基于多粒子糾纏態(tài)的量子密碼協(xié)議研究
發(fā)布時(shí)間:2018-11-18 11:44
【摘要】:量子密碼學(xué)是經(jīng)典密碼學(xué)和量子力學(xué)衍生的結(jié)合體。和經(jīng)典密碼學(xué)相比,由于量子密碼的安全性完全依賴于量子力學(xué)的基本原理,故它具備理論上的無(wú)條件安全性。因此,研究者們?cè)噲D利用量子力學(xué)的基本原理來(lái)解決一些經(jīng)典密碼學(xué)無(wú)法解決或者難以解決的安全問(wèn)題,如密鑰分發(fā)、圖像水印、數(shù)字簽名等,并在此基礎(chǔ)上形成了系統(tǒng)的理論體系。量子糾纏態(tài)作為量子信息領(lǐng)域的一個(gè)重要的資源,它具有十分特別的性質(zhì),即糾纏性。利用量子糾纏態(tài)的這一特性,人們?cè)O(shè)計(jì)了一些精妙的量子密碼協(xié)議,如量子秘鑰分發(fā)、量子隱形傳態(tài)、量子并行計(jì)算等。本文對(duì)一些常見(jiàn)的多粒子糾纏態(tài)進(jìn)行研究,并在此基礎(chǔ)上設(shè)計(jì)了四個(gè)量子密碼協(xié)議。這些協(xié)議分別是:1、基于Greenberger-Horne-Zeilinger (GHZ)態(tài)的量子公平盲簽名方案。在這個(gè)方案中,我們利用哈希函數(shù)(Hash)和隨機(jī)數(shù)來(lái)生成簽名者、仲裁者和發(fā)送者選擇的測(cè)量基的信息,再聯(lián)合GHZ態(tài)的關(guān)聯(lián)性分別對(duì)各自手中的粒子進(jìn)行測(cè)量,進(jìn)而產(chǎn)生簽名所用的信息,最終完成整個(gè)盲簽名過(guò)程。對(duì)該方案的安全性分析表明該方案滿足公平盲簽名方案的安全性要求,即不可偽造性、不可否認(rèn)性、盲性和可追蹤性。2、具有雙向認(rèn)證功能的多方量子密鑰分發(fā)。該協(xié)議利用GHZ態(tài)的糾纏特性,實(shí)現(xiàn)具有雙向認(rèn)證功能的多方量子密鑰分發(fā)協(xié)議,并利用帶密鑰的單向Hash函數(shù)技術(shù)對(duì)每個(gè)用戶的身份進(jìn)行認(rèn)證。該協(xié)議的安全性分析表明該協(xié)議在理論上是安全的。3、基于最低有效位的量子圖像水印。該方案通過(guò)置換載體圖像灰度值的某一個(gè)比特把水印圖像嵌入到量子載體圖像的某些像素中。這些像素的位置是由一個(gè)私鑰決定的。只有擁有這個(gè)私鑰的版權(quán)者才可以在無(wú)需初始載體圖像的前提下提取出水印信息。該水印方案的計(jì)算機(jī)仿真實(shí)驗(yàn)表明,該方案實(shí)現(xiàn)了水印的不可見(jiàn)性,并具有良好的可伸縮性。4、基于重復(fù)碼的量子圖像水印方案。該方案首先使用重復(fù)碼對(duì)水印圖像進(jìn)行編碼,然后把編碼后的水印圖像嵌入到載體圖像像素點(diǎn)的某些灰度比特中。只有知道水印嵌入的像素點(diǎn)和比特位置的版權(quán)者才可以提取出水印信息。由于使用了重復(fù)碼處理水印,故該水印方案具有一定的魯棒性。此外,該水印方案的計(jì)算機(jī)仿真和分析也表明了該方案是有效的。
[Abstract]:Quantum cryptography is a combination of classical cryptography and quantum mechanics derivation. Compared with classical cryptography, the security of quantum cryptography is completely dependent on the basic principles of quantum mechanics, so it has unconditional security in theory. Therefore, researchers try to use the basic principles of quantum mechanics to solve some security problems which cannot be solved or difficult to solve by classical cryptography, such as key distribution, image watermarking, digital signature, etc. On this basis, a systematic theoretical system is formed. As an important resource in the field of quantum information, quantum entangled states have very special properties, namely entanglement. Based on the properties of quantum entangled states, some sophisticated quantum cryptographic protocols are designed, such as quantum secret key distribution, quantum teleportation, quantum parallel computation, etc. In this paper, some common multi-particle entangled states are studied, and four quantum cryptographic protocols are designed. These protocols are as follows: 1. Quantum fair blind signature scheme based on Greenberger-Horne-Zeilinger (GHZ) state. In this scheme, we use the hash function (Hash) and the random number to generate the information of the measurement basis selected by the signer, the arbiter and the sender, and then combine the correlation of the GHZ states to measure the particles in their hands, respectively. Then the information used in the signature is generated and the whole blind signature process is finally completed. The security analysis of the scheme shows that the scheme meets the security requirements of the fair blind signature scheme, that is, non-forgery, non-repudiation, blindness and traceability, and multi-party quantum key distribution with bidirectional authentication. The protocol utilizes the entanglement property of GHZ state to realize the multi-party quantum key distribution protocol with bidirectional authentication function and authenticates the identity of each user by using one-way Hash function technology with key. The security analysis of the protocol shows that the protocol is theoretically secure. 3. The quantum image watermarking based on the lowest significant bit is proposed. In this scheme, the watermark image is embedded into some pixels of the quantum carrier image by replacing a bit of the gray value of the carrier image. The location of these pixels is determined by a private key. Only the copyright owner who owns the private key can extract the watermark information without the initial carrier image. The computer simulation results show that the proposed scheme achieves the invisibility of the watermark and has good scalability. 4. Quantum image watermarking scheme based on repetition code is proposed. The scheme firstly encodes the watermark image by repetition code, and then embeds the encoded watermark image into some gray bits of the pixel of the carrier image. Only the copyright who knows the pixel and bit position of the watermark can extract the watermark. Because the watermark is processed by repeated code, the scheme is robust to a certain extent. In addition, the computer simulation and analysis of the watermarking scheme also show that the scheme is effective.
