CN112332988B - Agile quantum privacy query method based on anti-rotation noise - Google Patents

Agile quantum privacy query method based on anti-rotation noise Download PDF

Info

Publication number
CN112332988B
CN112332988B CN202110010363.3A CN202110010363A CN112332988B CN 112332988 B CN112332988 B CN 112332988B CN 202110010363 A CN202110010363 A CN 202110010363A CN 112332988 B CN112332988 B CN 112332988B
Authority
CN
China
Prior art keywords
database
key
quantum
particles
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110010363.3A
Other languages
Chinese (zh)
Other versions
CN112332988A (en
Inventor
闫丽丽
刘冬梅
张仕斌
昌燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu University of Information Technology
Original Assignee
Chengdu University of Information Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu University of Information Technology filed Critical Chengdu University of Information Technology
Priority to CN202110010363.3A priority Critical patent/CN112332988B/en
Publication of CN112332988A publication Critical patent/CN112332988A/en
Application granted granted Critical
Publication of CN112332988B publication Critical patent/CN112332988B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computational Linguistics (AREA)
  • Electromagnetism (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses an agile quantum privacy query method based on anti-rotation noise, which comprises the steps of constructing quantum states of transmission information according to Bell states by utilizing a database, and generating a particle state sequence; detecting particles according to the Bell state structure by using a database, adding the detected particles into the particle state sequence to generate a mixed sequence, and sending the mixed sequence to an inquiring user; carrying out safety detection by using an inquiry user according to the detection particles in the mixed sequence; discarding all detection particles by using an inquiry user, and measuring the remaining particles by using a measurement basis; publishing classical information according to the transmitted quantum state by utilizing a database; acquiring an original key by using an inquiry user according to a measurement result and published classical information; setting security parameters and generating a shared secret key; and searching the item information in the database by using the inquiry user according to the shared secret key. The invention eliminates the rotation noise in the quantum channel, ensures the safety of quantum information transmission and improves the quantum privacy query efficiency.

