CN112332988A - Agile quantum privacy query method based on anti-rotation noise - Google Patents
Agile quantum privacy query method based on anti-rotation noise Download PDFInfo
- Publication number
- CN112332988A CN112332988A CN202110010363.3A CN202110010363A CN112332988A CN 112332988 A CN112332988 A CN 112332988A CN 202110010363 A CN202110010363 A CN 202110010363A CN 112332988 A CN112332988 A CN 112332988A
- Authority
- CN
- China
- Prior art keywords
- database
- quantum
- key
- particles
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/903—Querying
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Computational Linguistics (AREA)
- Electromagnetism (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses an agile quantum privacy query method based on anti-rotation noise, which comprises the steps of constructing quantum states of transmission information according to Bell states by utilizing a database, and generating a particle state sequence; detecting particles according to the Bell state structure by using a database, adding the detected particles into the particle state sequence to generate a mixed sequence, and sending the mixed sequence to an inquiring user; carrying out safety detection by using an inquiry user according to the detection particles in the mixed sequence; discarding all detection particles by using an inquiry user, and measuring the remaining particles by using a measurement basis; publishing classical information according to the transmitted quantum state by utilizing a database; acquiring an original key by using an inquiry user according to a measurement result and published classical information; setting security parameters and generating a shared secret key; and searching the item information in the database by using the inquiry user according to the shared secret key. The invention eliminates the rotation noise in the quantum channel, ensures the safety of quantum information transmission and improves the quantum privacy query efficiency.
Description
Technical Field
The invention relates to the technical field of quantum privacy query, in particular to an agile quantum privacy query method based on anti-rotation noise.
Background
Quantum secure communications have been a focus of research since the first BB84 protocol proposed by Bennett et al. Quantum cryptography guarantees the security of transmitted information by using the quantum physics principle, and classical cryptography based on large number decomposition is easy to crack. Thus, quantum cryptography would render existing cryptographic systems insecure. Quantum communication has many important branches, such as Quantum Privacy Query (QPQ), Quantum Privacy Comparison (QPC), Quantum Secure Direct Communication (QSDC), quantum key sharing (QSS), quantum key agreement protocol (QKA), and the like.
Quantum privacy query protocols require that privacy of both the user and the database be guaranteed. That is, in the database, Bob cannot know the specific location of the user Alice's query, and Alice cannot know other data information than the query entry in the Bob database. In the process of security analysis, we need to pay attention to interception and retransmission attacks of external eavesdroppers, PNS attacks and the like besides whether Alice and Bob insert decoy particles, whether fake particles are constructed, and whether joint spoofing is negotiated. Quantum privacy query generally has the problems of noise interference of transmission channels, low transmission efficiency and the like. Under the influence of classical half-quanta, quantum computation, quantum search algorithms and the like, better effects can be expected to be achieved in quantum privacy inquiry regardless of post-processing or anti-rotation noise.
The existing quantum privacy query scheme mainly has the following problems:
1. the existing quantum communication generally does not consider noise interference in a channel, and the quantum communication is considered to have unconditional safety. But the fact is that quantum channels are disturbed by phase noise and rotation noise;
2. the DF state with the capability of resisting rotation noise and phase noise is generally used in the past, but the DF state is difficult to construct;
3. most of quantum privacy query postprocessing divides a key with the length of kN into k sections of keys with the length of N, and a user can generally obtain only one key after the keys are compressed, so that the user can only query 1bit of database information. The former protocol user has difficulty in realizing the function of inquiring the key information of the multi-bit database.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides an agile quantum privacy query method based on anti-rotation noise.
