量子密碼協(xié)議設(shè)計(jì)與量子搜索算法應(yīng)用研究
[Abstract]:With the rapid development of communication technology and computer research, information interaction between people becomes more and more extensive and frequent, and information security is becoming more and more important. The significant improvement of human computing power, especially the proposed quantum parallel algorithm, is a serious threat to the security of the classical secret code system based on Computational complexity. It is the product of the integration of quantum mechanics and classical cryptography. Its security is guaranteed by the basic principles of quantum mechanics and has nothing to do with the computing power of the attackers. Therefore, quantum cryptography has been paid much attention by the researchers of information security, and its research scope is very wide, such as quantum key distribution, quantum secret sharing, quantum authentication, quantum security. The current theories and experiments show that quantum cryptography will be an important part of the next generation information security system. This paper mainly studies the quantum secret sharing and the quantum security direct communication protocol, and has carried out some research on the design of quantum algorithms and obtained some research results. 1. this paper is based on the dynamics of this paper. A dynamic multi-party and multi party quantum secret sharing scheme is designed by two different cluster states. In addition to the above requirements, the secret generator can also restore the information through the cooperation of all members. At the same time, the scheme has the unique entanglement property of cluster states. Not only can we resist the entanglement system attack and the internal deception attack, except for the need to consume some particles because of the detection eavesdropping, the other particles of the key recovery party are involved in the sharing of the key, so the whole scheme has high security and efficiency in the quantum security direct communication. This paper is based on the two particle entanglement state. High efficient quantum secure direct communication scheme. The communication parties encode secret messages by controlled non operation and local unitary transformation respectively, using von Neumann measurement, combined with classical communication to achieve high efficient and direct transmission of secret messages. Since the two parties share two asymmetric quantum subchannels and different coding operations, the secret message is restored to the secret. In the message, the two parties each hold the key qubits that the attacker cannot master, making the protocol a secure.3. quantum algorithm in the ideal and noisy channels. Based on the Grover quantum disorder search algorithm and the birthday attack scheme, the original quantum collision search algorithm is improved. The complexity of 74.7? (2) realizes the collision search for the classical New FORK-256 Hash algorithm, and proves the correctness and efficiency of the improved method. Finally, the attack efficiency of different collision schemes is compared.
【學(xué)位授予單位】:解放軍信息工程大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:O413;TN918.4
【參考文獻(xiàn)】
相關(guān)期刊論文 前8條
1 杜宇韜;鮑皖蘇;;一類多方與多方量子秘密共享方案[J];信息工程大學(xué)學(xué)報(bào);2013年03期
2 許娟;陳漢武;劉文杰;劉志昊;;無糾纏量子秘密共享中酉操作的選擇[J];中國科學(xué):信息科學(xué);2011年07期
3 張盛;張守林;王劍;唐朝京;;基于壓縮態(tài)的多方與多方量子秘密共享[J];中國科學(xué):物理學(xué) 力學(xué) 天文學(xué);2011年07期
4 ;Quantum secret sharing between multiparty and multiparty with Bell states and Bell measurements[J];Science China(Physics,Mechanics & Astronomy);2010年12期
5 ;Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution[J];Science China(Physics,Mechanics & Astronomy);2010年03期
6 王劍;張盛;張守林;張權(quán);;基于純糾纏態(tài)的量子安全直接通信協(xié)議[J];國防科技大學(xué)學(xué)報(bào);2009年02期
7 高飛;郭奮卓;溫巧燕;朱甫臣;;Ping-pong協(xié)議中不同檢測策略的效率比較[J];中國科學(xué)(G輯:物理學(xué) 力學(xué) 天文學(xué));2009年02期
8 夏培肅;量子計(jì)算[J];計(jì)算機(jī)研究與發(fā)展;2001年10期
,本文編號(hào):2153177
本文鏈接:http://sikaile.net/kejilunwen/wltx/2153177.html