Quantum method for safely calculating Hamming distance based on Bell state

A Hamming distance and security technology, applied in the field of modern cryptography, can solve the problems of computational complexity, quantum computer difficulty, no longer security, and inability to resist quantum computer attacks, etc., to achieve unconditional privacy, simplified operation, and realizability strong effect

Active Publication Date: 2018-06-01
ANHUI UNIVERSITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But these difficult problems based on computational complexity will not be difficult for quantum computers
That is to say, none of the existing methods for safely calculating the Hamming distance can resist the attack of quantum computers.
Therefore, after entering the new quantum era, these methods of calculating Hamming distance based on classical homomorphic encryption will become no longer safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum method for safely calculating Hamming distance based on Bell state
  • Quantum method for safely calculating Hamming distance based on Bell state
  • Quantum method for safely calculating Hamming distance based on Bell state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In this embodiment, a quantum method for safely calculating the Hamming distance based on the Bell state is that there are two participants Alice and Bob and an agent Charlie, assuming that the agent Charlie does not conspire with any participant; the participant Alice has a A private bit string X of length n, the bit string X is defined as X={x(1),x(2),...,x(i),...,x(n)}, where x (i) represents the i-th component of the bit string X, i=1,2,...,n; the participant Bob has a private bit string Y of length n, and the bit string Y is defined as Y={y (1), y(2),...,y(i),...,y(n)}, wherein, y(i) represents the i-th component in the bit string Y, i=1,2 ,...,n; the quantum method is carried out as follows:

[0047] Step 1. Participant Alice and participant Bob call the quantum key distribution QKD protocol to share an n-bit key K. Participant Alice uses formula (1) to calculate the i-th component x in the ciphertext vector of the bit string X * (i), so as to obtain the ciphert...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum method for safely calculating a Hamming distance based on a Bell state. The method is characterized by having an agent and two participants, wherein each of the participants has a private bit string, the participants call a quantum key distribution (QKD) protocol to share a key K, the agent prepares n pairs of EPR particles, each pair of entangled particles separately obtain two sequences H and T; the agent secretly saves the sequence H and safely transmits the sequence T to the two participants through a quantum channel; the two participants perform a corresponding single particle unitary operation on the sequence T and return the sequence T to the agent; and finally, through the measurement results of all particle pairs, the agent counts the Hamming distance between the two participants. The method can calculate the Hamming distance simply and quickly with few quantum resources, thereby obtaining a Hamming distance calculating solution that can resist the quantum attack.

Description

technical field [0001] The invention belongs to the application field of modern cryptography, in particular to a quantum method for safely calculating the Hamming distance based on a Bell state. Background technique [0002] The calculation method of privacy-preserving Hamming distance plays a very important role in modern cryptography. The classical calculation method of privacy-preserving Hamming distance usually adopts homomorphic encryption technology. [0003] Calculate the Hamming distance ( Hamming The basic principle of distance) is to XOR the corresponding bits of two codewords or bit strings, and then count the number of 1s in the XOR result. The accumulator can be used to count the number of 1s in the XOR result, and the implementation schemes include: a carry-ahead adder scheme, a cascaded full addition scheme, and a carry-save addition array scheme. Through the analysis of the performance and resource consumption of the three schemes, it is concluded that the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/002H04L9/008H04L9/0852H04L9/0858
Inventor 石润华王晴王圣兰王攀红张顺
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products