In order to achieve the purpose of the invention, the invention adopts the technical scheme that:
an agile quantum privacy query method based on anti-rotation noise comprises the following steps:
s1, constructing a quantum state of transmission information according to the Bell state by utilizing a database, and generating a particle state sequence;
s2, detecting particles according to the Bell state structure by using the database, adding the detected particles into the particle state sequence generated in the step S1, generating a mixed sequence and sending the mixed sequence to the inquiry user;
s3, carrying out safety detection by using the inquiry user according to the detection particles in the mixed sequence;
s4, discarding all the detection particles by using the inquiry user, and measuring the residual particles by using the measurement basis;
s5, publishing classical information according to the quantum state sent in the step S2 by utilizing a database;
s6, obtaining an original key by using the inquiry user according to the measurement result of the step S4 and the classical information published in the step S5;
s7, setting security parameters, dividing the original key into key sequences with the length of the security parameters, converting decimal numbers of the key sequences into binary numbers, and carrying out XOR operation on the binary numbers to obtain a shared key;
and S8, retrieving the item information in the database by the inquiry user according to the shared key.
The beneficial effect of this scheme is: according to the invention, through constructing quantum states with anti-rotation noise capability and detection particles, the query of a quantum privacy block is realized, and meanwhile, the rotation noise interference in a quantum channel in a real scene is eliminated; and the particle state structure mode of the invention is simpler and is easier to realize.
Further, the constructing the quantum state of the transmission information according to the Bell state by using the database in the step S1 specifically includes:
using two Bell statesFour quantum states for transmitting information are constructed and respectively expressed as
The beneficial effects of the further scheme are as follows: the invention uses two Bell states with anti-rotation noise performanceAs an initial particle state, constructing four superposition states in a superposition mode; due to initial particle stateThe transmission particles have the capability of resisting rotation noise, so the transmission particles also have the characteristic of eliminating the rotation noise interference.
Further, the step S2 of detecting the particles according to the Bell-state structure by using the database specifically includes:
The beneficial effects of the further scheme are as follows: the detection particles constructed by the invention also have the performance of resisting rotation noise, and are also different from the information particles. The basic measurement result of the information particle may collapse into,,,And,,,one of eight cases. And the measurement result of the detection particle may collapse into,,,And,,,one kind of (1). The difference between the information particles and the detection particles can be clearly distinguished. When the security detection is completed, the measurement of the position of the information particle occurs and,,,,,,,in case of non-compliance, an eavesdropper may be present.
Further, the step S3 specifically includes the following sub-steps:
s31, judging whether the inquiry user receives all the particles in the mixed sequence; if yes, go to step S32; otherwise, the inquiry user is used for publishing the particle position which is not successfully received, and the database is used for resending the particle state of the position;
s32, publishing the positions and the measurement bases of the detection particles by using a database;
s33, using query user to adoptZ L A base andX L measuring the detection particles based on the base measurement, and publishing the measurement result to a database;
s34, comparing the received measurement result with the initial particle state by using the database, and judging whether the error probability exceeds a preset threshold value; if yes, restarting the quantum communication protocol; otherwise, go to step S4.
The beneficial effects of the further scheme are as follows: in the quantum privacy query against the rotation noise, there may be interference such as an eavesdropper or phase noise, and in order to ensure the security of the present invention, it is necessary to perform security detection. Wherein step S31 is to improve the utilization efficiency of the particles, if the querying user cannot ensure that all the particles in the mixed sequence are received, the next step is executed, which may cause the error probability in step S34 to far exceed the preset threshold. Also, for the database, if he does not have S31, he considers that the querying user received all the particles in the mixed sequence, which is unfair. Steps S32 and S33 are to query the user to make corresponding measurements on the received detection particles according to the information about the positions and measurement bases of the detection particles published in the database, and to publish the measurement results to the database for comparison. Step S34 is that the database compares the original state and the result published by the inquiring user, and calculates the percentage of the total number of the error particles. Once the originally set threshold is exceeded, the probability of error is considered too great and an eavesdropper may be present. Therefore, the result of the execution needs to be abandoned, and the protocol is restarted; otherwise, continuing to execute the subsequent operation.
Further, the step S5 is specifically:
if the quantum state sent by the database in step S2 isAndthen the classical information 0 is published by using a database; otherwise classical information 1 is published using the database.
The beneficial effects of the further scheme are as follows: the invention can make the inquiring user inquire the information of the database with a certain probability only by publishing the classical information '0' or '1', is different from other existing quantum privacy inquiring protocols which usually need to publish a pair of quantum states, and is easier to realize by adopting the publishing mode of the classical bit 0/1.
