CN109462473A - A kind of quantum secret information equality exchange method and system - Google Patents

A kind of quantum secret information equality exchange method and system Download PDF

Info

Publication number
CN109462473A
CN109462473A CN201811272430.3A CN201811272430A CN109462473A CN 109462473 A CN109462473 A CN 109462473A CN 201811272430 A CN201811272430 A CN 201811272430A CN 109462473 A CN109462473 A CN 109462473A
Authority
CN
China
Prior art keywords
user
party
particle
secret information
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811272430.3A
Other languages
Chinese (zh)
Inventor
张仕斌
梁鲭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Huaan Yongxin Information Technology Co Ltd
Original Assignee
Chengdu Huaan Yongxin Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Huaan Yongxin Information Technology Co Ltd filed Critical Chengdu Huaan Yongxin Information Technology Co Ltd
Priority to CN201811272430.3A priority Critical patent/CN109462473A/en
Publication of CN109462473A publication Critical patent/CN109462473A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to technical field of network information, disclose a kind of quantum secret information equality exchange method and system, prepare GHZ state by third party, two particles in GHZ state are sent respectively to the first user and the second user of communication;First user of the communication after receiving particle and second user are operated using Pauli is loaded into secret information on particle respectively, returns again to third party;The first user and second user of communication measure new GHZ state and announce measurement result;The first user and second user of communication obtain the secret information of other side according to the measurement result of announcement.The first user and second user that the present invention communicates measure new GHZ state and announce measurement result;The first user and second user of communication can deduce the secret information of other side according to the measurement result of announcement;It can ensure that third party is safe and reliable, meanwhile, this method is able to carry out detection eavesdropping during realization, resists and intercepts and captures multi-sending attack, man-in-the-middle attack and participant's attack.

