Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Quantum Swarm Authentication Method Based on Grover Algorithm

An authentication method, quantum technology, applied in user identity/authority verification, digital transmission systems, secure communication devices, etc., can solve problems such as low efficiency, low, waste of classical resources and quantum resources, etc., to achieve less quantum transmission times, improve Safety, the effect of ensuring safety

Active Publication Date: 2021-11-16
CHONGQING UNIV OF POSTS & TELECOMM
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The rotation operator and projection operator in the algorithm have high research value, and some existing quantum associative memory models and quantum machine learning algorithms use the idea of ​​the Grover algorithm, but the group identity authentication scheme based on the Grover algorithm still has No, especially the characteristics of the Grover operator can actually be combined with the threshold idea as a group identity authentication algorithm
[0004] In recent years, the research on quantum identity authentication schemes proposed by quantum technology has been increasing, but most of the existing quantum authentication schemes consider the identity authentication of both quantum communication parties. If multiple users participate in the authentication, the authentication process needs to be carried out multiple times. Iterative authentication is inefficient, wastes classical resources and quantum resources, and cannot authenticate multiple user identities at the same time
[0005] This authentication method is proposed to solve the defects and inefficiencies that the existing quantum authentication schemes cannot simultaneously authenticate multi-user identities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Quantum Swarm Authentication Method Based on Grover Algorithm
  • A Quantum Swarm Authentication Method Based on Grover Algorithm
  • A Quantum Swarm Authentication Method Based on Grover Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0048] The invention provides a quantum group authentication method based on the Grover algorithm, comprising the following steps:

[0049] S1. The authentication management center prepares the authentication quantum state for the network group. The quantum state is a two-particle state, expressed as |S w >

[0050] S2. The authentication management center randomly generates n private shares and group authentication codes according to the Shamir(t,n) threshol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of quantum computing and quantum authentication, and relates to a quantum group authentication method based on the Grover algorithm. A private share is used as the identity information of the registered user and sent to the registered user through the classic channel, and a group identifier is generated for the network group and sent to the network group through the classic channel; in the authentication stage, each user participating in the authentication according to his own identity information Carry out unitary transformation to the authentication quantum state with the group identifier, and finally the group returns the authentication quantum state after the unitary transformation to the authentication management center for comparison to obtain the authentication result; the present invention uses the Grover operator, and the Grover operator The usage of the system has been extended, and the group user identity and the network group identifier can be authenticated at the same time, and the double authentication improves the security of the authentication method.

Description

technical field [0001] The invention belongs to the technical field of quantum computing and quantum authentication, and relates to a quantum group authentication method based on a Grover algorithm. Background technique [0002] As we all know, authentication is an effective method to ensure the integrity of transmitted information, and identity authentication technology is often used in specific scenarios such as e-commerce and voting, and has a very wide range of application scenarios in real life. The security of traditional authentication protocols is mostly based on the computational complexity of discrete logarithms, quadratic residues, and factorization of large numbers in classical cryptography. However, with the rapid development of quantum technology in recent years, the powerful computing power of quantum computers poses a huge challenge to the security of these classical protocols. The quantum encryption technology in the contemporary background is based on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0852H04L9/3278H04L63/0876
Inventor 宋秀丽曹耘凡周道洋
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products