Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity authentication method based on quantum walking and related equipment

A quantum walk, identity authentication technology, applied in user identity/authority verification, key distribution, can solve the problems of encryption algorithm no longer safe, multiple physical resources, leakage, etc., to achieve less physical resource consumption, improve security, and avoid risks leaked effect

Active Publication Date: 2021-10-19
HUNAN NORMAL UNIVERSITY
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The third-generation identity authentication technology was proposed in the context of the rapid development of the high-speed mobile Internet, mainly focusing on emerging fields such as biological feature recognition, big data user behavior analysis, and quantum encryption. , Discrete logarithm problems, and many encryption algorithms are no longer safe, and the current identity authentication technology is facing great challenges
However, the entangled state sequence contains the key information, and there is a risk of leakage during the distribution process. At the same time, the preparation of the entangled state requires more physical resources than the preparation of single photons.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on quantum walking and related equipment
  • Identity authentication method based on quantum walking and related equipment
  • Identity authentication method based on quantum walking and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] Identity authentication pass case:

[0091] The single photon sequence obtained by the participants Alice and Bob is as follows:

[0092]

[0093]

[0094] Prepared by the third-party certification body Charlie As follows:

[0095]

[0096] At the same time, assuming first with Perform a quantum walk, and then with Do a quantum walk. The results after the two-step quantum walk are shown in Table 2.

[0097] Table 2 Execution process of certified cases

[0098]

[0099] It can be seen from Table 2 that The measurement result is the same as the initial state, and the parties Alice and Bob are authenticated.

Embodiment 2

[0101] Identity authentication failed case:

[0102] Assume that the single photon sequence obtained by the participants Alice and Bob is as follows:

[0103]

[0104]

[0105] Prepared by the third-party certification body Charlie As follows:

[0106]

[0107] At the same time, assuming first with Perform a quantum walk, and then with Do a quantum walk. The results after the two-step quantum walk are shown in Table 3.

[0108] Table 3 Execution process of cases that fail certification

[0109]

[0110] due to the single photon sequence and middle and different, causing the authentication process to fail.

[0111] The invention not only proposes an identity authentication method based on quantum walking, but also verifies the method on the IBM quantum cloud platform. Experiments Simulate Controlled Shift Operators in Quantum Walks Using Quantum CNOT Gates T , using the Pauli operator mock coin operator C , using the operator X and single ph...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method based on quantum walking and related equipment. The method comprises the steps: carrying out the two-step quantum walking operation in a constructed quantum walking system through preparing a single photon sequence, carrying out the Z-base measurement of the single photon sequence after the two-step quantum walking, and judging whether a participant passes the identity authentication or not through a measurement result. The identity authentication method provided by the invention is higher in feasibility and practicability, easy to prepare and less in physical resource consumption, and does not need to prepare entangled quantum in the early stage, so that risk leakage caused in the authentication process is avoided, and the security of identity authentication is improved. Meanwhile, according to the identity authentication method provided by the invention, experimental verification is carried out on an IBM quantum cloud platform, and a verification result accords with theoretical derivation, so that the identity authentication method provided by the invention is more practical.

Description

technical field [0001] The invention relates to the technical field of quantum identity authentication, in particular to an identity authentication method based on quantum walking and related equipment. Background technique [0002] Identity authentication refers to the credible process of verifying the identity of the network subject to confirm the identity of the network subject. It appeared around the 1960s and was applied in the field of computer technology. After a long period of development and application, identity authentication technology can be roughly divided into three stages. The first stage mainly includes static passwords, dynamic passwords, and third-party authorized logins. Although there is a risk of identity information leakage, they have not been eliminated. The second generation of identity authentication is represented by public key infrastructure PKI (Public Key Infrastructure) technology and blockchain technology. Asymmetric encryption algorithm, has...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/32H04L9/0855H04L9/0852
Inventor 娄小平王胜
Owner HUNAN NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products