Description

A kind of quantum secret information equality exchange method and system
Technical field
Method is exchanged the invention belongs to technical field of network information more particularly to a kind of quantum secret information equality and is System.
Background technique
Currently, the prior art commonly used in the trade is such that
In actual life, if two users respectively possess a secret information, user 1 goes for the secret of user 2 Information, while user 2 goes for the secret information of user 1, two users can be obtained more by the exchange of secret information Information.But during information exchange, previous communication means is usually that user 1 sends secret information to user first 2, after user 2 acknowledges receipt of secret information, the secret information of oneself is just sent to user 1.This secret information exchange There are risks for mode, it is possible to user 2 obtains the secret information of user 1, but user cheating 1, send false secret information to Family 1.What user 1 obtained is false secret information, but the secret information of oneself has been leaked to user 2.
Such as Liang Ge company wants win-win progress, shares the advantageous resource of company, but Liang Ge company all refuses to send out first Give the classified information of oneself company, it is assumed that company 1 sends secret information to company 2 first, and company 2 obtains the secret letter of company 1 Breath, but refusal sends secret information to company 1.
In conclusion problem of the existing technology is:
In the prior art, the both sides of communication cannot be made while obtaining the secret information of other side, can not achieve secret information Equality is exchanged;
In the prior art, third party is not introduced, while third-party identity cannot be verified;
Detection eavesdropping can not be carried out in information interactive process, resisted and intercepted and captured multi-sending attack, man-in-the-middle attack and participation Person's attack.
Solve the meaning of above-mentioned technical problem:
Third party is introduced, GHZ state is prepared by third party, two particles therein are sent respectively to the both sides of communication, is led to First user of letter and second user carry out Pauli operation to the particle received respectively, are then sent to third party.Third party couple New GHZ state measures and announces measurement result, and the first user of communication and second user deduce the secret of other side simultaneously Information.
Third-party identity can be authenticated, it is ensured that third party correctly prepares GHZ state, and third party is responsible for carrying out particle Distribution and measurement, but secret information cannot be obtained.
Summary of the invention
In view of the problems of the existing technology, method is exchanged the present invention provides a kind of quantum secret information equality and be System.The quantum secret information equality that the present invention designs, which exchanges method, may be implemented the secret information for obtaining other side simultaneously, be a kind of The Information Exchange Agreement of equality.
The invention is realized in this way a kind of quantum secret information equality exchanges method, the quantum secret information equality Exchange method includes:
GHZ state is prepared by third party, two particles in GHZ state are sent respectively to the first user of communication and second and are used Family;
First user of the communication after receiving particle and second user are operated using Pauli is loaded into secret information respectively On particle, return again to third party;
The first user and second user of communication measure new GHZ state and announce measurement result;
The first user and second user of communication obtain the secret information of other side according to the measurement result of announcement.
Further, in the quantum secret information equality exchange method, the first user possesses secret information X (x1, x2.......xn), second user possesses secret information Y (y1,y2.......yn), wherein each xiTwo binary systems corresponding with yi Bit;It specifically includes:
The first step, the first user and second user inform third party, prepare m+n pairs by third partyState, by 1 all particle composition sequence S1;2 all particle composition sequence S2;All 3 Particle composition sequence S3;Third party is by sequence S1Oneself retains, in sequence S2With sequence S3Middle radom insertion inveigles particle | 0 >, | 1 >, |+>, | ->, then it is sent respectively to the first user and second user;
Laggard commit theft of particle that second step, the first user and second user receive third party's transmission listens detection, and third party is public Cloth inveigle particle position and corresponding measurement base, if insertion be | 0 > or | 1 > if announce Z base, if insertion be |+> Or | -> then announce X base;First user and second user extract the particle of corresponding position with X base or the measurement of Z base;If surveying It measures result mistake and is higher than threshold value, then abandon communicating, otherwise carry out third step.
Third step authenticates third-party identity, and the first user and second user are randomly assigned m particle and correspondence The position of particle, it is desirable that third party is measured with X base and classical channel is used to announce measurement result, the first user and second user Receive the particle for using X base to measure corresponding position after measurement result;If third party is correctly prepared for GHZ state, meet third party Announce | when+> state, the first user is identical with the measurement result of second user;Third party announces | when -> state, the first user and second The measurement result of user is opposite;If verifying third party is accurately prepared for GHZ state, the 4th step is carried out;
4th step, the first user executes four kinds of Paulis to n particle according to the secret information X of oneself and operates, if xiFor 00 executes σ00Operation;If xiσ is executed for 0101Operation;If xiσ is executed for 1010Operation;If xiIt is executed for 11 σ11Operation.Alice forms new sequence S' after executing Pauli operation2
