in that the two-sided information Internet platform at least carries power
Benefit requires quantum secret information equality interchange system described in 7~8 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811272430.3A CN109462473A (en) | 2018-10-30 | 2018-10-30 | A kind of quantum secret information equality exchange method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811272430.3A CN109462473A (en) | 2018-10-30 | 2018-10-30 | A kind of quantum secret information equality exchange method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109462473A true CN109462473A (en) | 2019-03-12 |
Family
ID=65608788
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811272430.3A Pending CN109462473A (en) | 2018-10-30 | 2018-10-30 | A kind of quantum secret information equality exchange method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109462473A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110572259A (en) * | 2019-08-06 | 2019-12-13 | 河北大学 | Third-party-free quantum information equality comparison method based on permutation operation |
CN111865588A (en) * | 2020-08-07 | 2020-10-30 | 西藏民族大学 | Efficient quantum secret information interchange method, system and storage medium |
CN111901112A (en) * | 2020-08-07 | 2020-11-06 | 西藏民族大学 | Quantum secret information equal exchange method, system and application based on dense coding |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014069984A1 (en) * | 2012-11-05 | 2014-05-08 | Mimos Berhad | Multi-user steganography based on greenberger-horne-zeilinger states |
CN103888476A (en) * | 2014-04-14 | 2014-06-25 | 西北大学 | Quantum secure direct communication protocol based on three-particle GHZ entangled state |
CN106533679A (en) * | 2017-01-18 | 2017-03-22 | 成都信息工程大学 | Quantum key distribution method based on GHZ state |
CN108540281A (en) * | 2018-04-28 | 2018-09-14 | 清华大学 | A kind of Quantum Secure Direct Communication system that measuring apparatus is unrelated |
CN108599933A (en) * | 2018-04-16 | 2018-09-28 | 河北大学 | A kind of two side's quantum information control methods based on bell bases |
CN111865588A (en) * | 2020-08-07 | 2020-10-30 | 西藏民族大学 | Efficient quantum secret information interchange method, system and storage medium |
CN111901112A (en) * | 2020-08-07 | 2020-11-06 | 西藏民族大学 | Quantum secret information equal exchange method, system and application based on dense coding |
-
2018
- 2018-10-30 CN CN201811272430.3A patent/CN109462473A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014069984A1 (en) * | 2012-11-05 | 2014-05-08 | Mimos Berhad | Multi-user steganography based on greenberger-horne-zeilinger states |
CN103888476A (en) * | 2014-04-14 | 2014-06-25 | 西北大学 | Quantum secure direct communication protocol based on three-particle GHZ entangled state |
CN106533679A (en) * | 2017-01-18 | 2017-03-22 | 成都信息工程大学 | Quantum key distribution method based on GHZ state |
CN108599933A (en) * | 2018-04-16 | 2018-09-28 | 河北大学 | A kind of two side's quantum information control methods based on bell bases |
CN108540281A (en) * | 2018-04-28 | 2018-09-14 | 清华大学 | A kind of Quantum Secure Direct Communication system that measuring apparatus is unrelated |
CN111865588A (en) * | 2020-08-07 | 2020-10-30 | 西藏民族大学 | Efficient quantum secret information interchange method, system and storage medium |
CN111901112A (en) * | 2020-08-07 | 2020-11-06 | 西藏民族大学 | Quantum secret information equal exchange method, system and application based on dense coding |
Non-Patent Citations (3)
Title |
---|
FEI GAO ET AL.: "《Postprocessing of the Oblivious Key in Quantum Private Query》", 《IEEE JOURNAL OF SECLECTED TOPICS IN QUANTUM ELECTRONICS》 * |
YING-HUA JIANG ET AL.: "《Quantum secret information equal exchange protocol base on dense coding》", 《WORLD SCIENTIFIC》 * |
邵婷婷等: "《可验证第三方的量子秘密信息平等互换协议》", 《计算机应用研究》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110572259A (en) * | 2019-08-06 | 2019-12-13 | 河北大学 | Third-party-free quantum information equality comparison method based on permutation operation |
CN111865588A (en) * | 2020-08-07 | 2020-10-30 | 西藏民族大学 | Efficient quantum secret information interchange method, system and storage medium |
CN111901112A (en) * | 2020-08-07 | 2020-11-06 | 西藏民族大学 | Quantum secret information equal exchange method, system and application based on dense coding |
CN111865588B (en) * | 2020-08-07 | 2022-12-02 | 西藏民族大学 | Efficient quantum secret information interchange method, system and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Choo et al. | Examining indistinguishability-based proof models for key establishment protocols | |
CN110233868A (en) | A kind of edge calculations data safety and method for secret protection based on Fabric | |
Nakhila et al. | Parallel active dictionary attack on WPA2-PSK Wi-Fi networks | |
CN108965230A (en) | A kind of safety communicating method, system and terminal device | |
Yang et al. | Arbitrated quantum signature with an untrusted arbitrator | |
CN109462473A (en) | A kind of quantum secret information equality exchange method and system | |
CN109729523A (en) | A kind of method and apparatus of terminal networking certification | |
CN109327308A (en) | A kind of quantum key delivering method and system with bidirectional identity authentication function | |
Hu et al. | A session hijacking attack against a device-assisted physical-layer key agreement | |
CN110071814A (en) | A kind of quantum Proxy Signature method and system based on Bell state entanglement transfer | |
Singh et al. | On the IEEE 802.11 i security: a denial‐of‐service perspective | |
Zhang et al. | Formal verification of 5G-EAP-TLS authentication protocol | |
Benssalah et al. | Security enhancement of the authenticated RFID security mechanism based on chaotic maps | |
CN110635907B (en) | Controlled quantum conversation method with identity authentication function based on GHZ-like state | |
CN113452690A (en) | Power grid data transmission method, device, system and medium | |
CN113849815A (en) | Unified identity authentication platform based on zero trust and confidential calculation | |
Indushree et al. | Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks | |
Yang et al. | A new anonymous password-based authenticated key exchange protocol | |
CN114024672A (en) | Safety protection method and system for low-voltage power line carrier communication system | |
CN109600357A (en) | A kind of distributed identity authentication system, method and server | |
CN109495262A (en) | With the quantum key delivering method of dense coding characteristic in quantum communication network | |
Lee et al. | Using random bit authentication to defend IEEE 802.11 DoS attacks | |
CN109522689A (en) | Multiple-factor strong identity authentication method under mobile office environment | |
CN109167663A (en) | A kind of multi-user quantum cryptographic key distribution method and system based on dense coding | |
Teyou et al. | Solving downgrade and dos attack due to the four ways handshake vulnerabilities (WIFI) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20220701 |
|
AD01 | Patent right deemed abandoned |