Description

Agile quantum privacy query method based on anti-rotation noise
Technical Field
The invention relates to the technical field of quantum privacy query, in particular to an agile quantum privacy query method based on anti-rotation noise.
Background
Quantum secure communications have been a focus of research since the first BB84 protocol proposed by Bennett et al. Quantum cryptography guarantees the security of transmitted information by using the quantum physics principle, and classical cryptography based on large number decomposition is easy to crack. Thus, quantum cryptography would render existing cryptographic systems insecure. Quantum communication has many important branches, such as Quantum Privacy Query (QPQ), Quantum Privacy Comparison (QPC), Quantum Secure Direct Communication (QSDC), quantum key sharing (QSS), quantum key agreement protocol (QKA), and the like.
Quantum privacy query protocols require that privacy of both the user and the database be guaranteed. That is, in the database, Bob cannot know the specific location of the user Alice's query, and Alice cannot know other data information than the query entry in the Bob database. In the process of security analysis, we need to pay attention to interception and retransmission attacks of external eavesdroppers, PNS attacks and the like besides whether Alice and Bob insert decoy particles, whether fake particles are constructed, and whether joint spoofing is negotiated. Quantum privacy query generally has the problems of noise interference of transmission channels, low transmission efficiency and the like. Under the influence of classical half-quanta, quantum computation, quantum search algorithms and the like, better effects can be expected to be achieved in quantum privacy inquiry regardless of post-processing or anti-rotation noise.
The existing quantum privacy query scheme mainly has the following problems:
1. the existing quantum communication generally does not consider noise interference in a channel, and the quantum communication is considered to have unconditional safety. But the fact is that quantum channels are disturbed by phase noise and rotation noise;
2. the DF state with the capability of resisting rotation noise and phase noise is generally used in the past, but the DF state is difficult to construct;
3. most of quantum privacy query postprocessing divides a key with the length of kN into k sections of keys with the length of N, and a user can generally obtain only one key after the keys are compressed, so that the user can only query 1bit of database information. The former protocol user has difficulty in realizing the function of inquiring the key information of the multi-bit database.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides an agile quantum privacy query method based on anti-rotation noise.
In order to achieve the purpose of the invention, the invention adopts the technical scheme that:
an agile quantum privacy query method based on anti-rotation noise comprises the following steps:
s1, constructing a quantum state of transmission information according to the Bell state by utilizing a database, and generating a particle state sequence;
s2, detecting particles according to the Bell state structure by using the database, adding the detected particles into the particle state sequence generated in the step S1, generating a mixed sequence and sending the mixed sequence to the inquiry user;
s3, carrying out safety detection by using the inquiry user according to the detection particles in the mixed sequence;
s4, discarding all the detection particles by using the inquiry user, and measuring the residual particles by using the measurement basis;
s5, publishing classical information according to the quantum state sent in the step S2 by utilizing a database;
s6, obtaining an original key by using the inquiry user according to the measurement result of the step S4 and the classical information published in the step S5;
s7, setting security parameters, dividing the original key into key sequences with the length of the security parameters, converting decimal numbers of the key sequences into binary numbers, and carrying out XOR operation on the binary numbers to obtain a shared key;
and S8, retrieving the item information in the database by the inquiry user according to the shared key.
The beneficial effect of this scheme is: according to the invention, through constructing quantum states with anti-rotation noise capability and detection particles, the query of a quantum privacy block is realized, and meanwhile, the rotation noise interference in a quantum channel in a real scene is eliminated; and the particle state structure mode of the invention is simpler and is easier to realize.
Further, the constructing the quantum state of the transmission information according to the Bell state by using the database in the step S1 specifically includes:
using two Bell states
Figure 573632DEST_PATH_IMAGE001
Four quantum states for transmitting information are constructed and respectively expressed as
Figure 385730DEST_PATH_IMAGE002
Figure 762485DEST_PATH_IMAGE003
Figure 756854DEST_PATH_IMAGE004
Figure 193652DEST_PATH_IMAGE005
Wherein the content of the first and second substances,
Figure 758625DEST_PATH_IMAGE006
,
Figure 204650DEST_PATH_IMAGE007
,
Figure 804259DEST_PATH_IMAGE008
,
Figure 661225DEST_PATH_IMAGE009
,
Figure 447916DEST_PATH_IMAGE010
,
Figure 697631DEST_PATH_IMAGE011
,
Figure 151746DEST_PATH_IMAGE012
,
Figure 195926DEST_PATH_IMAGE013
are all quantum states.
The beneficial effects of the further scheme are as follows: the invention uses two Bell states with anti-rotation noise performance
Figure 719180DEST_PATH_IMAGE001
As an initial particle state, constructing four superposition states in a superposition mode; due to initial particle state
Figure 241428DEST_PATH_IMAGE001
The transmission particles have the capability of resisting rotation noise, so the transmission particles also have the characteristic of eliminating the rotation noise interference.
Further, the step S2 of detecting the particles according to the Bell-state structure by using the database specifically includes:
using two Bell states
Figure 815629DEST_PATH_IMAGE001
Four types of detection particles were constructed, respectively denoted as
Figure 765130DEST_PATH_IMAGE014
Figure 41260DEST_PATH_IMAGE015
Figure 367199DEST_PATH_IMAGE016
Figure 795906DEST_PATH_IMAGE017
Wherein the content of the first and second substances,
Figure 916309DEST_PATH_IMAGE018
,
Figure 164888DEST_PATH_IMAGE019
,
Figure 543785DEST_PATH_IMAGE020
,
Figure 826999DEST_PATH_IMAGE021
,
Figure 118303DEST_PATH_IMAGE022
,
Figure 119757DEST_PATH_IMAGE023
,
Figure 787499DEST_PATH_IMAGE024
,
Figure 10424DEST_PATH_IMAGE025
are all quantum states.
The beneficial effects of the further scheme are as follows: the detection particles constructed by the invention also have the performance of resisting rotation noise, and are also different from the information particles. The basic measurement result of the information particle may collapse into
Figure 472630DEST_PATH_IMAGE006
,
Figure 961380DEST_PATH_IMAGE007
,
Figure 432812DEST_PATH_IMAGE008
,
Figure 690618DEST_PATH_IMAGE009
And
Figure 572993DEST_PATH_IMAGE010
,
Figure 283460DEST_PATH_IMAGE011
,
Figure 293004DEST_PATH_IMAGE012
,
Figure 405317DEST_PATH_IMAGE013
one of eight cases. And the measurement result of the detection particle may collapse into
Figure 724171DEST_PATH_IMAGE018
,
Figure 656355DEST_PATH_IMAGE019
,
Figure 735170DEST_PATH_IMAGE020
,
Figure 436409DEST_PATH_IMAGE021
And
Figure 676898DEST_PATH_IMAGE022
,
Figure 611225DEST_PATH_IMAGE023
,