Similarly, second user forms new sequence S after executing Pauli operation according to the secret information Y of oneself3';First User is in sequence S'2Middle radom insertion inveigles particle | 0 >, | 1 >, |+>, | ->, it is then sent to third party, similarly, second user Radom insertion is inveigled the S of particle3' it is also sent to third party;
5th step, after third party receives the particle that Alice and Bob are sent, the first user and second user are announced respectively Inveigle position and the measurement base of particle;
6th step, third party, which takes out, inveigles particle to obtain S' later2And S3', then with the sequence S of oneself1Combined measurement, Third party announces the GHZ state of measurement;
7th step, the first user obtain information Y' according to the measurement result that third party announces;Bob is announced according to third party Measurement result obtains information X ';First user announces Y' exclusive or X's as a result, second user is announced with classical channel with classical channel X ' exclusive or Y's as a result, if the first user is identical with the content that second user is announced, not there is deception in third party;Then first User obtains the secret information Y of second user, and second user obtains the secret information X of the first user.
Further, four kinds of Pauli matrices are as follows:
It is right | 0 > with | 1 > it executes four kinds of Paulis and operates to obtain following result:
8 kinds of GHZ states are as follows:
Entangled StateBeing expressed as follows under X base:
By (4) formula it is found that Entangled StateIn three particles have following relationship: when first grain Son is state |+> when, second is identical with third particle state;When first particle is | when -> state, second and third grain Sub- state is opposite;According to this characteristic for verify Entangled State whether be | Ψ >aState.
Another object of the present invention is to provide the computer program that a kind of quantum secret information equality is exchanged, the quantum The computer program that secret information equality is exchanged exchanges method for realizing the quantum secret information equality.
Another object of the present invention is to provide a kind of terminal, the terminal, which is at least carried, realizes the quantum secret information The controller of equality exchange method.
Another object of the present invention is to provide a kind of computer readable storage mediums, including instruction, when it is in computer When upper operation, so that computer executes the quantum secret information equality and exchanges method.
Another object of the present invention is to provide a kind of quantum for realizing the quantum secret information equality exchange method is secret Confidential information equality interchange system, the quantum secret information equality interchange system include:
Third party prepares GHZ morphotype block, prepares GHZ state for third party, two particles in GHZ state are sent respectively to First user of communication and second user;
Third-party authentication module, for being authenticated to third-party identity, the first user and second user with Machine specifies the position of m particle and corresponding particle, it is desirable that third party is measured with X base and classical channel is used to announce measurement knot Fruit, the first user and second user receive the particle for using X base to measure corresponding position after measurement result;If third party correctly makes For GHZ state, meeting third party's announcement | when+> state, the first user is identical with the measurement result of second user;Third party announces |- When > state, the measurement result of the first user and second user is opposite;
The double hairs of communication announce information modules, for after third party receives the first user and second user is sent particle, First user and second user announce the position for inveigling particle and measurement base respectively;
Third party announces GHZ morphotype block, takes out for third party and obtains S' after inveigling particle2And S3', then with oneself Sequence S1Combined measurement announces the GHZ state of measurement;
First user of communication and second user information acquisition module, the measurement knot announced with the first user according to third party Fruit obtains information Y';Bob obtains information X ' according to the measurement result that third party announces;First user is different with classical channel announcement Y' Or X's as a result, second user with classical channel announce X ' exclusive or Y's as a result, if the first user and second user announce it is interior Hold identical, third party's not presence deception;Then the first user obtains the secret information Y of second user, and second user obtains first The secret information X of user.
Further, the quantum secret information equality interchange system further comprises:
First user of communication and second user detection module receive third party for the first user and second user and send Laggard commit theft of particle listen detection, third party announce inveigle particle position and corresponding measurement base;
Pauli operation module executes four kinds of Pauli behaviour to n particle according to the secret information X of oneself for the first user Make, second user executes Pauli according to the secret information Y of oneself and operates to form new sequence S3'。
Another object of the present invention is to provide a kind of two-sided information Internet platform, the two-sided information Internet Platform at least carries the quantum secret information equality interchange system.
In conclusion advantages of the present invention and good effect are as follows:
The present invention prepares GHZ state by third party first, and two particles therein are sent respectively to the first user of communication And second user.Although introducing third party, third-party identity can be verified, reduce to it is third-party according to Rely.First user of the communication after receiving particle and second user are operated using Pauli is loaded into particle for secret information respectively On, it returns again to third party, the first user of communication and second user measure new GHZ state and announce measurement result. The first user and second user of communication can deduce the secret information of other side according to the measurement result of announcement.This method can be with Make the both sides of communication while obtaining the secret information of other side, realizes that the equality of secret information is exchanged, avoid secret information exchanged Cheat the case where another party in the side Cheng Zhongyi.By analyzing it is found that third-party identity can be verified, it can be ensured that third party is It is safe and reliable, meanwhile, this method is able to carry out detection eavesdropping during realization, resists and intercepts and captures multi-sending attack, go-between attacks It hits and is attacked with participant.