【學(xué)位授予單位】:福建師范大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2015
【分類號(hào)】:O413;TN918.4
本文編號(hào):2339952
[Abstract]:Quantum cryptography is a combination of classical cryptography and quantum mechanics derivation. Compared with classical cryptography, the security of quantum cryptography is completely dependent on the basic principles of quantum mechanics, so it has unconditional security in theory. Therefore, researchers try to use the basic principles of quantum mechanics to solve some security problems which cannot be solved or difficult to solve by classical cryptography, such as key distribution, image watermarking, digital signature, etc. On this basis, a systematic theoretical system is formed. As an important resource in the field of quantum information, quantum entangled states have very special properties, namely entanglement. Based on the properties of quantum entangled states, some sophisticated quantum cryptographic protocols are designed, such as quantum secret key distribution, quantum teleportation, quantum parallel computation, etc. In this paper, some common multi-particle entangled states are studied, and four quantum cryptographic protocols are designed. These protocols are as follows: 1. Quantum fair blind signature scheme based on Greenberger-Horne-Zeilinger (GHZ) state. In this scheme, we use the hash function (Hash) and the random number to generate the information of the measurement basis selected by the signer, the arbiter and the sender, and then combine the correlation of the GHZ states to measure the particles in their hands, respectively. Then the information used in the signature is generated and the whole blind signature process is finally completed. The security analysis of the scheme shows that the scheme meets the security requirements of the fair blind signature scheme, that is, non-forgery, non-repudiation, blindness and traceability, and multi-party quantum key distribution with bidirectional authentication. The protocol utilizes the entanglement property of GHZ state to realize the multi-party quantum key distribution protocol with bidirectional authentication function and authenticates the identity of each user by using one-way Hash function technology with key. The security analysis of the protocol shows that the protocol is theoretically secure. 3. The quantum image watermarking based on the lowest significant bit is proposed. In this scheme, the watermark image is embedded into some pixels of the quantum carrier image by replacing a bit of the gray value of the carrier image. The location of these pixels is determined by a private key. Only the copyright owner who owns the private key can extract the watermark information without the initial carrier image. The computer simulation results show that the proposed scheme achieves the invisibility of the watermark and has good scalability. 4. Quantum image watermarking scheme based on repetition code is proposed. The scheme firstly encodes the watermark image by repetition code, and then embeds the encoded watermark image into some gray bits of the pixel of the carrier image. Only the copyright who knows the pixel and bit position of the watermark can extract the watermark. Because the watermark is processed by repeated code, the scheme is robust to a certain extent. In addition, the computer simulation and analysis of the watermarking scheme also show that the scheme is effective.
【學(xué)位授予單位】:福建師范大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2015
【分類號(hào)】:O413;TN918.4
【參考文獻(xiàn)】
相關(guān)期刊論文 前2條
1 ;Experimental implementation of a fixed-point duality quantum search algorithm in the nuclear magnetic resonance quantum system[J];Science China(Physics,Mechanics & Astronomy);2011年05期
2 吳華;趙于康;趙勇;趙梅生;;實(shí)用化光纖量子加密電話網(wǎng)絡(luò)和高速數(shù)據(jù)傳輸系統(tǒng)——現(xiàn)場(chǎng)應(yīng)用與安全管理[J];中國(guó)科學(xué):信息科學(xué);2014年03期
,本文編號(hào):2339952
本文鏈接:http://sikaile.net/kejilunwen/wltx/2339952.html
最近更新
教材專著