Figure 962572DEST_PATH_IMAGE024
,
Figure 783897DEST_PATH_IMAGE025
one kind of (1). The difference between the information particles and the detection particles can be clearly distinguished. When the security detection is completed, the measurement of the position of the information particle occurs and
Figure 460866DEST_PATH_IMAGE006
,
Figure 367642DEST_PATH_IMAGE007
,
Figure 771948DEST_PATH_IMAGE008
,
Figure 713359DEST_PATH_IMAGE009
,
Figure 295650DEST_PATH_IMAGE010
,
Figure 689722DEST_PATH_IMAGE011
,
Figure 648451DEST_PATH_IMAGE012
,
Figure 693636DEST_PATH_IMAGE013
in case of non-compliance, an eavesdropper may be present.
Further, the step S3 specifically includes the following sub-steps:
s31, judging whether the inquiry user receives all the particles in the mixed sequence; if yes, go to step S32; otherwise, the inquiry user is used for publishing the particle position which is not successfully received, and the database is used for resending the particle state of the position;
s32, publishing the positions and the measurement bases of the detection particles by using a database;
s33, using query user to adoptZ L A base andX L measuring the detection particles based on the base measurement, and publishing the measurement result to a database;
s34, comparing the received measurement result with the initial particle state by using the database, and judging whether the error probability exceeds a preset threshold value; if yes, restarting the quantum communication protocol; otherwise, go to step S4.
The beneficial effects of the further scheme are as follows: in the quantum privacy query against the rotation noise, there may be interference such as an eavesdropper or phase noise, and in order to ensure the security of the present invention, it is necessary to perform security detection. Wherein step S31 is to improve the utilization efficiency of the particles, if the querying user cannot ensure that all the particles in the mixed sequence are received, the next step is executed, which may cause the error probability in step S34 to far exceed the preset threshold. Also, for the database, if he does not have S31, he considers that the querying user received all the particles in the mixed sequence, which is unfair. Steps S32 and S33 are to query the user to make corresponding measurements on the received detection particles according to the information about the positions and measurement bases of the detection particles published in the database, and to publish the measurement results to the database for comparison. Step S34 is that the database compares the original state and the result published by the inquiring user, and calculates the percentage of the total number of the error particles. Once the originally set threshold is exceeded, the probability of error is considered too great and an eavesdropper may be present. Therefore, the result of the execution needs to be abandoned, and the protocol is restarted; otherwise, continuing to execute the subsequent operation.
Further, the step S5 is specifically:
if the quantum state sent by the database in step S2 is
Figure 446828DEST_PATH_IMAGE026
And
Figure 328197DEST_PATH_IMAGE027
then the classical information 0 is published by using a database; otherwise classical information 1 is published using the database.
The beneficial effects of the further scheme are as follows: the invention can make the inquiring user inquire the information of the database with a certain probability only by publishing the classical information '0' or '1', is different from other existing quantum privacy inquiring protocols which usually need to publish a pair of quantum states, and is easier to realize by adopting the publishing mode of the classical bit 0/1.
Further, the step S7 specifically includes the following sub-steps:
s71, setting safety parameterslThe original key is encryptedR Division into lengthsl Is expressed as
Figure 825037DEST_PATH_IMAGE028
Wherein the content of the first and second substances,mis a variable of the integer type, and the integer type,q j m-q j m+respectively, of the original keyj-mj+mA bit key;
s72, key sequence
Figure 724729DEST_PATH_IMAGE029
Is converted into a binary number, expressed as
Figure 648823DEST_PATH_IMAGE030
Wherein the content of the first and second substances,
Figure 751908DEST_PATH_IMAGE031
for the purpose of the binary-converted shared secret,
Figure 786860DEST_PATH_IMAGE032
obtained for binary conversion
Figure 822949DEST_PATH_IMAGE033
The bit key is a key of a bit,
Figure 167212DEST_PATH_IMAGE033
is a binary number
Figure 23172DEST_PATH_IMAGE034
Length of (d);
s73, binary number pair
Figure 861815DEST_PATH_IMAGE034
Performing an XOR operation to obtain a shared secret, denoted as
Figure 486832DEST_PATH_IMAGE035
Wherein the content of the first and second substances,
Figure 18307DEST_PATH_IMAGE036
is thatQ j Each bit of (1).
The beneficial effects of the further scheme are as follows: the invention determines the length of the original secret key division in the post-processing process by setting the safety parameters, which is different from the traditional KN-N mode and improves the utilization efficiency of the quantum.
Further, the step S8 specifically includes the following sub-steps:
s81, suppose the inquiring user wants to inquirei Stripe database entryX j Publishing a shift with a querying users=j-i
S82, using database to encrypt the keyK b Displacement ofsThen obtain the secret keyK b ', and using a secret keyK b ' database entry to be queriedX j Encrypting to obtain database entry information, and transmitting the database entry information to a query user;
s83, using inquiry user to keyK a Displacement ofsThen obtain the secret keyK a ', and using a secret keyK a ' deciphering database item information to obtain the database item to be inquiredX j
The beneficial effects of the further scheme are as follows: the invention can realize that the inquiring user can obtain the multi-bit key information by inquiring the one-bit key information by improving the post-processing.
Drawings
FIG. 1 is a flow chart of an agile quantum privacy query method based on anti-rotation noise of the present invention;
fig. 2 is a graph comparing the probability of successful measurement in the embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
As shown in fig. 1, an embodiment of the present invention provides an agile quantum privacy query method based on anti-rotation noise, including the following steps S1 to S8:
s1, constructing a quantum state of transmission information according to the Bell state by utilizing a database, and generating a particle state sequence;
in the present embodiment, in the collective phase noise theory, the channel transmission is generally a phase change in a quantum state.
Figure 345252DEST_PATH_IMAGE037
Figure 722007DEST_PATH_IMAGE038
Representing quantum states that are resistant to phase noise,
Figure 467109DEST_PATH_IMAGE039
representing the anti-rotation noise quantum state. While the overall phase of the quantum state is not observable, once the local phase factor is in error, the entire particle will be in a mixed state. Phase factor obtains single photon of logic state by superposing two single photons
Figure 903906DEST_PATH_IMAGE040
Figure 734459DEST_PATH_IMAGE041
(
Figure 164172DEST_PATH_IMAGE042
) To cancel phase noise. In addition, the effect of rotational noise on the state of the particles is
Figure 498202DEST_PATH_IMAGE043
Figure 105901DEST_PATH_IMAGE044
. Only two Bell states
Figure 423750DEST_PATH_IMAGE045
Can eliminate rotation noise as logic quantum state
Figure 657154DEST_PATH_IMAGE046
Figure 845689DEST_PATH_IMAGE047
,