Detailed description of the invention
Fig. 1 is that quantum secret information equality provided in an embodiment of the present invention exchanges method flow diagram.
Fig. 2 is the equality information exchange flow chart provided in an embodiment of the present invention that there is attack.
Fig. 3 is quantum secret information equality interchange system schematic diagram provided in an embodiment of the present invention.
In figure: 1, third party prepares GHZ morphotype block;2, the first user communicated and second user detection module;3, third The authentication module of side;4, Pauli operation module;5, the double hairs of communication announce information module;6, third party announces GHZ morphotype block; 7, the first user communicated and second user information acquisition module.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to Limit the present invention.
In the prior art, the both sides of communication cannot be made while obtaining the secret information of other side, can not achieve secret information Equality is exchanged;
In the prior art, third party is not introduced, while third-party identity cannot be verified.
The present invention prepares GHZ state by third party, and two particles therein are sent respectively to the both sides of communication.The of communication One user and second user carry out Pauli operation to the particle received respectively, are then sent to third party.Third party is to new GHZ State measures and announces measurement result, and the first user of communication and second user can be deduced according to the measurement result of announcement The secret information of other side.This method can make the both sides of communication while obtain the secret information of other side, realize the flat of secret information Deng exchange, a case where side cheats another party in secret information exchange process is avoided.
In quantum secret information equality exchange method provided in an embodiment of the present invention, it is related to:
Four kinds of Pauli matrices are as follows:
It is right | 0 > with | 1 > it executes four kinds of Paulis and operates to obtain following result:
8 kinds of GHZ states are as follows:
Entangled StateBeing expressed as follows under X base:
By (4) formula it is found that Entangled StateIn three particles have following relationship: when first grain Son is state |+> when, second is identical with third particle state;When first particle is | when -> state, second and third grain Sub- state is opposite.According to this characteristic can verify an Entangled State whether be | Ψ >aState.
Such as Fig. 3, this hair provides a kind of quantum secret information equality realized the quantum secret information equality and exchange method Interchange system, the quantum secret information equality interchange system include:
Third party prepares GHZ morphotype block 1, prepares GHZ state for third party, two particles in GHZ state are sent respectively To the first user of communication and second user;
First user of communication and second user detection module 2 receive third party's hair for the first user and second user Laggard commit theft of the particle sent listens detection, and third party announces the position for inveigling particle and corresponding measurement base;
Third-party authentication module 3, for being authenticated to third-party identity, the first user and second user with Machine specifies the position of m particle and corresponding particle, it is desirable that third party is measured with X base and classical channel is used to announce measurement knot Fruit, the first user and second user receive the particle for using X base to measure corresponding position after measurement result;If third party correctly makes For GHZ state, meeting third party's announcement | when+> state, the first user is identical with the measurement result of second user;Third party announces |- When > state, the measurement result of the first user and second user is opposite;
Pauli operation module 4 executes four kinds of Pauli behaviour to n particle according to the secret information X of oneself for the first user Make, second user executes Pauli according to the secret information Y of oneself and operates to form new sequence S3'。
The double hairs of communication announce information modules 5, for after third party receives the first user and second user is sent particle, First user and second user announce the position for inveigling particle and measurement base respectively;
Third party announces GHZ morphotype block 6, takes out for third party and obtains S' after inveigling particle2And S3', then with oneself Sequence S1Combined measurement announces the GHZ state of measurement;
First user of communication and second user information acquisition module 7, the measurement announced with the first user according to third party As a result information Y' is obtained;Bob obtains information X ' according to the measurement result that third party announces;First user announces Y' with classical channel Exclusive or X's as a result, second user with classical channel announce X ' exclusive or Y's as a result, if what the first user and second user were announced Content is identical, and third party does not have deception;Then the first user obtains the secret information Y of second user, and second user obtains The secret information X of one user.
The invention will be further described combined with specific embodiments below.
Embodiment:
Fig. 1, quantum secret information equality provided in an embodiment of the present invention exchange method, comprising:
Alice possesses secret information X (x1,x2.......xn), Bob possesses secret information Y (y1, y2.......yn), In each xiWith yiCorresponding two binary bits.Alice and Bob wants to carry out the exchange of secret information, and agreement is as follows:
