Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

54 results about "Quantum walk" patented technology

Quantum walks are quantum analogues of classical random walks. In contrast to the classical random walk, where the walker occupies definite states and the randomness arises due to stochastic transitions between states, in quantum walks randomness arises through: (1) quantum superposition of states, (2) non-random, reversible unitary evolution and (3) collapse of the wave function due to state measurements.

Arbitration quantum signature method based on glass color sampling random unitary operation

The invention discloses an arbitration quantum signature method based on glass color sampling random unitary operation. The arbitration quantum signature method comprises an initialization stage, a signature stage and a verification stage. The initialization stage is used for preparing a secret key and establishing a communication system; the signature stage is used for selecting a proper signature algorithm to design the signature of the transmission information; and the verification stage is used for verifying the validity of the signer and the integrity and authenticity of original information. According to the invention, unitary operation encryption based on glass color sampling is adopted in the signature of transmission information designed in arbitration quantum signature; an m-modequantum state is transferred by adopting quantum walk invisible transmission based on a graph, a necessary entanglement state for invisible transmission does not need to be prepared in advance, the safety is higher by adopting a common channel and a random tuple, and a glass color sampling model and a quantum walk invisible transmission model are proved to be realized through a linear optical network; and therefore, the method disclosed by the invention is high in safety, resource-saving and easy to implement in experiment.
Owner:CENT SOUTH UNIV

Unentangled quantum blind signature method and system based on quantum walking

ActiveCN110213060AProven robustnessAchieve the effect of one-time pad (OTP)Key distribution for secure communicationUser identity/authority verificationE-commerceBlind signature
The invention belongs to the technical field of quantum information processing, and discloses an unentangled quantum blind signature method and system based on quantum walking, and the method comprises the steps: carrying out the coding and blind information through employing four single event states in combination with a blind coding rule of a message in the coding stage of the message; in the invisible transmission process of the coded particles, using quantum walking to achieve invisible transmission of the coded particles, wherein entanglement is spontaneously generated on the invisible transmission seed particles, which is used for resisting negative attacks of signers and denial attacks of verifiers and further used for preventing attackers from forgery signatures. The method comprises secret key updating, the effect of one-time encryption (OTP) is achieved, and therefore a next execution scheme does not need secret key redistribution any more; security analysis shows that the scheme of the invention satisfies the characteristics of unforgeability, undeniable property and blindness, can also resist entanglement attack, and is very suitable for use in electronic commerce or electronic payment systems.
Owner:芽米科技(广州)有限公司

Quantum secret sharing method and sharing system based on quantum walking

ActiveCN110445609ARealize teleportationSafe and feasible technologyKey distribution for secure communicationQuantum secret sharingComputer network
The invention belongs to the technical field of quantum information sharing, and discloses a quantum secret sharing method and sharing system based on quantum walk, and the method comprises the steps:enabling a secret distributor to encode secret information to be shared into a quantum state according to a rule, and enabling an encoding particle to be split into two parts; invisibly transferringthe two pieces of encrypted information to a first participant and a second participant through a quantum walking system; and the first participant and the second participant decrypt the secret information of the secret distributor through cooperation. Characteristics of the quantum walking system are used for invisible state transfer of unknown particles, entanglement is spontaneously generated among the particles, and preparation of entangled particles in a particle preparation stage is avoided to complete invisible state transfer of the particles. According to the quantum secret sharing method based on quantum walking, an invisible state transfer method based on quantum walking is combined with a coding rule, and the quantum secret sharing method based on quantum walking is completed.
Owner:HEFEI LONGTUTEM INFORMATION TECH CO LTD

Image encryption compression method based on discrete quantum walk and Chinese remainder theorem

The invention relates to an image encryption compression method based on a discrete quantum walk and a Chinese remainder theorem. The method comprises two phases: a secret key generation phase, i.e., generating probability distribution by use of a linear single particle one-dimensional discrete quantum random walk (QRW), and converting the probability distribution into a secret key matrix capable of encryption; and an image encryption compression phase, i.e., compressing an image by use of the generated secret key matrix and the Chinese remainder theorem. XOR operation is performed on an obtained encryption secret key and an original image, afterwards, Arnold transformation is performed on an obtained image. Diffusion and compression are carried out on a scrambling image according to a given compression ratio k by use of the Chinese remainder theorem. Compared to an image encryption compression scheme based on chaos and optics, the method provided by the invention has higher safety and better compression performance. The greatest advantage of the algorithm is that a theoretical infinite large secret key space can be generated so as to oppose a violent attack capability. Various performance comparisons indicate that the algorithm is better than prior research and can better satisfy actual demands.
Owner:BEIJING UNIV OF TECH

Integratable light quantum walking device based on photonic crystal auto-collimation effect

