Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A Quantum Secret Sharing Method Based on Bell State

A quantum secret and secret technology, applied in the field of quantum secret sharing based on the Bell state, can solve the problems of high measurement frequency and measurement difficulty, large number of security detection, and poor practicability, etc., to reduce storage The cost, the number of measurements and the difficulty of measurement, the effect of reducing the number of times and difficulty, and reducing the computational complexity

Inactive Publication Date: 2018-01-23
ANHUI UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are many quantum secret sharing schemes that only provide a theoretically possible scheme, which is difficult to realize based on the existing experimental technical conditions. For example, using the maximum entangled state of N particles as a quantum resource requires the implementation of complex quantum Unitary transformation requires projection measurement or von Neumann measurement in N-dimensional Hilbert space, etc.
However, some experimentally feasible quantum secret sharing schemes are not recognized due to low efficiency or some security risks. Unable to resist collusion attacks by participants, etc.
In fact, the existing quantum secret sharing schemes seldom consider quantum and classical resource consumption, storage cost, operation complexity, security and practicality, etc., so the practicability is not strong
In addition, the calculation and communication overhead are large, the operation is more complicated, and the degree of security and privacy protection is not high enough
In particular, the sender and receiver of each communication need to check the security of the quantum channel and whether there is fraud of the participants, so the number of security checks is usually large, so the efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Quantum Secret Sharing Method Based on Bell State
  • A Quantum Secret Sharing Method Based on Bell State
  • A Quantum Secret Sharing Method Based on Bell State

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In this embodiment, a quantum secret sharing method based on the Bell state is that there is a secret distributor Alice, and n participants P 1 ,P 2 ,...,P i ,...,P n ;P i Indicates the i-th participant; 1≤i≤n; the secret distributor Alic distributes a random secret to n participants, and each participant obtains a sub-secret, when n participants share all their sub-secrets When stacked together, the original shared secret can be recovered, and less than n participants will not get any information about the shared secret. The present invention uses the Bell state as a quantum resource, wherein one particle in each Bell state is stored in the quantum register of the secret distributor, and the other particle is transmitted to each participant in a random order, and each participant Performs a single-particle unitary operation on each particle received. Finally, when all the particles are sent back to the secret distributor, the secret distributor Alic performs Bell-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum secret sharing method based on a Bell state. The quantum secret sharing method is characterized by comprising a secret distributor and n participants, the secret distributor distributes a random secret to the n participants, wherein each participant obtains a sub-secret, when the n participants accumulate all sub-secrets, the originally shared secret can be restored, and any information of the shared secret cannot be obtained less than n participants. By adoption of the quantum secret sharing method disclosed by the invention, the problems of participant fraud, low security, complexity and efficiency of channels in the existing quantum secret sharing process are solved, the quantum and classical resources can be saved, the operation complexity is reduced, and higher quantum efficiency is ensured.

Description

technical field [0001] The invention belongs to the field of secure multi-party calculation and modern cryptography application, in particular to a Bell state-based quantum secret sharing method. Background technique [0002] Secret sharing plays a fundamental role in secure multi-party computing and modern cryptography, and is an important atomic protocol in secure multi-party computing. A secret sharing scheme usually consists of two algorithms: a secret share distribution algorithm and a secret recovery algorithm. In the secret share distribution algorithm, the distributor divides the secret into several shares and distributes them among a group of participants, so that each participant gets one of the secret shares. In the secret recovery algorithm, only some specific subset of participants (authorized subset) can recover the secret, and other non-authorized subsets cannot recover the secret, or even get any useful information about the secret. [0003] Classical secre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/085H04L9/0852
Inventor 石润华彭振皖仲红崔杰张顺
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products