(1) Alice and Bob informs third party, prepares m+n pairs by third partyState, by institute 1 particle composition sequence S having1;2 all particle composition sequence S2;3 all particle composition sequence S3.Third party is by sequence S1 Oneself retains, in sequence S2With sequence S3Middle radom insertion inveigles particle | 0 >, | 1 >, |+>, | ->, then it is sent respectively to Alice And Bob.
(2) laggard commit theft of particle that Alice and Bob receives third party's transmission listens detection, and third party, which announces, inveigles particle Position and corresponding measurement base, if insertion be | 0 > or | 1 > if announce Z base, if insertion be |+> or | -> if announce X Base.Alice and Bob extracts the particle of corresponding position with X base or the measurement of Z base.If measurement result mistake is higher than threshold value, It abandons communicating, otherwise carries out (3) step.
(3) third-party identity being authenticated, Alice and Bob are randomly assigned m particle and correspond to the position of particle, It is required that third party is measured with X base and classical channel is used to announce measurement result, Alice and Bob are received after measurement result With the particle of X base measurement corresponding position.If third party is correctly prepared for GHZ state, it should meet third party's announcement | when+> state, The measurement result of Alice and Bob is identical;Third party announces | and when -> state, the measurement result of Alice and Bob are opposite.If verifying Third party is accurately prepared for GHZ state, then carries out (4) step.
(4) Alice executes four kinds of Pauli operations to n particle according to the secret information X of oneself, if xiIt is executed for 00 σ00Operation;If xiσ is executed for 0101Operation;If xiσ is executed for 1010Operation;If xiσ is executed for 1111Operation. Alice forms new sequence S' after executing Pauli operation2, similarly, Bob executes Pauli according to the secret information Y of oneself and operates New sequence S is formed later3'.Alice radom insertion in sequence S'2 inveigles particle | 0 >, | 1 >, |+>, | ->, then send To third party, similarly, Bob inveigles radom insertion the S of particle3' it is also sent to third party.
(5) after third party receives the particle that Alice and Bob are sent, Alice and Bob announce the position for inveigling particle respectively Base is set and measures, the mode announced with (2) step third party is identical.
(6) third party, which takes out, inveigles particle to obtain S' later2And S3', then with the sequence S of oneself1Combined measurement, measurement The results are shown in Table 1, and third party announces the GHZ state of measurement.
(7) Alice can deduce information Y' according to the measurement result that 1 third party of table announces, and similarly, Bob is according to third The measurement result of Fang Gongbu can deduce information X '.Alice announces Y' exclusive or X's as a result, the classical letter of Bob with classical channel X ' exclusive or Y's as a result, if the content announced of the two is identical is announced in road, illustrates that third party does not have deception, Alice obtains The secret information Y, Bob of Bob obtains the secret information X of Alice.
Fig. 2 is the equality information exchange flow chart provided in an embodiment of the present invention that there is attack.
Below with reference to concrete analysis, the invention will be further described.
1) Correctness Analysis of agreement:
If the both sides Alice and Bob of communication want to carry out the exchange of secret information, GHZ state is prepared by third partyParticle 2 is sent to Alice, particle 3 is sent to Bob.Alice and Bob are according to secret Information carries out Pauli operation to particle, is then sent to third party, third party by the particle in the particle of return and oneself hand into Row measures and announces measurement result.The measurement result and the secret information of oneself announced such as table 1, Alice according to third party can The secret information of Bob is deduced, similarly, Bob can also deduce the secret information of Alice.The simplification that secret information equality is exchanged Flow chart is as shown in Figure 1.
Agreement citing: assuming that Alice possesses secret information 001011, Bob possesses secret information 110011.Alice and Bob It informs third party, prepares m+n pairs by third partyState inveigles 2 all particle radom insertions It is sent to Alice after particle, is sent to Bob after 3 all particle radom insertions are inveigled particle.Alice and Bob receive third Laggard commit theft of the particle just sent listens detection, it was demonstrated that verifies after channel safety to third-party identity.Alice and Bob It is randomly assigned the position of particle, it is desirable that third party is measured with X base, when what third party announced is | when+> state, Alice and Bob The measurement result measured with X base is identical.When what third party announced is | when -> state, measurement result that Alice and Bob are measured with X base On the contrary.After verifying third party correctly prepares GHZ state, secret information is loaded on respective particle by Alice and Bob respectively. Alice executes σ to 2 particles respectively00、σ10、σ11Operation;Bob executes σ to 3 particles respectively11、σ00、σ11Operation.Alice and Bob Particle is inveigled to be sent to third party later the particle insertion executed after Pauli operates.Third party receives particle, detection eavesdropping Particle will be inveigled to extract later, combines all particles 1 and carry out GHZ measurement.Announce measurement result | Ψ >b|Ψ>d|Ψ>a, According to the measurement result of GHZ state after the operation of 1 Pauli of table, Alice obtains information 110011, and Bob obtains information 001011.Alice Obtained information 110011 and 001011 exclusive or of secret information of oneself are obtained 111000 and announced with classical channel;Bob is incited somebody to action To information 001011 and oneself 110011 exclusive or of secret information obtain 111000 and also announced with classical channel, Alice and Bob are public The information of cloth is identical, illustrates that, without there is deception or attack, Alice and Bob realize that the equality of secret information is exchanged.
2) foundation of safety analysis model:
