Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum trust model construction method and computer-readable storage medium

A trust model and construction method technology, applied to secure communication devices and key distribution, can solve problems such as weak anti-channel interference, collapse, and quantum resource degradation, so as to achieve good particle usage efficiency, resist noise interference, and save quantum resources Effect

Active Publication Date: 2021-03-05
陕西云尚金拓网络科技有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The particle usage efficiency of the protocol is low, resulting in insufficient practical value of the protocol
[0006] (2) The anti-channel interference ability of the protocol is weak
It is easy to cause quantum resources to degrade or even collapse during the use of the protocol
[0007] (3) The steps of the existing quantum trust evaluation model are relatively complicated
[0008] (4) Some quantum evaluation models have a low safety factor and cannot resist attack strategies such as interception and retransmission attacks, making the protocol
[0009] (5) None of the existing technical solutions considers the issue of identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum trust model construction method and computer-readable storage medium
  • Quantum trust model construction method and computer-readable storage medium
  • Quantum trust model construction method and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] 1. Program theory knowledge

[0089] 1.1 Quantum trust model based on node trust evaluation

[0090] In the quantum communication network trust, the present invention mainly analyzes two interrelated trust relationships:

[0091] (1) Target trust (trust of target nodes) is evidence-based trust, which can be accurately described, inferred and verified.

[0092] (2) Subjective trust (the trust of the subject node, that is, the mixture of individuals, groups or people and object nodes), as a cognitive phenomenon, is the subjective judgment and subjective belief of specific characteristics or behaviors on the subject node. This subjective judgment is independent of the monitoring of the subject's personality and behavior. Subjective trust is the premise of objective trust, and objective trust is based on trust with great uncertainty (expressed as randomness, ambiguity and diversity). It is difficult to accurately describe and verify. Therefore, the difficulty in formali...

Embodiment 2

[0134] Example 2: Protocol Analysis

[0135] 1), internal attack

[0136] Suppose node u cooperates with attacker Eve to deceive node v, and Eve intercepts the particle pair sent by STP to node v. However, neither node u nor Eve can successfully restore the proper particle state required by Quantum Teleportation. Moreover, both STP and node v can judge node u by calculating its trust value when it is registered, so internal attacks will not be able to obtain any useful information and will definitely be detected.

[0137] 2), external attack

[0138] Analyzing the protocol steps shows that if the external attacker Eve wants to forge the trust value |ψ> AB , then Eve must obtain the key Key uT and Key vT Information. However, QKD and the one-time pad (QOTP) cipher book guarantee the absolute security of the key. Assume that Eve has obtained the information of the two keys, but without the assistance of STP, Eve still cannot obtain any useful information about the six-par...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of quantum communication network technology, and discloses a method and system for constructing a quantum trust model based on node trust evaluation. A trusted third party is introduced into the trusted relay network, and the trust degree between nodes can be evaluated by using TTP; Before the communication between nodes, the trust value of the node is calculated according to the properties of the node. The trust value is obtained through quantum entanglement and quantum teleportation; by calculating the trust value of the node, it can be judged whether the node is trustworthy. The present invention can realize a relatively efficient quantum trust evaluation model under the existing technical conditions. By using the six-particle GHZ state entanglement system, it can resist the noise interference existing in the quantum channel; through the operation of STP, the relationship between the two nodes u and v The process of trust evaluation between the two has been greatly simplified; by using QT, combined with the shared key pair, the security performance of the protocol can be greatly improved.

Description

technical field [0001] The invention belongs to the technical field of quantum communication networks, and in particular relates to a method and system for constructing a quantum trust model based on node trust evaluation. Background technique [0002] At present, the closest existing technology: in the modern information society, the classical cryptographic system based on complex mathematical calculations provides security for various application scenarios. With the rapid development of quantum technology, the emergence of quantum computers will make the existing encryption system vulnerable. Quantum cryptography builds an unconditionally secure cryptographic system based on the physical characteristics of quantum mechanics, such as the uncertainty principle and the quantum uncertainty principle. In 1984, Bennett and Brassard proposed the first quantum key distribution protocol, followed by quantum secret sharing (quantum secretsharing, QSS), quantum teleportation (quantu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852
Inventor 张仕斌郑涛昌燕闫丽丽
Owner 陕西云尚金拓网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products