Further, the step S7 specifically includes the following sub-steps:
s71, setting safety parameterslThe original key is encryptedR Division into lengthsl Is expressed as
Wherein the content of the first and second substances,mis a variable of the integer type, and the integer type,q j m-、q j m+respectively, of the original keyj-m、j+mA bit key;
Wherein the content of the first and second substances,for the purpose of the binary-converted shared secret,obtained for binary conversionThe bit key is a key of a bit,is a binary numberLength of (d);
The beneficial effects of the further scheme are as follows: the invention determines the length of the original secret key division in the post-processing process by setting the safety parameters, which is different from the traditional KN-N mode and improves the utilization efficiency of the quantum.
Further, the step S8 specifically includes the following sub-steps:
s81, suppose the inquiring user wants to inquirei Stripe database entryX j Publishing a shift with a querying users=j-i;
S82, using database to encrypt the keyK b Displacement ofsThen obtain the secret keyK b ', and using a secret keyK b ' database entry to be queriedX j Encrypting to obtain database entry information, and transmitting the database entry information to a query user;
s83, using inquiry user to keyK a Displacement ofsThen obtain the secret keyK a ', and using a secret keyK a ' deciphering database item information to obtain the database item to be inquiredX j 。
The beneficial effects of the further scheme are as follows: the invention can realize that the inquiring user can obtain the multi-bit key information by inquiring the one-bit key information by improving the post-processing.
Drawings
FIG. 1 is a flow chart of an agile quantum privacy query method based on anti-rotation noise of the present invention;
fig. 2 is a graph comparing the probability of successful measurement in the embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
As shown in fig. 1, an embodiment of the present invention provides an agile quantum privacy query method based on anti-rotation noise, including the following steps S1 to S8:
s1, constructing a quantum state of transmission information according to the Bell state by utilizing a database, and generating a particle state sequence;
in the present embodiment, in the collective phase noise theory, the channel transmission is generally a phase change in a quantum state.,Representing quantum states that are resistant to phase noise,representing the anti-rotation noise quantum state. While the overall phase of the quantum state is not observable, once the local phase factor is in error, the entire particle will be in a mixed state. Phase factor obtains single photon of logic state by superposing two single photons,() To cancel phase noise. In addition, the effect of rotational noise on the state of the particles is,. Only two Bell statesCan eliminate rotation noise as logic quantum state(,). SubscriptdpRepresenting a logical state that is resistant to phase noise,rrepresenting the logical state of the anti-rotation noise.
The invention utilizes two Bell statesFour information-transmitting quantum states are constructed which are resistant to collective noise, respectively
Thus, the measurement of these four transmitted quanta using the measurement basis must be,,,,,,,One of eight quantum states. Once other measurements are detected, they are treated as particles sent by the attacker.
S2, detecting particles according to the Bell state structure by using the database, adding the detected particles into the particle state sequence generated in the step S1, generating a mixed sequence and sending the mixed sequence to the inquiry user;
in this embodiment, the present invention utilizes twoBell stateFour types of detection particles capable of resisting collective noise are constructed, and are respectively expressed as
The present invention is to detect particles,,,Added to the particle State sequence generated in step S1BIn (b), obtaining a mixed sequenceB'. Database Bob mixes the sequencesB'And sending the information to the inquiring user Alice. Initial particle state,Represents the classical information '0',,representing classical information '1'.
The invention only needs to pass two Bell statesBy entanglement means, quantum state of transmission information is constructed,,,And detecting particles,,,. The states of the particles for transmitting the message and the particles for detecting the message in the whole protocol process are different.
S3, carrying out safety detection by using the inquiry user according to the detection particles in the mixed sequence;
in this embodiment, step S3 specifically includes the following sub-steps:
s31, judging whether the user Alice receives the mixed sequence or notB'All of the particles in (a); if yes, go to step S32; otherwise, publishing the unsuccessfully received particle position by using the inquiry user Alice, and resending the particle state of the position by using the database Bob;
when all the particles are received by the inquiring user Alice, then a mixing sequence is selectedB'By half the particles in (1) for security detection, i.e. by using a mixed sequenceB'The detection particles in (1) are subjected to security detection.