Quantum secret information equality exchanges the carry out information exchange that method is accomplished that two user security.As shown in Fig. 2, In the exchange process of secret information, the attacker that faces of secret information exchange may have third-party attack, and (including preparation is wrong GHZ state accidentally and announce false signal), the man-in-the-middle attack in communication process or intercept and capture multi-sending attack, participant's attack.
(1) third party attack:
In this agreement, third party is needed to do two pieces thing, first: correct preparation GHZ state;Second: Alice and Bob executes bubble Benefit operation
Third party is returned to later, and third party correctly announces the result of the GHZ state of combined measurement.
Third party's preparationParticle 2 and particle 3 are simultaneously distributed to Alice and Bob by state, false If third party attempts to prepare false GHZ state, the secret information exchange of Alice and Bob is destroyed, it will in verifying third party's identity It is found in the process.It in the realization process of agreement, needs to authenticate third party, Alice and Bob receive 2 particles and 3 respectively Some particles are randomly selected after particle to be verified.It is required that third party is measured with X base and classical channel is used to announce measurement As a result, Alice and Bob receive the particle for also using X base to measure corresponding position after measurement result, and if third party announces |+> state, The measurement result of Alice and Bob is identical;If third party announces | the measurement result of -> state, Alice and Bob are opposite.In satisfaction Relationship is stated, then illustrates that third party is correctly prepared for GHZ state, otherwise there may be deceptions by third party.
If third party wants to prevent the secret information exchange between Alice and Bob, attacked using glitch, by S'2And S3' With the sequence S of oneself1False GHZ state is announced after combined measurement, it is intended to so that Alice is obtained false secret information Y', similarly, Bob obtains false secret information X '.Alice deduces information Y' according to the measurement result that third party announces, similarly, Bob according to The measurement result that third party announces can deduce information X '.If Y' is not identical as Y, X ' is not identical as X, and Alice and Bob divide Not Yong classical channel announce the result of Y' exclusive or X and the result of X ' exclusive or Y will be different, Alice and Bob will be apparent that third party False information may be disclosed, but third party cannot accurately obtain the message of Alice and Bob.Such as third party obtains in table 1 |Ψ>aState, but it is not aware that the Pauli operation of Alice and Bob is 00 or 11, the quantity of binary bits is more, third The probability that side obtains correct message is smaller.
(2) man-in-the-middle attack or intercepting and capturing multi-sending attack:
When channel is dangerous, it is understood that there may be man-in-the-middle attack intercepts and captures multi-sending attack.Alice and Bob receive particle it Afterwards, need to carry out channel safety detection, third party announces the position for inveigling particle.Alice and Bob is by the particle of corresponding position It extracting and measures and announce measurement result with X base or Z base, attacker will interfere particle once selecting wrong measurement base, If different from the trick particle state of third party's insertion, illustrate there may be man-in-the-middle attack or intercept and capture multi-sending attack, the Tripartite retransmits new GHZ state.Third-party process is returned to after Alice and Bob execution Pauli operation to also need to steal Detection is listened, Alice and Bob can also be attacked by whether identical judge whether there is of result of Y' exclusive or X and X ' the exclusive or Y of announcement The person of hitting, if there is attacker, then it is not the real secret of Bob that the GHZ state that Alice is announced by third party, which obtains information Y', Confidential information Y, similarly, Bob obtain the real secret information X that information X ' is not Alice, therefore the result of Y' exclusive or X and X ' exclusive or Y It will be different.Analysis is it is found that this agreement can effectively resist man-in-the-middle attack or intercept and capture multi-sending attack.
(3) participant attacks:
Assuming that Bob attempts to cheat Alice in communication process, Bob does not execute Pauli operation according to correct secret information Y. Such as the secret information of Alice is " 01 ", the secret information of Bob is " 00 ", but Bob but executes σ to the particle received11Behaviour Make, it is intended to gain the secret information of Alice by cheating.Particle after executing Pauli operation is returned to third party by Alice and Bob, the Announced after tripartite's measurement | Ψ >fIf (Bob correctly execute Pauli operation should announce be | Ψ >e), Bob according to oneself It is corresponding in secret information " 00 " and table 1 | Ψ >fIt obtains " 10 ", and the secret information of Alice is " 01 ", Bob can not pass through This attack method obtains the secret information of Alice.
The measurement result of GHZ state after the operation of 1 Pauli of table
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real It is existing.When using entirely or partly realizing in the form of a computer program product, the computer program product include one or Multiple computer instructions.When loading on computers or executing the computer program instructions, entirely or partly generate according to Process described in the embodiment of the present invention or function.The computer can be general purpose computer, special purpose computer, computer network Network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or from one Computer readable storage medium is transmitted to another computer readable storage medium, for example, the computer instruction can be from one A web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL) Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center Transmission).The computer-readable storage medium can be any usable medium or include one that computer can access The data storage devices such as a or multiple usable mediums integrated server, data center.The usable medium can be magnetic Jie Matter, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid State Disk (SSD)) etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (9)

