Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum identity authentication method, computer, computer program and readable storage medium

An identity authentication and computer technology, applied in the field of quantum communication, can solve the problem that quantum storage does not meet the technical conditions of quantum identity authentication protocol.

Inactive Publication Date: 2018-05-29
CHENGDU UNIV OF INFORMATION TECH
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Many of the current quantum identity authentication protocols are combined with classical identity authentication. Many of them have borrowed from the classic identity authentication model and introduced a trusted third party. Not only that, but under the current experimental conditions, quantum manipulation technology and quantum storage are far from being achieved. Technical conditions required by some quantum identity authentication protocols

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum identity authentication method, computer, computer program and readable storage medium
  • Quantum identity authentication method, computer, computer program and readable storage medium
  • Quantum identity authentication method, computer, computer program and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] Many of the current quantum identity authentication protocols are combined with classical identity authentication, and many of them have borrowed from the classic identity authentication model and introduced a trusted third party. Not only that, but under the current experimental conditions, quantum manipulation technology and quantum storage are far from being achieved. The technical conditions required by some quantum identity authentication protocols.

[0030] Such as figure 1 As shown, the quantum identity authentication method provided by the embodiment of the present invention includes the following steps:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of quantum communications, and discloses a quantum identity authentication method, a computer, a computer program and a readable storage medium. The methodcomprises the steps that binary identity strings of both sides are used for preparing two groups of particle sequences according to specified rules; Alice sends a first particle used for preparing aBell-state particle sequence to Bob, and Bob sends a second particle used for preparing the Bell-state particle sequence to Alice; Bell-based measurement is conducted on particles in the two sides, and the measurement results are subjected to binary representation. In the identity authentication process, no unitary transformation is needed in the Bell-state transmission process, and information transmission can be achieved simply by executing Bell-state measurement and a bitwise exclusive OR operation. In practical application, achievement of the protocol is achieved by only depending on Bell-state accurate preparation and Bell-state reliable measurement, and the protocol can resist impersonation attack.

Description

technical field [0001] The invention belongs to the technical field of quantum communication, and in particular relates to a quantum identity authentication method, a computer, a computer program, and a readable storage medium. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] Since Bennett and Brassard proposed the quantum key distribution (QKD) protocol (referred to as "BB84 protocol") to open up quantum cryptography, in order to adapt to various uses and solve emerging information security problems, a large number of quantum cryptography protocols have been proposed, mainly Including: Quantum Secret Sharing (Quantum Secret Sharing, QSS), Quantum Secure Direct Communication (Quantum Secure Direct Communication, QSDC) Quantum Identity Authentication (Quantum Identity Authentication, QIA) and other aspects of research. Quantum communication is one of the most important applications in the quantum fiel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0819H04L9/0852H04L63/0876
Inventor 熊金鑫昌燕张仕斌张焱
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products