S32, publishing the positions and the measurement bases of the detection particles by using a database Bob;
s33, using the measurement basis adopted by the inquiring user AliceZ L ={,AndX L ={,measuring the detection particles and publishing the measurement result to a database Bob;
s34, comparing the received measurement result with the initial particle state by using the database Bob, and judging whether the error probability exceeds a preset threshold value; if yes, restarting the quantum communication protocol; otherwise, go to step S4.
S4, discarding all detection particles by using inquiry user and adopting measurement baseZ L ={,AndX L ={,-measuring the remaining information particles;
s5, publishing classical information according to the quantum state sent in the step S2 by utilizing a database;
in this embodiment, step S5 specifically includes:
after confirming that the querying user Alice has measured all the received particles, the database Bob will issue classic information 0/1. If the quantum state sent by the database in step S2 isAndthen the classical information 0 is published by using a database; otherwise classical information 1 is published using the database.
S6, obtaining an original key by using the inquiry user according to the measurement result of the step S4 and the classical information published in the step S5;
in this embodiment, during the whole quantum privacy query process, the database Bob will know all the secret keys, and the user Alice can only deduce the secret key with a certain probability (c)). The invention adopts the quantum privacy query protocol with good anti-rotation noise performance, eliminates the rotation noise in the quantum channel, ensures the safety of quantum information transmission, and ensures that the probability of obtaining a correct key by a user is. FIG. 2 shows the query success probability of the present inventionPValue () And the success probability of the query without eliminating the rotation noise in the traditional methodP usd Value () Followed byθMay vary. When in useThe probability of success of the quantum privacy query protocol of the present invention will reach a maximum value of 1/2.
Table 1 is an inference process of the quantum privacy query protocol. If the database Bob issues the result 0, inquiring the measurement result of the user Alice () It can be concluded that the initial particle state sent by the database Bob is () And the database Bob key is 0 (1); if the database Bob issues result 0, the initial particle state sent by the database BobThe inquiring user Alice cannot distinguish the measurement quantum statesAndso the initial particle state sent by the database Bob cannot be inferred.
TABLE 1
In the quantum key distribution process, a query user Alice and a database Bob share a string with the length ofNOriginal key ofR={q 1 ,q 2 ,…,q N }(i=1,2,…,N) The database Bob knows all the keys, and the inquiring user Alice deduces a certain keyq i Has a probability of。
S7, setting security parameters, dividing the original key into key sequences with the length of the security parameters, converting decimal numbers of the key sequences into binary numbers, and carrying out XOR operation on the binary numbers to obtain a shared key;
in this embodiment, step S7 specifically includes the following sub-steps:
s71, setting safety parameterslThe original key is encryptedR Division into lengthsl Is expressed as
Wherein the content of the first and second substances,mis an integer variableIs used for showinglThe +1 keys are XOR-ed and then accumulated to obtain a result; suppose thatj=5,q 1=1, q 2=0, q 3=1, q 4=1, q 5=0, then;q j m-、q j m+Respectively, of the original keyj-m、j+mA bit key.
Wherein the content of the first and second substances,for the purpose of the binary-converted shared secret,obtained for binary conversionThe bit key is a key of a bit,is a binary numberLength of (d);
Wherein the content of the first and second substances,is thatQ j Each bit of (1) asQ j = 10, then=1, =0。
The key obtained through the process is short in length, and quantum privacy block query is convenient to achieve. Finally, a shared secret key with the length of 1 is obtainedO j . The database Bob will know the shared keyO j Is marked asK b ={k b1 ,k b2 ,…,k bn }. Similarly, the key of the querying user Alice is marked asK a ={k a1 ,k a2 ,…,k an Inquiring that user Alice can obtain a conclusive key under ideal conditionsk ai And othersnThe-1 bit key may be an inconclusive key.