1. a kind of quantum secret information equality exchanges method, which is characterized in that the quantum secret information equality exchanges method packet It includes:
GHZ state is prepared by third party, two particles in GHZ state are sent respectively to the first user and the second user of communication;
First user of the communication after receiving particle and second user are operated using Pauli is loaded into particle for secret information respectively On, it returns again to third party;
The first user and second user of communication measure new GHZ state and announce measurement result;
The first user and second user of communication obtain the secret information of other side according to the measurement result of announcement.
2. quantum secret information equality as described in claim 1 exchanges method, which is characterized in that the quantum secret information is flat In equal exchanges method, the first user possesses secret information X (x1,x2.......xn), second user possesses secret information Y (y1, y2.......yn), each xiWith yiCorresponding two binary bits;It specifically includes:
The first step, the first user and second user inform third party, prepare m+n pairs by third party State, by 1 all particle composition sequence S1;2 all particle composition sequence S2;3 all particle composition sequence S3;Third party By sequence S1Oneself retains, in sequence S2With sequence S3Middle radom insertion inveigles particle | 0 >, | 1 >, |+>, | ->, then send out respectively Give the first user and second user;
Laggard commit theft of particle that second step, the first user and second user receive third party's transmission listens detection, and third party announces and lures Deceive particle position and corresponding measurement base, if insertion be | 0 > or | 1 > if announce Z base, if insertion be |+> or | -> Then announce X base;First user and second user extract the particle of corresponding position with X base or the measurement of Z base;If measurement result Mistake is higher than threshold value, then abandons communicating, otherwise carry out third step.
Third step authenticates third-party identity, and the first user and second user are randomly assigned m particle and corresponding particle Position, it is desirable that third party is measured with X base and classical channel is used to announce measurement result, and the first user and second user receive The particle of X base measurement corresponding position is used after measurement result;If third party is correctly prepared for GHZ state, meet third party's announcement | When+> state, the first user is identical with the measurement result of second user;Third party announces | when -> state, the first user and second user Measurement result it is opposite;If verifying third party is accurately prepared for GHZ state, the 4th step is carried out;
4th step, the first user executes four kinds of Paulis to n particle according to the secret information X of oneself and operates, if xiIt is held for 00 Row σ00Operation;If xiσ is executed for 0101Operation;If xiσ is executed for 1010Operation;If xiσ is executed for 1111Behaviour Make;First user forms new sequence S' after executing Pauli operation2
Similarly, second user forms new sequence S after executing Pauli operation according to the secret information Y of oneself3';First user exists Sequence S'2Middle radom insertion inveigles particle | 0 >, | 1 >, |+>, | ->, it is then sent to third party, similarly, second user is random The S of particle is inveigled in insertion3' it is also sent to third party;
5th step, after the particle that third party receives the first user and second user is sent, the first user and second user difference Announce the position for inveigling particle and measurement base;
6th step, third party, which takes out, inveigles particle to obtain S' later2And S'3, then with the sequence S of oneself1Combined measurement, third The GHZ state of Fang Gongbu measurement;
7th step, the first user obtain information Y' according to the measurement result that third party announces;Second user is announced according to third party Measurement result obtain information X ';First user announces Y' exclusive or X's as a result, second user is public with classical channel with classical channel Cloth X ' exclusive or Y's as a result, if the first user is identical with the content that second user is announced, not there is deception in third party;Then One user obtains the secret information Y of second user, and second user obtains the secret information X of the first user.
3. quantum secret information equality as described in claim 1 exchanges method, which is characterized in that four kinds of Pauli matrices are as follows:
It is right | 0 > with | 1 > it executes four kinds of Paulis and operates to obtain following result:
8 kinds of GHZ states are as follows:
Entangled StateBeing expressed as follows under X base:
By (4) formula it is found that Entangled StateIn three particles have following relationship: when first particle is State |+> when, second is identical with third particle state;When first particle is | when -> state, second and third particle shape State is opposite;According to this characteristic for verify Entangled State whether be | Ψ >aState.
4. the computer program that a kind of quantum secret information equality is exchanged, which is characterized in that the quantum secret information equality is mutual The computer program changed exchanges method for realizing quantum secret information equality described in claims 1 to 3 any one.
5. a kind of terminal, which is characterized in that the terminal, which is at least carried, realizes that quantum described in claims 1 to 3 any one is secret The controller of confidential information equality exchange method.
6. a kind of computer readable storage medium, including instruction, when run on a computer, so that computer is executed as weighed Benefit requires quantum secret information equality described in 1-3 any one to exchange method.
7. a kind of quantum secret information equality exchange system for realizing quantum secret information equality described in claim 1 and exchanging method System, which is characterized in that the quantum secret information equality interchange system includes:
Third party prepares GHZ morphotype block, prepares GHZ state for third party, two particles in GHZ state are sent respectively to communicate The first user and second user;
Third-party authentication module, for authenticating to third-party identity, the first user and second user refer at random Determining the position of m particle and corresponding particle, it is desirable that third party is measured with X base and classical channel is used to announce measurement result, the One user and second user receive the particle for using X base to measure corresponding position after measurement result;If third party is correctly prepared for GHZ state meets third party's announcement | and when+> state, the first user is identical with the measurement result of second user;Third party announces | -> state When, the measurement result of the first user and second user is opposite;
The double hairs of communication announce information modules, for after third party receives the first user and second user is sent particle, first User and second user announce the position for inveigling particle and measurement base respectively;
Third party announces GHZ morphotype block, takes out for third party and obtains S' after inveigling particle2And S3', then with the sequence of oneself Arrange S1Combined measurement announces the GHZ state of measurement;
First user of communication and second user information acquisition module, are obtained with the first user according to the measurement result that third party announces Information Y' out;Second user obtains information X ' according to the measurement result that third party announces;First user announces Y' with classical channel Exclusive or X's as a result, second user with classical channel announce X ' exclusive or Y's as a result, if what the first user and second user were announced Content is identical, and third party does not have deception;Then the first user obtains the secret information Y of second user, and second user obtains The secret information X of one user.
8. quantum secret information equality interchange system as claimed in claim 7, which is characterized in that the quantum secret information is flat Equal interchange systems further comprise:
First user of communication and second user detection module receive the grain of third party's transmission for the first user and second user Sub laggard commit theft listens detection, and third party announces the position for inveigling particle and corresponding measurement base;
Pauli operation module executes four kinds of Pauli operations to n particle according to the secret information X of oneself for the first user, the Two users execute Pauli according to the secret information Y of oneself and operate to form new sequence S3'。
9. a kind of two-sided information Internet platform, which is characterized in that the two-sided information Internet platform at least carries power Benefit requires quantum secret information equality interchange system described in 7~8 any one.
CN201811272430.3A 2018-10-30 2018-10-30 A kind of quantum secret information equality exchange method and system Pending CN109462473A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811272430.3A CN109462473A (en) 2018-10-30 2018-10-30 A kind of quantum secret information equality exchange method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811272430.3A CN109462473A (en) 2018-10-30 2018-10-30 A kind of quantum secret information equality exchange method and system