Figure 889869DEST_PATH_IMAGE048
). SubscriptdpRepresenting resistance to phase noiseThe logic state of the memory cell is set to a logic state,rrepresenting the logical state of the anti-rotation noise.
The invention utilizes two Bell states
Figure 429435DEST_PATH_IMAGE045
Four information-transmitting quantum states are constructed which are resistant to collective noise, respectively
Figure 951683DEST_PATH_IMAGE049
Figure 775151DEST_PATH_IMAGE050
Figure 724653DEST_PATH_IMAGE051
Figure 751514DEST_PATH_IMAGE052
Wherein the content of the first and second substances,
Figure 811874DEST_PATH_IMAGE006
,
Figure 240582DEST_PATH_IMAGE007
,
Figure 875831DEST_PATH_IMAGE008
,
Figure 124410DEST_PATH_IMAGE009
,
Figure 254040DEST_PATH_IMAGE010
,
Figure 537254DEST_PATH_IMAGE011
,
Figure 94137DEST_PATH_IMAGE012
,
Figure 79279DEST_PATH_IMAGE013
are all quantum states.
Thus, the measurement of these four transmitted quanta using the measurement basis must be
Figure 747021DEST_PATH_IMAGE006
,
Figure 150321DEST_PATH_IMAGE007
,
Figure 612526DEST_PATH_IMAGE008
,
Figure 84965DEST_PATH_IMAGE009
,
Figure 290818DEST_PATH_IMAGE010
,
Figure 548624DEST_PATH_IMAGE011
,
Figure 447310DEST_PATH_IMAGE012
,
Figure 157777DEST_PATH_IMAGE013
One of eight quantum states. Once other measurements are detected, they are treated as particles sent by the attacker.
S2, detecting particles according to the Bell state structure by using the database, adding the detected particles into the particle state sequence generated in the step S1, generating a mixed sequence and sending the mixed sequence to the inquiry user;
in this example, the invention utilizes two Bell states
Figure 151010DEST_PATH_IMAGE045
Four types of detection particles capable of resisting collective noise are constructed, and are respectively expressed as
Figure 263322DEST_PATH_IMAGE053
Figure 67330DEST_PATH_IMAGE054
Figure 530672DEST_PATH_IMAGE055
Figure 327596DEST_PATH_IMAGE056
Wherein the content of the first and second substances,
Figure 294415DEST_PATH_IMAGE018
,
Figure 800483DEST_PATH_IMAGE019
,
Figure 219963DEST_PATH_IMAGE020
,
Figure 571310DEST_PATH_IMAGE021
,
Figure 907482DEST_PATH_IMAGE022
,
Figure 318872DEST_PATH_IMAGE023
,
Figure 225648DEST_PATH_IMAGE024
,
Figure 380686DEST_PATH_IMAGE025
are all quantum states.
The present invention is to detect particles
Figure 322097DEST_PATH_IMAGE057
,
Figure 419235DEST_PATH_IMAGE058
,
Figure 813307DEST_PATH_IMAGE059
,
Figure 506456DEST_PATH_IMAGE060
Added to the particle State sequence generated in step S1BIn (b), obtaining a mixed sequenceB'. Database Bob mixes the sequencesB'And sending the information to the inquiring user Alice. Initial particle state
Figure 36795DEST_PATH_IMAGE057
,
Figure 55566DEST_PATH_IMAGE058
Represents the classical information '0',
Figure 186202DEST_PATH_IMAGE059
,
Figure 683043DEST_PATH_IMAGE060
representing classical information '1'.
The invention only needs to pass two Bell states
Figure 599046DEST_PATH_IMAGE045
By entanglement means, quantum state of transmission information is constructed
Figure 257561DEST_PATH_IMAGE061
Figure 891804DEST_PATH_IMAGE062
Figure 176024DEST_PATH_IMAGE063
Figure 946534DEST_PATH_IMAGE064
And detecting particles
Figure 41529DEST_PATH_IMAGE057
,
Figure 897489DEST_PATH_IMAGE058
,
Figure 1712DEST_PATH_IMAGE059
,
Figure 610416DEST_PATH_IMAGE060
. The states of the particles for transmitting the message and the particles for detecting the message in the whole protocol process are different.
S3, carrying out safety detection by using the inquiry user according to the detection particles in the mixed sequence;
in this embodiment, step S3 specifically includes the following sub-steps:
s31, judging whether the user Alice receives the mixed sequence or notB'All of the particles in (a); if yes, go to step S32; otherwise, publishing the unsuccessfully received particle position by using the inquiry user Alice, and resending the particle state of the position by using the database Bob;
when all the particles are received by the inquiring user Alice, then a mixing sequence is selectedB'By half the particles in (1) for security detection, i.e. by using a mixed sequenceB'The detection particles in (1) are subjected to security detection.
S32, publishing the positions and the measurement bases of the detection particles by using a database Bob;
s33, using the measurement basis adopted by the inquiring user AliceZ L ={
Figure 876313DEST_PATH_IMAGE061
,
Figure 953990DEST_PATH_IMAGE062
AndX L ={
Figure 861903DEST_PATH_IMAGE063
,
Figure 590694DEST_PATH_IMAGE064
measuring the detection particles and measuring the junctionThe fruit is published to a database Bob;
s34, comparing the received measurement result with the initial particle state by using the database Bob, and judging whether the error probability exceeds a preset threshold value; if yes, restarting the quantum communication protocol; otherwise, go to step S4.
S4, discarding all detection particles by using inquiry user and adopting measurement baseZ L ={
Figure 27491DEST_PATH_IMAGE061
,
Figure 858044DEST_PATH_IMAGE062
AndX L ={
Figure 38490DEST_PATH_IMAGE063
,
Figure 372519DEST_PATH_IMAGE064
-measuring the remaining information particles;
s5, publishing classical information according to the quantum state sent in the step S2 by utilizing a database;
in this embodiment, step S5 specifically includes:
after confirming that the querying user Alice has measured all the received particles, the database Bob will issue classic information 0/1. If the quantum state sent by the database in step S2 is
Figure 229485DEST_PATH_IMAGE061
And
Figure 547334DEST_PATH_IMAGE063
then the classical information 0 is published by using a database; otherwise classical information 1 is published using the database.
S6, obtaining an original key by using the inquiry user according to the measurement result of the step S4 and the classical information published in the step S5;
in this embodiment, in the whole quantum privacy query process, all the secret keys will be known to the database Bob, and the user Alice can only know the secret keys with a certain probabilityDeducing the secret key (
Figure 265892DEST_PATH_IMAGE065
). The invention adopts the quantum privacy query protocol with good anti-rotation noise performance, eliminates the rotation noise in the quantum channel, ensures the safety of quantum information transmission, and ensures that the probability of obtaining a correct key by a user is
Figure 985586DEST_PATH_IMAGE065
. FIG. 2 shows the query success probability of the present inventionPValue (
Figure 764186DEST_PATH_IMAGE065
) And the success probability of the query without eliminating the rotation noise in the traditional methodP usd Value (
Figure 553019DEST_PATH_IMAGE066
) Followed byθMay vary. When in use
Figure 75268DEST_PATH_IMAGE067
The probability of success of the quantum privacy query protocol of the present invention will reach a maximum value of 1/2.
Table 1 is an inference process of the quantum privacy query protocol. If the database Bob issues the result 0, inquiring the measurement result of the user Alice
Figure 649468DEST_PATH_IMAGE068
(
Figure 598970DEST_PATH_IMAGE069
) It can be concluded that the initial particle state sent by the database Bob is
Figure 625832DEST_PATH_IMAGE070
(
Figure 201038DEST_PATH_IMAGE071
) And the database Bob key is 0 (1); if the database Bob issues result 0, the initial particle state sent by the database Bob
Figure 364166DEST_PATH_IMAGE072
The inquiring user Alice cannot distinguish the measurement quantum states
Figure 484569DEST_PATH_IMAGE070
And
Figure 264306DEST_PATH_IMAGE068
so the initial particle state sent by the database Bob cannot be inferred.
