Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum digital signature method

A quantum digital signature and digital signature technology, applied in the field of quantum security, can solve the problems of long key length, poor system compatibility, and inability to meet the security of the digital signature scheme, and achieve the improvement of signature efficiency, high efficiency and security. Effect

Active Publication Date: 2021-08-24
NANJING UNIV +1
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security of existing digital signature schemes cannot meet the requirements of the current rapidly developing digital society
In addition, when signing long messages, the existing schemes have the disadvantages of long key length and low resource utilization
[0004] In order to deal with the above threats, secure quantum digital signatures have emerged as the times require, and have attracted much attention as a method to solve security problems, but various solutions have problems such as low signature efficiency and poor system compatibility.
Chinese patent literature, publication number CN105007158B, discloses a quantum digital signature method and system, but its system operation complexity and signature efficiency are still not satisfactory, and a large number of keys are required to sign one bit of information, which is not practical
In addition, how to unconditionally securely sign messages of arbitrary length is an open problem
[0005] Therefore, the security of the existing classical digital signature scheme cannot meet the requirements of the current rapidly developing digital society. In addition, when the unconditional quantum digital signature is used to sign long messages, the existing scheme will have a key length that is too long , resource utilization is too low, system compatibility is poor, security needs to be clarified, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum digital signature method
  • Quantum digital signature method
  • Quantum digital signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] The preferred technologies in this embodiment include: quantum secret sharing, LFSR-Toeplitz hash function for each signature update, and one-time pad unconditionally secure XOR encryption.

[0040] The present embodiment adopts the digital signature method based on 128 bit LFSR-Toeplitz matrix, and described method comprises the following steps:

[0041] Step 1, prepare the key. Alice, Bob, and Charlie each hold two 128-bit key strings. These 6 strings of keys are divided into two groups, denoted as X group and Y Group. The two strings of keys held by Alice are denoted as X A , Y A . Similarly, Bob holds X B and Y B , Charlie holds X C and Y C . The satisfying relationship between these keys is: only hold X B and X C to infer X A , while holding Y B and Y C to infer Y A . Preferably, quantum secret sharing technology is selected in the key preparation stage, and the schematic diagram of secret sharing is shown in the attached Figure 4 ; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum digital signature method, and belongs to the technical field of quantum security. In order to solve the problem that in the prior art, the security of a digital signature protocol and the efficiency of signing a message are generally not high, the invention provides a quantum digital signature method which comprises the following three steps: preparing a secret key, generating a signature and verifying the signature. The technical scheme provided by the invention is a real unconditional security scheme, solves the problem of low efficiency of the existing unconditional security digital signature protocol, has strong compatibility, can be realized by using various systems, can be realized in the current system, can be harmonious and free in the future quantum internet system, and has very strong application range and prospect in the present stage and in the future.

Description

technical field [0001] The present invention relates to the technical field of quantum security, and more specifically, relates to a quantum digital signature method based on Universal Hash, one-time pad and secret sharing technologies. Background technique [0002] Digital signature is an authentication method for the authenticity of messages that has emerged with the rapid development of social digitalization and informatization. It can verify whether the message has been tampered with during the transmission process, and ensure the integrity, authenticity and authenticity of data transmission. Denial. For example, the popularity of e-commerce and e-government such as PayPal, Venmo, Amazon, and Alipay is based on the security of user data. Specifically, these applications that provide mobile payment, e-commerce, and e-government solutions aim to ensure the confidentiality, integrity, non-repudiation, and authenticity of data, and cryptography plays an integral role in it....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/60G06F21/45G06N10/00
CPCG06F21/64G06F21/602G06F21/45G06N10/00
Inventor 尹华磊富尧陈增兵
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products