Publications (1)

Publication Number Publication Date
CN109462473A true CN109462473A (en) 2019-03-12

Family

ID=65608788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811272430.3A Pending CN109462473A (en) 2018-10-30 2018-10-30 A kind of quantum secret information equality exchange method and system

Country Status (1)

Country Link
CN (1) CN109462473A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572259A (en) * 2019-08-06 2019-12-13 河北大学 Third-party-free quantum information equality comparison method based on permutation operation
CN111865588A (en) * 2020-08-07 2020-10-30 西藏民族大学 Efficient quantum secret information interchange method, system and storage medium
CN111901112A (en) * 2020-08-07 2020-11-06 西藏民族大学 Quantum secret information equal exchange method, system and application based on dense coding

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014069984A1 (en) * 2012-11-05 2014-05-08 Mimos Berhad Multi-user steganography based on greenberger-horne-zeilinger states
CN103888476A (en) * 2014-04-14 2014-06-25 西北大学 Quantum secure direct communication protocol based on three-particle GHZ entangled state
CN106533679A (en) * 2017-01-18 2017-03-22 成都信息工程大学 Quantum key distribution method based on GHZ state
CN108540281A (en) * 2018-04-28 2018-09-14 清华大学 A kind of Quantum Secure Direct Communication system that measuring apparatus is unrelated
CN108599933A (en) * 2018-04-16 2018-09-28 河北大学 A kind of two side's quantum information control methods based on bell bases
CN111865588A (en) * 2020-08-07 2020-10-30 西藏民族大学 Efficient quantum secret information interchange method, system and storage medium
CN111901112A (en) * 2020-08-07 2020-11-06 西藏民族大学 Quantum secret information equal exchange method, system and application based on dense coding

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014069984A1 (en) * 2012-11-05 2014-05-08 Mimos Berhad Multi-user steganography based on greenberger-horne-zeilinger states
CN103888476A (en) * 2014-04-14 2014-06-25 西北大学 Quantum secure direct communication protocol based on three-particle GHZ entangled state
CN106533679A (en) * 2017-01-18 2017-03-22 成都信息工程大学 Quantum key distribution method based on GHZ state
CN108599933A (en) * 2018-04-16 2018-09-28 河北大学 A kind of two side's quantum information control methods based on bell bases
CN108540281A (en) * 2018-04-28 2018-09-14 清华大学 A kind of Quantum Secure Direct Communication system that measuring apparatus is unrelated
CN111865588A (en) * 2020-08-07 2020-10-30 西藏民族大学 Efficient quantum secret information interchange method, system and storage medium
CN111901112A (en) * 2020-08-07 2020-11-06 西藏民族大学 Quantum secret information equal exchange method, system and application based on dense coding

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
FEI GAO ET AL.: "《Postprocessing of the Oblivious Key in Quantum Private Query》", 《IEEE JOURNAL OF SECLECTED TOPICS IN QUANTUM ELECTRONICS》 *
YING-HUA JIANG ET AL.: "《Quantum secret information equal exchange protocol base on dense coding》", 《WORLD SCIENTIFIC》 *
邵婷婷等: "《可验证第三方的量子秘密信息平等互换协议》", 《计算机应用研究》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572259A (en) * 2019-08-06 2019-12-13 河北大学 Third-party-free quantum information equality comparison method based on permutation operation
CN111865588A (en) * 2020-08-07 2020-10-30 西藏民族大学 Efficient quantum secret information interchange method, system and storage medium
CN111901112A (en) * 2020-08-07 2020-11-06 西藏民族大学 Quantum secret information equal exchange method, system and application based on dense coding
CN111865588B (en) * 2020-08-07 2022-12-02 西藏民族大学 Efficient quantum secret information interchange method, system and storage medium

Similar Documents

Publication Publication Date Title
Choo et al. Examining indistinguishability-based proof models for key establishment protocols
CN110233868A (en) A kind of edge calculations data safety and method for secret protection based on Fabric
Nakhila et al. Parallel active dictionary attack on WPA2-PSK Wi-Fi networks
CN108965230A (en) A kind of safety communicating method, system and terminal device
Yang et al. Arbitrated quantum signature with an untrusted arbitrator
CN109462473A (en) A kind of quantum secret information equality exchange method and system
CN109729523A (en) A kind of method and apparatus of terminal networking certification
CN109327308A (en) A kind of quantum key delivering method and system with bidirectional identity authentication function
Hu et al. A session hijacking attack against a device-assisted physical-layer key agreement
CN110071814A (en) A kind of quantum Proxy Signature method and system based on Bell state entanglement transfer
Singh et al. On the IEEE 802.11 i security: a denial‐of‐service perspective
Zhang et al. Formal verification of 5G-EAP-TLS authentication protocol
Benssalah et al. Security enhancement of the authenticated RFID security mechanism based on chaotic maps
CN110635907B (en) Controlled quantum conversation method with identity authentication function based on GHZ-like state
CN113452690A (en) Power grid data transmission method, device, system and medium
CN113849815A (en) Unified identity authentication platform based on zero trust and confidential calculation
Indushree et al. Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks
Yang et al. A new anonymous password-based authenticated key exchange protocol
CN114024672A (en) Safety protection method and system for low-voltage power line carrier communication system
CN109600357A (en) A kind of distributed identity authentication system, method and server
CN109495262A (en) With the quantum key delivering method of dense coding characteristic in quantum communication network
Lee et al. Using random bit authentication to defend IEEE 802.11 DoS attacks
CN109522689A (en) Multiple-factor strong identity authentication method under mobile office environment
CN109167663A (en) A kind of multi-user quantum cryptographic key distribution method and system based on dense coding
Teyou et al. Solving downgrade and dos attack due to the four ways handshake vulnerabilities (WIFI)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20220701

AD01 Patent right deemed abandoned