The invention discloses an integratable light quantum walking device based on the photonic crystal auto-collimation effect. Tetragonal lattice air holes or an energy band structure and an equi-frequency line of a dielectric cylinder photonic crystal are utilized, a first or a second energy band is taken to establish beam splitters in the Gamma-X or Gamma-M direction and arrange the beam splitters in the Gamma-M or Gamma-X direction, wherein beam splitter nodes in the Gamma-X or Gamma-M direction are increased at intervals of fixed transmission distances. The integratable light quantum walking device utilizes the advantages that auto-collimation light beams in the photonic crystal do not diverge during transmission and are free of crosstalk when being crossed, adopts a 3dB beam splitter array to form a micronanoelectronic device capable of being used for light quantum walking and belongs to the fields of semiconductor integrated optical technologies and quantum information science.
Owner:INST OF SEMICONDUCTORS - CHINESE ACAD OF SCI

Image encryption method based on on-ring two particle one-dimensional discrete quantum walk

The invention relates to an image encryption method based on on-ring two particle one-dimensional discrete quantum walk. The purpose is to guarantee safety and high efficiency of an image encryption algorithm and effectively protect an image. The method includes the steps that (1), on-ring two particle one-dimensional discrete quantum walk is used for generating a secrete key matrix; the on-ring two particle one-dimensional discrete quantum walk is operated to generate probability distribution which is converted to a secrete key sequence S, and the sequence S is converted into a matrix P; (2), the image is encrypted, logic exclusive or is performed on the matrix P and the original image I to generate a mixed image E, M values and N values are randomly and respectively selected from the sequence S, so that a sequence X and a sequence Y are respectively obtained, and ascending sort is performed on the two sequences to respectively obtain two new sequences. The two new sequences IX and IY are used for rearranging the encrypted image E to obtain a final encrypted image E'. Compared with an existing image encryption method, the image encryption method is easier to operate, higher in speed, better in performance and encryption quality and capable of meeting practical needs better.
Owner:BEIJING UNIV OF TECH

Photonic crystal-based integratable quantum walking device

ActiveCN103235362AEasy to integrateOptical light guidesPhotonic crystalQuantum information science
The invention discloses a photonic crystal-based integratable quantum walking device. By utilizing the limit characteristic of photonic crystal to light fields, intercoupling and interference among the light fields of a wider range are realized, so that quantum walking of photons is realized on an integrated optical device of which the dimension is extremely small. The invention belongs to the field of semiconductor integrated optical technology and the quantum information science.
Owner:INST OF SEMICONDUCTORS - CHINESE ACAD OF SCI

Quantum walking-based quantum secret sharing method and system with credible authentication

The invention provides a quantum walking-based quantum secret sharing method with credible authentication. The method comprises the following steps: a secret participation end preparing single photonsequences SB and SC, encoding the SB and SC according to an identity authentication key of the secret participation end to obtain SB' and SC ', and sending the SB' and SC' to a secret distribution end; the secret distribution end authenticating the identity of the secret distribution end based on the identity authentication key of the secret participation end; the secret distribution end constructing two quantum walking systems based on the SB and the SC, encoding secret information to be shared to the SB and the SC, and recording secret information encoding particles as MB and MC; the secretdistribution end invisibly transmitting the MB and the MC to the secret participation end; the secret participation ends cooperating with each other to complete identity authentication of the secret distribution end and reconstruction of secret information. According to the trusted identity authentication function and the quantum walking circuit, the safety and practicability of the quantum secretsharing method and system can be improved, and interception / retransmission attacks, entanglement attacks, participant attacks and pretending attacks from the inside and the outside are avoided.
Owner:龙图腾网科技(合肥)股份有限公司

Traffic flow modal fitting method based on quantum random walk

ActiveCN112614336ARealize modeling simulationGeometric CADDetection of traffic movementAlgorithmEngineering
The invention discloses a traffic flow modal fitting method based on quantum random walk. The method comprises the following steps: (1) constructing a modal generator based on quantum random walk; (2) multi-modal preparation; (3) modal screening; and (4) constructing a mapping mechanism between the mode and the traffic flow. According to the method, the high-speed traffic flow is considered to be a complex geographic space-time process formed by aliasing and coupling a plurality of traffic flow modes with different structures, and modeling simulation of the traffic flow is attempted to be realized from the perspective of multi-scale analysis; all possible traffic flow modes in high-speed traffic flow are generated by utilizing quantum random walk under a basic framework of an expressway network topological structure; under the constraint of an actual traffic flow time sequence, modal screening is achieved based on a specific screening rule, a conversion coupling mechanism between a traffic flow modal and traffic flow is explored, and modeling simulation of high-speed traffic flow is achieved.
Owner:NANJING NORMAL UNIVERSITY