TABLE 1
Figure 377625DEST_PATH_IMAGE073
In the quantum key distribution process, a query user Alice and a database Bob share a string with the length ofNOriginal key ofR={q 1 ,q 2 ,…,q N }(i=1,2,…,N) The database Bob knows all the keys, and the inquiring user Alice deduces a certain keyq i Has a probability of
Figure 660839DEST_PATH_IMAGE074
S7, setting security parameters, dividing the original key into key sequences with the length of the security parameters, converting decimal numbers of the key sequences into binary numbers, and carrying out XOR operation on the binary numbers to obtain a shared key;
in this embodiment, step S7 specifically includes the following sub-steps:
s71, setting safety parameterslThe original key is encryptedR Division into lengthsl Is expressed as
Figure 217722DEST_PATH_IMAGE075
Wherein the content of the first and second substances,mis an integer variable
Figure 953597DEST_PATH_IMAGE076
Is used for showinglThe +1 keys are XOR-ed and then accumulated to obtain a result; suppose thatj=5,q 1=1, q 2=0, q 3=1, q 4=1, q 5=0, then
Figure 621338DEST_PATH_IMAGE077
q j m-q j m+Respectively, of the original keyj-mj+mA bit key.
S72, key sequence
Figure 8326DEST_PATH_IMAGE029
Is converted into a binary number, expressed as
Figure 736111DEST_PATH_IMAGE030
Wherein the content of the first and second substances,
Figure 224861DEST_PATH_IMAGE031
for the purpose of the binary-converted shared secret,
Figure 430714DEST_PATH_IMAGE032
obtained for binary conversion
Figure 688520DEST_PATH_IMAGE033
The bit key is a key of a bit,
Figure 836474DEST_PATH_IMAGE033
is a binary number
Figure 281362DEST_PATH_IMAGE034
Length of (d);
s73, binary number pair
Figure 556485DEST_PATH_IMAGE034
Performing an XOR operation to obtain a shared secret, denoted as
Figure 668798DEST_PATH_IMAGE035
Wherein the content of the first and second substances,
Figure 472806DEST_PATH_IMAGE036
is thatQ j Each bit of (1) asQ j = 10, then
Figure 185416DEST_PATH_IMAGE078
=1,
Figure 733072DEST_PATH_IMAGE079
=0。
The key obtained through the process is short in length, and quantum privacy block query is convenient to achieve. Finally, a shared secret key with the length of 1 is obtainedO j . The database Bob will know the shared keyO j Is marked asK b ={k b1 ,k b2 ,…,k bn }. Similarly, the key of the querying user Alice is marked asK a ={k a1 ,k a2 ,…,k an Inquiring that user Alice can obtain a conclusive key under ideal conditionsk ai And othersnThe-1 bit key may be an inconclusive key.
The post-processing method provides a secret key parity check quantum privacy block query scheme with low communication complexity and stability. But at a security parameterlWithin the range of (2), it is required to ensure that each inquiry is successful, so that the inquiring user Alice can obtain the final shared secret key. Once the querying user Alice does not obtain the shared secret key, we need to restart the above key distribution step.
Only when the length islIs/are as followsO j ' When each digit of the sequence is known, the final key can be deducedO j The value of (c).Suppose thatl=2, there are 5 bits of quantum information transmitted.
In thatO j ' In case of satisfying the condition, the final keyO j In the case of =0O j 'There is 000,011,101. Is provided with
Figure 699891DEST_PATH_IMAGE080
Seed length is 2lBinary sequence of +1Q j {00000, 00111, 01011, 01101, 01110, 10011, 10101, 10110, 11001, 11010, 11100, 11111 }. Then final keyO j In case of =1O j 'There is 001,010,100. Therein is provided with
Figure 940379DEST_PATH_IMAGE081
Seed of a plantQ j {00001, 00010, 00011, 00100, 00101, 00110, 01000, 01001, 01010, 01100, 01111, 10000, 10001, 10010, 10100, 10111, 11000, 11011, 11101, 11110 }.
q j The parity sequence is of lengthlIs/are as followsO j . Secret keyq j Decimal number of =1 is converted to binary and then to length
Figure 625438DEST_PATH_IMAGE082
Is subjected to exclusive or (XOR) Operate to obtain the final keyO j . By the scheme, the threat of inquiring the user Alice is reduced, the safety of the whole post-processing is improved, and the quantum privacy block inquiry can be realized.
And S8, retrieving the item information in the database by the inquiry user according to the shared key.
In this embodiment, step S8 specifically includes the following sub-steps:
s81, suppose that the inquiring user Alice wants to inquirei Stripe database entryX j Publishing a shift with a querying user Alices=j-i
S82, using database Bob to encrypt the keyK b Displacement ofs Then obtain the secret keyK b ', and using a secret keyK b ' database entry to be queriedX j Encrypting to obtain database entry information, and transmitting the database entry information to the inquiring user Alice;
s83, using the inquiry user Alice to keyK a Displacement ofs Then obtain the secret keyK a ', and using a secret keyK a ' deciphering database item information to obtain the database item to be inquiredX j
Alice and Bob perform post-processing operations on their original key strings to obtain the lengthNThe final key of (2). The privacy query operation on the final key is as follows:
as described in Table 2, the database will know all of the final keysK b (k b 1 =010, k b 2 =100, k b 3 =011, k b 4 = 110), whereas the querying user knows only one key block
Figure 226053DEST_PATH_IMAGE083
. Assume that the basic unit of the privacy key block lookup is 3, assume that Alice only knowsi=4 key blocksk a 4 =110 and want to queryj=2 query entriesX j . Then a shift is publisheds=i-j. Database will end the keyK b Shift s(s)>0, then shift right; s<0, left shift) to obtainK b And encrypt the query entry (
Figure 312957DEST_PATH_IMAGE084
) And encrypt the resultYIs published to a querying user Alice, who encrypts the entry according to the shift reply asY ’. Alice may then use the known keyk b 4 =110 database entry that can decrypt the desired queryX 2 =010。
TABLE 2
Figure 724347DEST_PATH_IMAGE085
The invention can realize that the inquiry user Alice obtains the multi-bit key information of the database Bob by improving the post-processing process. Different from the traditionkN-NThe post-processing method of (1). The post-processing mode of the invention can more effectively realize the quantum privacy block query, improve the quantum bit query efficiency of the query user Alice, and effectively improve the protocol security of the parity check result of the secret key.
The quantum privacy query method provided by the invention mainly solves the problem of rotary noise interference in a transmission channel, and in the quantum privacy query process, a query user Alice can only inquire according to probability
Figure 631123DEST_PATH_IMAGE086
Guessing the original key of the one-bit database Bob. With division of lengthlTo obtain the inquiry key of the database Bob by the inquiry user AliceO j Will be close to 1, the querying user Alice can get fromO j Is obtained byQ j ' the quantum privacy block queries the results. Through security analysis, the invention can ensure the security of users and databases.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
It will be appreciated by those of ordinary skill in the art that the embodiments described herein are intended to assist the reader in understanding the principles of the invention and are to be construed as being without limitation to such specifically recited embodiments and examples. Those skilled in the art can make various other specific changes and combinations based on the teachings of the present invention without departing from the spirit of the invention, and these changes and combinations are within the scope of the invention.