The post-processing method provides a secret key parity check quantum privacy block query scheme with low communication complexity and stability. But at a security parameterlWithin the range of (2), it is required to ensure that each inquiry is successful, so that the inquiring user Alice can obtain the final shared secret key. Once the inquiring user Alice does not obtain the shared secret key, we need to re-acquireThe above key distribution step is initiated.
Only when the length islIs/are as followsO j ' When each digit of the sequence is known, the final key can be deducedO j The value of (c). Suppose thatl=2, there are 5 bits of quantum information transmitted.
In thatO j ' In case of satisfying the condition, the final keyO j In the case of =0O j 'There is 000,011,101. Is provided withSeed length is 2lBinary sequence of +1Q j {00000, 00111, 01011, 01101, 01110, 10011, 10101, 10110, 11001, 11010, 11100, 11111 }. Then final keyO j In case of =1O j 'There is 001,010,100. Therein is provided withSeed of a plantQ j {00001, 00010, 00011, 00100, 00101, 00110, 01000, 01001, 01010, 01100, 01111, 10000, 10001, 10010, 10100, 10111, 11000, 11011, 11101, 11110 }.
q j The parity sequence is of lengthlIs/are as followsO j . Secret keyq j Decimal number of =1 is converted to binary and then to lengthIs subjected to exclusive or (XOR) Operate to obtain the final keyO j . By the scheme, the threat of inquiring the user Alice is reduced, the safety of the whole post-processing is improved, and the quantum privacy block inquiry can be realized.
And S8, retrieving the item information in the database by the inquiry user according to the shared key.
In this embodiment, step S8 specifically includes the following sub-steps:
s81, suppose that the inquiring user Alice wants to inquirei Stripe database entryX j Publishing a shift with a querying user Alices=j-i;
S82, using database Bob to encrypt the keyK b Displacement ofs Then obtain the secret keyK b ', and using a secret keyK b ' database entry to be queriedX j Encrypting to obtain database entry information, and transmitting the database entry information to the inquiring user Alice;
s83, using the inquiry user Alice to keyK a Displacement ofs Then obtain the secret keyK a ', and using a secret keyK a ' deciphering database item information to obtain the database item to be inquiredX j 。
Alice and Bob perform post-processing operations on their original key strings to obtain the lengthNThe final key of (2). The privacy query operation on the final key is as follows:
as described in Table 2, the database will know all of the final keysK b (k b 1 =010, k b 2 =100, k b 3 =011, k b 4 = 110), whereas the querying user knows only one key block. Assume that the basic unit of the privacy key block lookup is 3, assume that Alice only knowsi=4 key blocksk a 4 =110 and want to queryj=2 query entriesX j . Then a shift is publisheds=i-j. Database will end the keyK b Shift s(s)>0, then shift right; s<0, left shift) to obtainK b ’And encrypt the query entry () And encrypt the resultYIs published to a querying user Alice, who encrypts the entry according to the shift reply asY'. Alice may then use the known keyk b 4 =110 database entry that can decrypt the desired queryX 2 =010。
TABLE 2
The invention can realize that the inquiry user Alice obtains the multi-bit key information of the database Bob by improving the post-processing process. Different from the traditionkN-NThe post-processing method of (1). The post-processing mode of the invention can more effectively realize the quantum privacy block query, improve the quantum bit query efficiency of the query user Alice, and effectively improve the protocol security of the parity check result of the secret key.
The quantum privacy query method provided by the invention mainly solves the problem of rotary noise interference in a transmission channel, and in the quantum privacy query process, a query user Alice can only inquire according to probabilityGuessing the original key of the one-bit database Bob. With division of lengthlTo obtain the inquiry key of the database Bob by the inquiry user AliceO j Will be close to 1, the querying user Alice can get fromO j Is obtained byQ j ' the quantum privacy block queries the results. Through security analysis, the invention can ensure the security of users and databases.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
It will be appreciated by those of ordinary skill in the art that the embodiments described herein are intended to assist the reader in understanding the principles of the invention and are to be construed as being without limitation to such specifically recited embodiments and examples. Those skilled in the art can make various other specific changes and combinations based on the teachings of the present invention without departing from the spirit of the invention, and these changes and combinations are within the scope of the invention.