Identity authentication method based on quantum walking and related equipment

The invention provides an identity authentication method based on quantum walking and related equipment. The method comprises the steps: carrying out the two-step quantum walking operation in a constructed quantum walking system through preparing a single photon sequence, carrying out the Z-base measurement of the single photon sequence after the two-step quantum walking, and judging whether a participant passes the identity authentication or not through a measurement result. The identity authentication method provided by the invention is higher in feasibility and practicability, easy to prepare and less in physical resource consumption, and does not need to prepare entangled quantum in the early stage, so that risk leakage caused in the authentication process is avoided, and the security of identity authentication is improved. Meanwhile, according to the identity authentication method provided by the invention, experimental verification is carried out on an IBM quantum cloud platform, and a verification result accords with theoretical derivation, so that the identity authentication method provided by the invention is more practical.
Owner:HUNAN NORMAL UNIVERSITY

Traffic flow characteristic modal decomposition method based on generation-filtering mechanism

The invention discloses a traffic flow characteristic modal decomposition method based on a generation-filtering mechanism, and the method comprises the steps: firstly enabling a high-speed traffic flow to serve as a closed traffic system, enabling each driver to serve as an independent particle according to the randomness of the drivers, simulating a path track, and calculating the probability distribution of the track according to the probability distribution of the track under different parameters; obtaining a corresponding traffic mode; secondly, taking different quantum random walk parameters, obtaining time evolution of traffic flow probability distribution caused by different driving modes on the stations, and then transforming the different stations to form the high-speed traffic flow mode set; and finally, screening the generated traffic modes according to the actually observed traffic flow data, and inverting to obtain the mode structure of the traffic flow. The complex structure and multi-modal characteristics of the traffic flow are disclosed from the perspective of multi-scale decomposition, a certain reference is provided for traffic management, prediction and regulation, and the method has great significance in solving various traffic problems faced by the current society.
Owner:NANJING NORMAL UNIVERSITY

Integrated photonic chip structure for universal quantum walk simulation

The present invention discloses an integrated photonic chip structure for universal quantum walk simulation which combines the multiphoton source that can generate the spatially entangled multi-photon state and the linear optical network that can implement the unitary transformation, and establishes mapping between on-chip spatial-entangled multi-photon state and quantum walk state and mapping between on-chip linear optical unitary transformation and the evolution process of multi-particle quantum walk. By manipulating the spatially entangled multi-photon state generated via the multi-photon sources and the optical unitary transformation implemented via the universal linear optical networks, the chip structure can implement universal quantum walk simulation with the control over all parameters of multiple-particle quantum walks including such as evolution Hamiltonian, evolution time, initial evolution state and particle properties (i.e., particle indistinguishability and particle exchange symmetry).
Owner:NAT UNIV OF DEFENSE TECH

Robust image watermarking method based on quantum random walk and discrete wavelet transform

The invention discloses a robust image watermarking method based on quantum random walk and discrete wavelet transform, and aims to improve robustness and select to embed watermarks in a frequency domain. The discrete wavelet transform has the advantages that the discrete wavelet transform has good discreteness and spatial locality; important information in the image is compressed through discrete cosine transform, and the important information is concentrated and stepwise on the upper left portion of a coefficient matrix. The SVD coefficients provide high robustness, visual quality, and data payload. Second-level discrete wavelet transform is applied to a carrier image, and watermark embedding is completed in a high-frequency coefficient HH2 of the carrier image, so that the robustness of the watermark is ensured, and better visual quality of the carrier image is kept. After 2-DWT is carried out on a carrier image, the carrier image is divided into blocks, DCT operation is carried out on each block, and main energy of the image is further extracted. In order to not influence the visual quality as far as possible, the watermarking is embedded in the alternating current coefficient, and the watermarking is embedded into the singular value of the block by performing singular value decomposition on the watermarking.
Owner:BEIJING UNIV OF TECH

Method for realizing information integrity based on continuous quantum walk hash algorithm

The invention discloses a method for realizing information integrity based on a continuous quantum walk hash algorithm. The method comprises the following steps: selecting a Hamiltonian operator according to the bit of a binary message; secondly, constructing a quantum hash algorithm by message control based on continuous quantum walk on bounded one-dimensional crystal lattices to realize information integrity; and finally, analyzing the safety and the efficiency of the constructed quantum hash algorithm by using a simulation experiment. The hash algorithm based on continuous quantum walk hasthe advantages that the efficiency of the quantum hash algorithm is obviously improved when files with the same size are calculated; and the collision performance is lower. According to the method, people can be promoted to construct a new quantum computing model and explore the application of the hash algorithm in the cryptology field to realize information integrity, and the fusion of quantum computing and traditional cryptography is further promoted. Meanwhile, the method can also be used as a key technology for password application such as digital signature and message authentication, andis widely applied to the fields of finance, securities, electronic commerce and the like.
Owner:BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products