Efficient Key Agreement Method and System Based on Fourier Transform

A Fourier transform and key agreement technology, applied in the field of efficient key agreement methods and systems based on Fourier transform, can solve the problems of weak security, difficult state of multi-particle entanglement, low communication efficiency, etc. High security, improved quantum communication efficiency, and enhanced security effects

Active Publication Date: 2021-10-08
CHENGDU UNIV OF INFORMATION TECH
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the document with the patent application number of 2019104472790 also proposes a two-party quantum key agreement method and system based on the Bell state. This method is also based on half-quantum, but it requires half-quantum users to configure quantum memory to complete the key agreement. , it is impossible for the user to complete the negotiation without memory, the application range is limited and the communication efficiency is low
In addition, the current half-quantum key agreement schemes are mostly realized based on two-dimensional quantum states, that is, the quantum states are composed of { , }, and it is necessary to prepare an entangled state to achieve key agreement. This type of scheme is based on multi-particle entangled states, and the communication efficiency is low and the security is weak. The amount of information that can be represented by one particle in the transmitted particle sequence is only 2 The probability that the attacker guesses the state of the particle is 1 / 2, that is, the attacker has half the probability of obtaining the transmitted quantum information; there are also some existing key agreement schemes that need to prepare multi-particle Entangled state, but the multi-particle entangled state is difficult to prepare and the state is unstable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient Key Agreement Method and System Based on Fourier Transform
  • Efficient Key Agreement Method and System Based on Fourier Transform
  • Efficient Key Agreement Method and System Based on Fourier Transform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] This embodiment discloses a high-efficiency key agreement system based on Fourier transform, and its structure diagram refers to figure 1 , the system includes full quantum user 1 and half quantum user 2; full quantum user 1 includes a first subkey generation module 11, an initial particle module 12, a rearrangement module 13, an eavesdropping detection module 14, and a first negotiated key module 15 ;

[0051] The semi-quantum user includes a second sub-key generation module 21, an execution operation module 22, and a second negotiated key module 23; wherein,

[0052] The first subkey generating module 11 is used to randomly generate the first subkey;

[0053] The second subkey generating module 21 is used to randomly generate the second subkey;

[0054] The initial particle module 12 is used to generate a plurality of single particles, and randomly arranges the single particles to generate a quantum sequence and publishes them; 4n single particles are generated in t...

Embodiment 2

[0061] Based on the system of Embodiment 1, an efficient key agreement method based on Fourier transform is provided in this embodiment. The step-by-step flowchart of this method can be referred to figure 2 , including steps:

[0062] S1: The full quantum user and the half quantum user randomly generate the first subkey and the second subkey respectively;

[0063] The method in this embodiment is based on the key agreement between two users, where the full quantum user (Alice) is a full quantum node with complete quantum functions, and the half quantum user (Bob) is a half quantum node;

[0064] In this step, Alice and Bob randomly generate their respective subkeys for generating the final key: the first subkey and the second subkey ,in Represent Alice and Bob keys respectively and The a-th and b-th elements in , , , n is a positive integer, and d is a positive integer, which can be selected according to needs. Generally, when d is 8, it can meet the actual appl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a high-efficiency key agreement method and system based on Fourier transform. The method realizes the key agreement between two users Alice and Bob based on high-dimensional quantum, wherein Alice is a full quantum node with complete quantum function, and Bob is a semi-quantum node; where Bob randomly reflects the particles sent by Alice back to the sending end or returns after performing a unitary operation, and at the same time shifts through the delay technology to disrupt the order of the returned particles, and Alice receives the random After the particles are sequenced, relevant operations are performed, and the key agreement is finally completed. The method in the invention has high communication efficiency, can resist most attacks, has strong security and is easy to implement.

Description

technical field [0001] The invention belongs to the technical field of key agreement, and in particular relates to an efficient key agreement method and system based on Fourier transform. Background technique [0002] Key management is an extremely important research field in cryptography, among which key establishment mainly studies how to securely and efficiently generate session keys between transmission entities. According to different ways of generating session keys, key establishment methods can be divided into two categories: key distribution and key agreement. The problems to be solved by key distribution and key agreement are quite different, especially in group user communication, and the execution purposes of the two schemes are particularly different. In the key distribution scheme, the key is generated by a key distributor (participant or third party), and it is secretly sent to other participants through a secure channel; while in the key agreement scheme, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08G06F17/14
CPCG06F17/14H04L9/0838H04L9/0852
Inventor 闫丽丽刘冬梅张仕斌昌燕
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products