Claims (2)

1. An agile quantum privacy query method based on anti-rotation noise is characterized by comprising the following steps:
s1, constructing a quantum state of transmission information according to the Bell state by using a database, and generating a particle state sequence, wherein the method specifically comprises the following steps:
using two Bell states
Figure 12931DEST_PATH_IMAGE001
Four quantum states for transmitting information are constructed and respectively expressed as
Figure 150520DEST_PATH_IMAGE002
Figure 970708DEST_PATH_IMAGE003
Figure 323192DEST_PATH_IMAGE004
Figure 954156DEST_PATH_IMAGE005
Wherein the content of the first and second substances,
Figure 329774DEST_PATH_IMAGE006
,
Figure 937341DEST_PATH_IMAGE007
,
Figure 347594DEST_PATH_IMAGE008
,
Figure 461044DEST_PATH_IMAGE009
,
Figure 74690DEST_PATH_IMAGE010
,
Figure 236681DEST_PATH_IMAGE011
,
Figure 485129DEST_PATH_IMAGE012
,
Figure 707162DEST_PATH_IMAGE013
are all quantum states;
s2, detecting particles according to the Bell state structure by using the database, adding the detected particles into the particle state sequence generated in the step S1, generating a mixed sequence and sending the mixed sequence to the inquiry user, wherein the method specifically comprises the following steps:
using two Bell states
Figure 808105DEST_PATH_IMAGE001
Four types of detection particles were constructed, respectively denoted as
Figure 836104DEST_PATH_IMAGE014
Figure 955369DEST_PATH_IMAGE015
Figure 331993DEST_PATH_IMAGE016
Figure 169499DEST_PATH_IMAGE017
Wherein the content of the first and second substances,
Figure 424025DEST_PATH_IMAGE018
,
Figure 663377DEST_PATH_IMAGE019
,
Figure 23951DEST_PATH_IMAGE020
,
Figure 598020DEST_PATH_IMAGE021
,
Figure 905505DEST_PATH_IMAGE022
,
Figure 484516DEST_PATH_IMAGE023
,
Figure 219254DEST_PATH_IMAGE024
,
Figure 15040DEST_PATH_IMAGE025
are all quantum states;
s3, using the inquiry user to perform safety detection according to the detection particles in the mixed sequence, which comprises the following steps:
s31, judging whether the inquiry user receives all the particles in the mixed sequence; if yes, go to step S32; otherwise, the inquiry user is used for publishing the particle position which is not successfully received, and the database is used for resending the particle state of the position;
s32, publishing the positions and the measurement bases of the detection particles by using a database;
s33, using query user to adoptZ L A base andX L measuring the detection particles based on the base measurement, and publishing the measurement result to a database;
s34, comparing the received measurement result with the initial particle state by using the database, and judging whether the error probability exceeds a preset threshold value; if yes, restarting the quantum communication protocol; otherwise, performing step S4;
s4, discarding all the detection particles by using the inquiry user, and measuring the residual particles by using the measurement basis;
s5, publishing classical information by using a database according to the quantum state sent in the step S2, specifically:
if the quantum state sent by the database in step S2 is
Figure 188533DEST_PATH_IMAGE026
And
Figure 136897DEST_PATH_IMAGE027
then the classical information 0 is published by using a database; otherwise, the classical information 1 is disclosed by using a database;
s6, obtaining an original key by using the inquiry user according to the measurement result of the step S4 and the classical information published in the step S5;
s7, setting security parameters, dividing the original key into key sequences with the length of the security parameters, converting decimal numbers of the key sequences into binary numbers, and carrying out XOR operation on the binary numbers to obtain a shared key, which specifically comprises the following sub-steps:
s71, setting safety parameterslThe original key is encryptedR Division into lengthsl Is expressed as
Figure 793269DEST_PATH_IMAGE028
Wherein the content of the first and second substances,mis a variable of the integer type, and the integer type,q j m-q j m+respectively, of the original keyj-mj+mA bit key;
s72, key sequence
Figure 827084DEST_PATH_IMAGE029
Is converted into a binary number, expressed as
Figure 725639DEST_PATH_IMAGE030
Wherein the content of the first and second substances,
Figure 590826DEST_PATH_IMAGE031
for the purpose of the binary-converted shared secret,
Figure 667367DEST_PATH_IMAGE032
obtained for binary conversion
Figure 927492DEST_PATH_IMAGE033
The bit key is a key of a bit,
Figure 114891DEST_PATH_IMAGE034
is a binary number
Figure 287115DEST_PATH_IMAGE035
Length of (d);
s73, binary number pair
Figure 534557DEST_PATH_IMAGE035
Performing an XOR operation to obtain a shared secret, denoted as
Figure 605281DEST_PATH_IMAGE036
Wherein the content of the first and second substances,
Figure 284786DEST_PATH_IMAGE037
is thatQ j Each bit of (1);
and S8, retrieving the item information in the database by the inquiry user according to the shared key.
2. The anti-rotation-noise-based agile quantum privacy query method according to claim 1, wherein the step S8 specifically comprises the following substeps:
s81, suppose the inquiring user wants to inquirei Stripe database entryX j Publishing a shift with a querying users=j-i
S82, using database to encrypt the keyK b Displacement ofsThen obtain the secret keyK b ', and using a secret keyK b ' database entry to be queriedX j Encrypting to obtain database entry information, and transmitting the database entry information to a query user;
s83, using inquiry user to keyK a Displacement ofsThen obtain the secret keyK a ', and using a secret keyK a ' deciphering database item information to obtain the database item to be inquiredX j
CN202110010363.3A 2021-01-06 2021-01-06 Agile quantum privacy query method based on anti-rotation noise Active CN112332988B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110010363.3A CN112332988B (en) 2021-01-06 2021-01-06 Agile quantum privacy query method based on anti-rotation noise

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110010363.3A CN112332988B (en) 2021-01-06 2021-01-06 Agile quantum privacy query method based on anti-rotation noise

Publications (2)

Publication Number Publication Date
CN112332988A CN112332988A (en) 2021-02-05
CN112332988B true CN112332988B (en) 2021-03-16

Family

ID=74302492

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110010363.3A Active CN112332988B (en) 2021-01-06 2021-01-06 Agile quantum privacy query method based on anti-rotation noise

Country Status (1)

Country Link
CN (1) CN112332988B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114422122A (en) * 2021-12-23 2022-04-29 山东工商学院 Quantum key negotiation method and system with semi-trusted third party

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105245332A (en) * 2015-10-21 2016-01-13 西安邮电大学 Four-particle x state-based two-party quantum key agreement protocol
CN105898686A (en) * 2016-06-12 2016-08-24 成都信息工程大学 Radio link failure recovery method and user equipment
CN107493170A (en) * 2017-10-18 2017-12-19 浙江工商大学 Secure quantum summation method based on Quantum fourier transform
CN107493168A (en) * 2017-09-07 2017-12-19 中国电子科技集团公司第三十研究所 Quanta identity authentication method and its application process during quantum key distribution
CN108768641A (en) * 2018-06-12 2018-11-06 成都信息工程大学 A kind of quantum privacy comparative approach and system based on GHZ states
CN109714158A (en) * 2018-12-21 2019-05-03 成都信息工程大学 A kind of half quantum privacy comparative approach and system based on Bell state
CN110247763A (en) * 2019-06-20 2019-09-17 安徽继远软件有限公司 A kind of quantum secure querying method for resisting combined measurement attack
US10572684B2 (en) * 2013-11-01 2020-02-25 Anonos Inc. Systems and methods for enforcing centralized privacy controls in de-centralized systems

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8126830B2 (en) * 2007-07-03 2012-02-28 Seth Lloyd Method for ensuring privacy while querying a database by using quantum superposition and multiple responses
CN103023578B (en) * 2012-12-11 2016-04-20 上海卫星工程研究所 Based on the survey of deep space communication system of optical quantum communication technology
CN103338187B (en) * 2013-06-03 2016-03-23 浙江工商大学 Based on any two GHZ state entanglement transfer results sets coding without information leakage two-way quantum secure direct communication method
CN104104503B (en) * 2014-07-22 2017-07-21 浙江工商大学 The fault tolerant single channel encryption quantum dialogue method of phase noise moves back in anti-collective
US10715319B2 (en) * 2016-12-15 2020-07-14 Universite Paris Diderot Method and system for spacetime-constrained oblivious transfer
CN109474417B (en) * 2018-10-29 2020-05-22 成都信息工程大学 Efficient quantum privacy comparison method and system
CN109274495B (en) * 2018-12-03 2020-04-28 成都信息工程大学 Two Bell state-based semi-quantum secure direct communication methods

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10572684B2 (en) * 2013-11-01 2020-02-25 Anonos Inc. Systems and methods for enforcing centralized privacy controls in de-centralized systems
CN105245332A (en) * 2015-10-21 2016-01-13 西安邮电大学 Four-particle x state-based two-party quantum key agreement protocol
CN105898686A (en) * 2016-06-12 2016-08-24 成都信息工程大学 Radio link failure recovery method and user equipment
CN107493168A (en) * 2017-09-07 2017-12-19 中国电子科技集团公司第三十研究所 Quanta identity authentication method and its application process during quantum key distribution
CN107493170A (en) * 2017-10-18 2017-12-19 浙江工商大学 Secure quantum summation method based on Quantum fourier transform
CN108768641A (en) * 2018-06-12 2018-11-06 成都信息工程大学 A kind of quantum privacy comparative approach and system based on GHZ states
CN109714158A (en) * 2018-12-21 2019-05-03 成都信息工程大学 A kind of half quantum privacy comparative approach and system based on Bell state
CN110247763A (en) * 2019-06-20 2019-09-17 安徽继远软件有限公司 A kind of quantum secure querying method for resisting combined measurement attack

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
A Practical Quantum Private Query Protocol Based on Bell States and Single Photons;Dong-Mei Liu et al;《Springer 》;20201231;全文 *
Practi cal quantum pri vate query based o n B el l s tate;tao zheng et al;《World Scientific》;20191231;全文 *
基于 Be l l 态的量子隐私查询与双向身份认证方案;张仕斌;《计算机应用与软件》;20190731;全文 *
量子 BB84 协议在联合旋转噪音信道上的安全性分析;李剑等;《物理学报》;20161231;全文 *

Also Published As

Publication number Publication date
CN112332988A (en) 2021-02-05

Similar Documents

Publication Publication Date Title
Xia et al. Quantum dialogue by using the GHZ state
CN110929294B (en) One-way transmission quantum database privacy query method
US10511581B2 (en) Parallelizable encryption using keyless random permutations and authentication using same
CN105553648A (en) Quantum key distribution, privacy amplification and data transmission methods, apparatuses, and system
US8180048B2 (en) Method and system for computational transformation
CN105027492B (en) For determining equipment, the method and system of shared key
CN110932792B (en) Bell state-based two-way communication quantum database privacy query method
Li et al. Efficient multi-key FHE with short extended ciphertexts and directed decryption protocol
Li et al. Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol
Sun et al. Efficient Multiparty Quantum Key Agreement With a Single $ d $-Level Quantum System Secure Against Collusive Attack
Yan et al. Mutual semi-quantum key agreement protocol using Bell states
CN112332988B (en) Agile quantum privacy query method based on anti-rotation noise
Huang et al. Quantum secure direct communication based on quantum homomorphic encryption
CN114564730A (en) Symmetric encryption-based federal packet statistic calculation method, device and medium
Hwang et al. Robust stream‐cipher mode of authenticated encryption for secure communication in wireless sensor network
CN116471012A (en) Single-state multi-party half-quantum secret sharing method based on d-dimensional Bell state
CN112332987B (en) Cloud quantum privacy query method based on user agent
Vohra et al. An efficient chaos-based optimization algorithm approach for cryptography
Yang et al. One-round semi-quantum-honest key agreement scheme in MSTSA structure without entanglement
Rostom et al. Quantum cryptography and chaos for the transmission of security keys in 802.11 networks
CN113923029B (en) Internet of things information encryption method based on ECC (error correction code) hybrid algorithm
Qawaqneh et al. A new hardware quantum-based encryption algorithm
Lee The key distribution problem: Prior advances and future challenges
Wei et al. Secure Private Comparison of Equality using Quantum Resources
Abulkasim et al. Research Article Cryptanalysis and Improvements on Quantum Key Agreement Protocol Based on Quantum Search Algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant