天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

非理想條件下量子安全多方計(jì)算協(xié)議的設(shè)計(jì)與分析

發(fā)布時(shí)間:2018-07-31 17:20
【摘要】:量子安全多方計(jì)算要求在完成計(jì)算的同時(shí)使用物理法則保護(hù)信息的安全,相對(duì)于基于數(shù)學(xué)困難問(wèn)題的經(jīng)典安全多方計(jì)算來(lái)說(shuō),它有更高的安全性。但在實(shí)際應(yīng)用中,由于受到設(shè)備、環(huán)境的限制,協(xié)議的安全性、健壯性、可實(shí)現(xiàn)性都會(huì)受到一定的挑戰(zhàn)。為了推動(dòng)量子安全多方計(jì)算的實(shí)際應(yīng)用,必須在各種非理想條件下對(duì)協(xié)議進(jìn)行研究。 本文主要在非理想條件下對(duì)量子安全多方計(jì)算相關(guān)協(xié)議進(jìn)行了設(shè)計(jì)和分析,這些非理想條件包括信源不完美、信道有損耗和噪聲、操作設(shè)備和測(cè)量設(shè)備不完美、長(zhǎng)時(shí)間量子存儲(chǔ)的技術(shù)限制、非誠(chéng)實(shí)的參與者等。所研究的協(xié)議包括量子安全多方計(jì)算協(xié)議的基礎(chǔ)——量子密鑰分配;量子安全多方計(jì)算的幾個(gè)基本協(xié)議——通用的量子安全多方計(jì)算、量子比特承諾、量子不經(jīng)意傳輸;量子安全多方計(jì)算的一個(gè)實(shí)用協(xié)議——量子保密比較等。具體成果如下: 在量子密鑰分配協(xié)議的研究上,我們?cè)O(shè)計(jì)了一個(gè)基于單光子干涉和無(wú)相互作用測(cè)量的量子密鑰分配協(xié)議;在實(shí)際損耗信道環(huán)境下對(duì)反直觀量子密鑰分配方案進(jìn)行了分析,給出了基于損耗率的攻擊方案。 在量子安全多方計(jì)算基本協(xié)議的研究上,我們?cè)O(shè)計(jì)了一種基于前、后選擇量子態(tài)的量子比特承諾協(xié)議;一種基于非破壞性測(cè)量和長(zhǎng)時(shí)間量子存儲(chǔ)器的技術(shù)限制的不經(jīng)意傳輸協(xié)議。對(duì)一個(gè)通用的量子安全多方計(jì)算協(xié)議給出了不誠(chéng)實(shí)參與者的攻擊方法,可以在不被發(fā)現(xiàn)的情況下得到另一方的所有秘密信息,之后給出了改進(jìn)方案。 在量子保密比較協(xié)議的研究上,我們對(duì)一個(gè)量子保密比較協(xié)議給出了不誠(chéng)實(shí)參與者的攻擊方案,可以在不被發(fā)現(xiàn)的前提下以2/3的正確概率得到另一方的秘密比特;然后對(duì)之前的量子保密比較協(xié)議進(jìn)行了分類研究,指出在實(shí)際噪聲環(huán)境下這些協(xié)議的可行性較差;最后給出了分享態(tài)模式的容錯(cuò)量子保密比較協(xié)議,和一種抗聯(lián)合噪聲的基于非脫散態(tài)的量子保密比較協(xié)議。
[Abstract]:Quantum secure multiparty computing requires the use of physical rules to protect the security of information while completing the computation. It is more secure than classical secure multi-party computation based on mathematical difficulties. However, due to the limitation of equipment and environment, the security, robustness and realizability of the protocol will be challenged in practical applications. In order to promote the practical application of quantum secure multiparty computing, the protocol must be studied under various non-ideal conditions. In this paper, we mainly design and analyze the quantum secure multiparty computing protocols under non-ideal conditions. These non-ideal conditions include imperfect source, channel loss and noise, imperfect operating equipment and measuring equipment. Long-term quantum storage technology limitations, dishonest participants, etc. The protocols studied include quantum key distribution, quantum secure multi-party computing protocol, quantum bit commitment, quantum random transmission, quantum secure multi-party computing, quantum secure multi-party computing. A practical protocol for quantum secure multiparty computation-quantum security comparison and so on. The results are as follows: in the research of quantum key distribution protocol, we design a quantum key distribution protocol based on single photon interference and no interaction measurement. The anti-intuitive quantum key distribution scheme is analyzed in the actual loss channel environment, and the attack scheme based on loss rate is presented. In the research of quantum secure multiparty computing protocol, we design a quantum bit commitment protocol based on pre-and post-selective quantum states. A non-destructive measurement and long-time quantum memory based on the technical constraints of the inadvertent transmission protocol. In this paper, a general quantum secure multiparty computing protocol is presented, which can obtain all secret information of the other party without being discovered, and an improved scheme is given. In the research of quantum security comparison protocol, we present a dishonest participant attack scheme for a quantum security comparison protocol, which can obtain the secret bit of the other party with the correct probability of 2 / 3 without being discovered. Then we classify the previous quantum security comparison protocols, and point out that the feasibility of these protocols is poor in the actual noise environment. Finally, we give the fault-tolerant quantum security comparison protocols in the shared state mode. And a kind of quantum security comparison protocol based on non-delamination state against joint noise.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級(jí)別】:博士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN918.1;O413

【參考文獻(xiàn)】

相關(guān)期刊論文 前6條

1 ;Many-Agent Controlled Teleportation of Multi-qubit Quantum Information via Quantum Entanglement Swapping[J];Communications in Theoretical Physics;2005年11期

2 ;Quantum threshold group signature[J];Science in China(Series G:Physics,Mechanics & Astronomy);2008年10期

3 杜建忠;陳秀波;溫巧燕;朱甫臣;;保密多方量子求和[J];物理學(xué)報(bào);2007年11期

4 何立寶;黃劉生;楊威;許瑞;;Cryptanalysis of fair quantum blind signatures[J];Chinese Physics B;2012年03期

5 高飛;溫巧燕;朱甫臣;;Teleportation attack on the QSDC protocol with a random basis and order[J];Chinese Physics B;2008年09期

6 宋婷婷;張R,

本文編號(hào):2156298


資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/2156298.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶c8dcc***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com