Claims (7)
1. An agile quantum privacy query method based on anti-rotation noise is characterized by comprising the following steps:
s1, constructing a quantum state of transmission information according to the Bell state by utilizing a database, and generating a particle state sequence;
s2, detecting particles according to the Bell state structure by using the database, adding the detected particles into the particle state sequence generated in the step S1, generating a mixed sequence and sending the mixed sequence to the inquiry user;
s3, carrying out safety detection by using the inquiry user according to the detection particles in the mixed sequence;
s4, discarding all the detection particles by using the inquiry user, and measuring the residual particles by using the measurement basis;
s5, publishing classical information according to the quantum state sent in the step S2 by utilizing a database;
s6, obtaining an original key by using the inquiry user according to the measurement result of the step S4 and the classical information published in the step S5;
s7, setting security parameters, dividing the original key into key sequences with the length of the security parameters, converting decimal numbers of the key sequences into binary numbers, and carrying out XOR operation on the binary numbers to obtain a shared key;
and S8, retrieving the item information in the database by the inquiry user according to the shared key.
2. The anti-rotation-noise-based agile quantum privacy query method according to claim 1, wherein the quantum state of the transmission information constructed by the database according to the Bell state in the step S1 is specifically:
using two Bell statesFour quantum states for transmitting information are constructed and respectively expressed as
3. The anti-rotation-noise-based agile quantum privacy query method according to claim 2, wherein the detecting particles according to the Bell-state structure by using the database in the step S2 is specifically:
4. The anti-rotation-noise-based agile quantum privacy query method according to claim 3, wherein the step S3 specifically comprises the following substeps:
s31, judging whether the inquiry user receives all the particles in the mixed sequence; if yes, go to step S32; otherwise, the inquiry user is used for publishing the particle position which is not successfully received, and the database is used for resending the particle state of the position;
s32, publishing the positions and the measurement bases of the detection particles by using a database;
s33, using query user to adoptZ L A base andX L measuring the detection particles based on the base measurement, and publishing the measurement result to a database;
s34, comparing the received measurement result with the initial particle state by using the database, and judging whether the error probability exceeds a preset threshold value; if yes, restarting the quantum communication protocol; otherwise, go to step S4.
5. The anti-rotation-noise-based agile quantum privacy query method according to claim 4, wherein the step S5 specifically comprises:
6. The anti-rotation-noise-based agile quantum privacy query method according to claim 5, wherein the step S7 specifically comprises the following substeps:
s71, setting safety parameterslThe original key is encryptedR Division into lengthsl Is expressed as
Wherein the content of the first and second substances,mis a variable of the integer type, and the integer type,q j m-、q j m+respectively, of the original keyj-m、j+mA bit key;
Wherein the content of the first and second substances,for the purpose of the binary-converted shared secret,obtained for binary conversionThe bit key is a key of a bit,is a binary numberLength of (d);
7. The anti-rotation-noise-based agile quantum privacy query method according to claim 6, wherein the step S8 specifically comprises the following substeps:
s81, suppose the inquiring user wants to inquirei Stripe database entryX j Publishing a shift with a querying users=j-i;
S82, using database to encrypt the keyK b Displacement ofsThen obtain the secret keyK b ', and using a secret keyK b ' database entry to be queriedX j Encrypting to obtain database entry information, and transmitting the database entry information to a query user;
