Quantum multi-agent blind signature method

A proxy signer and blind signature technology, applied in key distribution, can solve the problem of breaking Shor algorithm, and achieve the effect of less resources and high efficiency

Pending Publication Date: 2021-12-31
BEIJING INSTITUTE OF GRAPHIC COMMUNICATION
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the signing process, the message owner does not want the signer to know the specific content of the signed document or message, but requires the owner of the document or message to obtain the signer's signature on the real document or message, and most of them are based on public The classic digital signature scheme of key cryptosystem is easily broken by Shor's algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum multi-agent blind signature method
  • Quantum multi-agent blind signature method
  • Quantum multi-agent blind signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] The embodiment of the present invention discloses a quantum multi-agent blind signature method, which includes the following steps:

[0040] S1. The message owner Alice converts the message to be signed into a 2n-bit message string m={m 1 ,m 2 ,...,m n}∈{00,01,10,11}, if the message length is odd, add 0 at the end of the message;

[0041] S2. The trusted third-party Trent distributes the secret key and establishes the quantum channel, and conducts th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum multi-agent blind signature method which comprises the following steps that: S1, a message owner Alice converts a message needing to be signed into a 2n-bit message string m={m1, m2,..., mn} belonging to {00, 01, 10, 11}, and if the length of the message is an odd number, 0 is added to the end of the message; S2, a trusted third-party Trent carries out secret key distribution and quantum channel establishment, and carries out quantum channel security detection; S3, the message owner Alice performs blind processing on the message according to a coding rule to generate a quantum state |M>; S4, the quantum state |M> is authorized and signed; and S5, the signature message is verified. According to the quantum multi-agent blind signature method, the agent signature people are decentralized in power, need to complete signature according to requirements, and do not know specific content of the message, so that leakage of sensitive information is avoided. The quantum multi-agent blind signature method has the advantages of blindness, unforgeability, non-repudiation and the like, and can resist some common attacks.

Description

technical field [0001] The invention relates to the technical field of quantum signatures, in particular to a quantum multi-agent blind signature method. Background technique [0002] At present, with the rapid development of the digital economy, the value of data has become more prominent, data security risks are increasing day by day, and security incidents such as data leakage and data trafficking occur frequently. Data security has become the most urgent and basic security issue in the era of digital economy. Data security governance has become an inherent requirement for maintaining national security. Digital signatures are used to identify the identity of the signer and verify whether the information has been tampered with. During the communication process, authentication services and anti-repudiation services can be provided. Since the digital signature was proposed, people have proposed a variety of signature methods, most of which are based on classical cipher sche...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0852H04L9/3247H04L9/3257H04L2209/76
Inventor 李祯祯陈京京游福成李子臣张珍珍
Owner BEIJING INSTITUTE OF GRAPHIC COMMUNICATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products