Quantum secret sharing method capable of resisting intercept-resend attack, man-in-the-middle attack and entanglement attack

A quantum secret and man-in-the-middle technology, applied in the field of information security

Active Publication Date: 2017-05-17
CHENGDU UNIV OF INFORMATION TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above quantum secret sharing schemes are all designed using quantum entanglement based on the Bell state, or the result of deforming the entanglement of two particles, and the entanglement relationship is only used in the secret sharing of two users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum secret sharing method capable of resisting intercept-resend attack, man-in-the-middle attack and entanglement attack
  • Quantum secret sharing method capable of resisting intercept-resend attack, man-in-the-middle attack and entanglement attack
  • Quantum secret sharing method capable of resisting intercept-resend attack, man-in-the-middle attack and entanglement attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0022] The secret sharing system proposed by the present invention is a (4,4) secret sharing protocol based on the five-particle GHZ state, that is, the secret information is distributed to 4 different participants, and when it is necessary to obtain the secret information, the 4 participants need to jointly Cooperation. After security analysis, the protocol can resist interception and retransmission attack, man-in-the-middle attack and entanglement attack, which proves the security of the protocol.

[0023] The application principle of the present invention will be described in detail below in conjunction with the accompa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security, and discloses a quantum secret sharing method capable of resisting an intercept-resend attack, a man-in-the-middle attack and an entanglement attack. A secret sharing protocol is designed by utilizing the special characteristic that a five-particle GHZ state has the correlation in an X group. According to the protocol, secret information is split into four parts, the four parts are delivered to four participators to be cared, and the secret information can be decrypted only when the four participators all take participate in. After analysis, the feasibility of the protocol is proved. Security analysis shows that the protocol can resist the intercept-resend attack, the man-in-the-middle attack and the entanglement attack. And meanwhile the trust problem of the participators is analyzed, and it shows that the protocol is secure.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a quantum secret sharing method capable of resisting interception and retransmission, man-in-the-middle and entanglement attacks. Background technique [0002] In some occasions, such as the launch of missiles, the effectiveness of wills, and the need to use funds in a joint account in a bank, in order to strengthen the security of some information or reduce risks, multiple people will be asked to jointly hold confidentiality information. Based on this scenario, people have designed a secret protection method called secret sharing. In the secret sharing agreement, the secret information is divided into several parts according to certain rules, and each part is allocated to different participants for safekeeping. When the secret information needs to be used, it must be shared by the holder of the confidential information. Get secret information. In 1998...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/085H04L9/0852
Inventor 张仕斌江英华昌燕宋海权杨帆
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products