s83, using inquiry user to keyK a Displacement ofsThen obtain the secret keyK a ', and using a secret keyK a ' deciphering database item information to obtain the database item to be inquiredX j 。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110010363.3A CN112332988B (en) | 2021-01-06 | 2021-01-06 | Agile quantum privacy query method based on anti-rotation noise |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110010363.3A CN112332988B (en) | 2021-01-06 | 2021-01-06 | Agile quantum privacy query method based on anti-rotation noise |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112332988A true CN112332988A (en) | 2021-02-05 |
CN112332988B CN112332988B (en) | 2021-03-16 |
Family
ID=74302492
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110010363.3A Active CN112332988B (en) | 2021-01-06 | 2021-01-06 | Agile quantum privacy query method based on anti-rotation noise |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112332988B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114422122A (en) * | 2021-12-23 | 2022-04-29 | 山东工商学院 | Quantum key negotiation method and system with semi-trusted third party |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090012938A1 (en) * | 2007-07-03 | 2009-01-08 | Seth Lloyd | Quantum private queries |
CN103023578A (en) * | 2012-12-11 | 2013-04-03 | 上海卫星工程研究所 | Deep space exploration communication system based on light quantum communication technology |
CN103338187A (en) * | 2013-06-03 | 2013-10-02 | 浙江工商大学 | Information leakage-free bidirectional quantum secure direct communication protocol based on any two gigahertz (GHZ) state/entanglement exchange result collection codes |
CN104104503A (en) * | 2014-07-22 | 2014-10-15 | 浙江工商大学 | Collective dephasing noise resisting error tolerance channel encryption quantum dialogue protocol |
CN105245332A (en) * | 2015-10-21 | 2016-01-13 | 西安邮电大学 | Four-particle x state-based two-party quantum key agreement protocol |
CN105898686A (en) * | 2016-06-12 | 2016-08-24 | 成都信息工程大学 | Radio link failure recovery method and user equipment |
CN107493170A (en) * | 2017-10-18 | 2017-12-19 | 浙江工商大学 | Secure quantum summation method based on Quantum fourier transform |
CN107493168A (en) * | 2017-09-07 | 2017-12-19 | 中国电子科技集团公司第三十研究所 | Quanta identity authentication method and its application process during quantum key distribution |
US20180287788A1 (en) * | 2016-12-15 | 2018-10-04 | Damián Pitalúa García | Method and system for spacetime-constrained oblivious transfer |
CN108768641A (en) * | 2018-06-12 | 2018-11-06 | 成都信息工程大学 | A kind of quantum privacy comparative approach and system based on GHZ states |
CN109274495A (en) * | 2018-12-03 | 2019-01-25 | 成都信息工程大学 | Two half Quantum Secure Direct Communication schemes based on Bell state |
CN109474417A (en) * | 2018-10-29 | 2019-03-15 | 成都信息工程大学 | A kind of efficient quantum privacy comparative approach and system |
CN109714158A (en) * | 2018-12-21 | 2019-05-03 | 成都信息工程大学 | A kind of half quantum privacy comparative approach and system based on Bell state |
CN110247763A (en) * | 2019-06-20 | 2019-09-17 | 安徽继远软件有限公司 | A kind of quantum secure querying method for resisting combined measurement attack |
US10572684B2 (en) * | 2013-11-01 | 2020-02-25 | Anonos Inc. | Systems and methods for enforcing centralized privacy controls in de-centralized systems |
-
2021
- 2021-01-06 CN CN202110010363.3A patent/CN112332988B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090012938A1 (en) * | 2007-07-03 | 2009-01-08 | Seth Lloyd | Quantum private queries |
CN103023578A (en) * | 2012-12-11 | 2013-04-03 | 上海卫星工程研究所 | Deep space exploration communication system based on light quantum communication technology |
CN103338187A (en) * | 2013-06-03 | 2013-10-02 | 浙江工商大学 | Information leakage-free bidirectional quantum secure direct communication protocol based on any two gigahertz (GHZ) state/entanglement exchange result collection codes |
US10572684B2 (en) * | 2013-11-01 | 2020-02-25 | Anonos Inc. | Systems and methods for enforcing centralized privacy controls in de-centralized systems |
CN104104503A (en) * | 2014-07-22 | 2014-10-15 | 浙江工商大学 | Collective dephasing noise resisting error tolerance channel encryption quantum dialogue protocol |
CN105245332A (en) * | 2015-10-21 | 2016-01-13 | 西安邮电大学 | Four-particle x state-based two-party quantum key agreement protocol |
CN105898686A (en) * | 2016-06-12 | 2016-08-24 | 成都信息工程大学 | Radio link failure recovery method and user equipment |
US20180287788A1 (en) * | 2016-12-15 | 2018-10-04 | Damián Pitalúa García | Method and system for spacetime-constrained oblivious transfer |
CN107493168A (en) * | 2017-09-07 | 2017-12-19 | 中国电子科技集团公司第三十研究所 | Quanta identity authentication method and its application process during quantum key distribution |
CN107493170A (en) * | 2017-10-18 | 2017-12-19 | 浙江工商大学 | Secure quantum summation method based on Quantum fourier transform |
CN108768641A (en) * | 2018-06-12 | 2018-11-06 | 成都信息工程大学 | A kind of quantum privacy comparative approach and system based on GHZ states |
CN109474417A (en) * | 2018-10-29 | 2019-03-15 | 成都信息工程大学 | A kind of efficient quantum privacy comparative approach and system |
CN109274495A (en) * | 2018-12-03 | 2019-01-25 | 成都信息工程大学 | Two half Quantum Secure Direct Communication schemes based on Bell state |
CN109714158A (en) * | 2018-12-21 | 2019-05-03 | 成都信息工程大学 | A kind of half quantum privacy comparative approach and system based on Bell state |
CN110247763A (en) * | 2019-06-20 | 2019-09-17 | 安徽继远软件有限公司 | A kind of quantum secure querying method for resisting combined measurement attack |
Non-Patent Citations (4)
Title |
---|
DONG-MEI LIU ET AL: "A Practical Quantum Private Query Protocol Based on Bell States and Single Photons", 《SPRINGER 》 * |
TAO ZHENG ET AL: "Practi cal quantum pri vate query based o n B el l s tate", 《WORLD SCIENTIFIC》 * |
张仕斌: "基于 Be l l 态的量子隐私查询与双向身份认证方案", 《计算机应用与软件》 * |
李剑等: "量子 BB84 协议在联合旋转噪音信道上的安全性分析", 《物理学报》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114422122A (en) * | 2021-12-23 | 2022-04-29 | 山东工商学院 | Quantum key negotiation method and system with semi-trusted third party |
Also Published As
Publication number | Publication date |
---|---|
CN112332988B (en) | 2021-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xia et al. | Quantum dialogue by using the GHZ state | |
CN110929294B (en) | One-way transmission quantum database privacy query method | |
US10511581B2 (en) | Parallelizable encryption using keyless random permutations and authentication using same | |
US8180048B2 (en) | Method and system for computational transformation | |
CN105027492B (en) | For determining equipment, the method and system of shared key | |
CN110932792B (en) | Bell state-based two-way communication quantum database privacy query method | |
WO2021213631A1 (en) | Improved cryptographic method and system | |
CN104303450A (en) | Determination of cryptographic keys | |
CN108075879A (en) | The method, apparatus and system of a kind of data encryption and decryption | |
Reyad et al. | Key-based enhancement of data encryption standard for text security | |
Li et al. | Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol | |
CN112332988B (en) | Agile quantum privacy query method based on anti-rotation noise | |
Huang et al. | Quantum secure direct communication based on quantum homomorphic encryption | |
CN114564730A (en) | Symmetric encryption-based federal packet statistic calculation method, device and medium | |
Hwang et al. | Robust stream‐cipher mode of authenticated encryption for secure communication in wireless sensor network | |
CN110247768B (en) | Certificable semi-quantum secret sharing method and system based on GHZ state | |
CN116471012A (en) | Single-state multi-party half-quantum secret sharing method based on d-dimensional Bell state | |
CN115865313A (en) | Lightweight privacy protection longitudinal federal learning model parameter aggregation method | |
Vohra et al. | An efficient chaos-based optimization algorithm approach for cryptography | |
CN112332987B (en) | Cloud quantum privacy query method based on user agent | |
Rostom et al. | Quantum cryptography and chaos for the transmission of security keys in 802.11 networks | |
CN114448692B (en) | Quantum secret query method based on Bell state identity authentication | |
Qawaqneh et al. | A new hardware quantum-based encryption algorithm | |
Sönmez et al. | Symmetric Key Management: Key Derivation and Key Wrap | |
CN113923029A (en) | Internet of things information encryption method based on ECC (error correction code) hybrid algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |