Novel arbitration quantum signature method based on XOR encryption and GHZ state

A new type of quantum technology, applied in the field of quantum communication, can solve the problems of technical realization and application difficulties, and achieve the effect of simple operation

Pending Publication Date: 2022-05-27
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still difficulties in the current technical realization and application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel arbitration quantum signature method based on XOR encryption and GHZ state
  • Novel arbitration quantum signature method based on XOR encryption and GHZ state
  • Novel arbitration quantum signature method based on XOR encryption and GHZ state

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0061] Example 1: m={011} is a 3-bit message. Suppose that by using the hash function and the key k A Calculated to get t A1 =G 1 (m||k A ) = {010} and t A2 =G 2 (m||k A )={101}. According to the coding rules shown in Table 1, we can get in

[0062] Step 2Alice uses sequence A as a control bit, sequence P A As a target, the CNOT operation is performed to obtain

[0063]

example 2

[0064] Example 2: Let all data be as described in Example 1. Then according to example 1 and step 2, we can get

[0065]

[0066]

[0067]

[0068] Step 3 Through eavesdropping detection technology, Alice safely Send to Bob. Alice, on the other hand, sends message m to Bob over the classical channel.

[0069] Step 4 Through wiretap detection technology, Bob securely receives Bob, on the other hand, receives message m over the classical channel. Finally, Bob will as Alice's signature.

[0070] The signature verification steps mainly include four steps:

[0071] Bob checks the signature with the following verification steps Validity of:

[0072]Step 5Bob uses sequence B as the control bit, and the sequence As the target position, the control NOT gate operation CNOT is performed. This operation can be expressed as

example 3

[0073] Example 3: Let all data be as described in Example 2. Then according to example 2 and verification step 5, we can get

[0074]

[0075]

[0076]

[0077] Step 6Bob sends a message to Trent through eavesdropping detection technology where |m>=|m 1 m 2 ...m n >.

[0078] Example 4: Let all data be as described in Example 1. It can be known from example 1 that |m>=|011>.

[0079] Step 7 Through eavesdropping detection technology, Trent is safely obtained Trent then uses the sequence T as a control bit, while the sequence As the target position, the control NOT gate CNOT operation is performed. The operation can be expressed as:

[0080]

[0081] Example 5: Let all data be as described in Examples 3 and 4. Then according to the verification step 7, we can get

[0082]

[0083]

[0084]

[0085] easy to prove Here, for simplicity, use express Bob, on the other hand, can easily derive m from |m> by measuring each |m with an orthonormal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a novel arbitration quantum signature method based on XOR encryption and a GHZ state. The novel arbitration quantum signature method comprises three steps of initialization, signature generation and signature verification. Firstly, an arbiter and a signer use a group of one-way hash functions and share a shared key; secondly, the signer performs quantum coding on the quantum message by using a key control hash function, and performs control NOT gate operation on the quantum message by using a control bit in a GHZ state to generate a quantum signature; and finally, a verifier performs similar XOR operation to verify the signature by using the control bit in the GHZ state. Compared with other arbitration quantum signature methods, key distribution and encryption of the method do not involve complex encryption methods or quantum operations, and forgery attacks and denial attacks can be effectively resisted; on the basis of meeting the requirements of safety, unforgeability and non-repudiation, the method disclosed by the invention is more practical and higher in efficiency.

Description

technical field [0001] The invention relates to the technical field of quantum communication, in particular to a novel arbitration quantum signature method based on XOR encryption and GHZ state. Background technique [0002] A digital signature is a digital analog to a traditional manual signature. It can guarantee the authenticity, integrity and non-repudiation of the electronic information sent by the source. The security of most traditional digital signatures based on mathematical problems relies on mathematically difficult assumptions and cannot deal with the security threats of quantum computers. One of the great advantages of quantum signatures is that their security relies on the fundamental principles of quantum mechanics, which can theoretically deal with the security threats of quantum computers. In 2001, Gottesman and Chuang first proposed the concept of quantum signature and proposed a design scheme of quantum signature. However, in their scheme, the signer's ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/06H04L9/08H04L9/32
CPCH04L9/002H04L9/0852H04L9/085H04L9/0643H04L9/3247
Inventor 辛向军丁立李朝阳张天源
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products