量子隱私比較的研究
發(fā)布時(shí)間:2018-03-10 00:32
本文選題:量子隱私比較 切入點(diǎn):五粒子最大糾纏態(tài) 出處:《浙江工商大學(xué)》2017年碩士論文 論文類型:學(xué)位論文
【摘要】:量子密碼是密碼學(xué)與量子力學(xué)相結(jié)合的產(chǎn)物,是量子信息中最值得關(guān)注的一項(xiàng)應(yīng)用。隨著人類計(jì)算能力的飛速提高,特別是量子并行算法的提出,基于計(jì)算復(fù)雜性假設(shè)的經(jīng)典密碼體制的安全性受到了嚴(yán)峻挑戰(zhàn)。量子密碼因其得天獨(dú)厚的優(yōu)勢(shì)已成為密碼新技術(shù)中的一個(gè)重要的研究分支,并且很可能發(fā)展為下一代密碼技術(shù)的重要力量。量子隱私比較作為量子密碼中的一個(gè)重要的研究方向,近幾年得到了眾多學(xué)者的重視并取得了豐富的研究成果。本論文主要研究了量子隱私比較協(xié)議的設(shè)計(jì)與分析,包括隱私比較設(shè)計(jì)方法、攻擊策略和安全性分析三方面,取得了若干研究成果。具體如下:在兩方量子隱私比較協(xié)議設(shè)計(jì)方面,分別基于高度糾纏六粒子純態(tài)和五粒子最大糾纏態(tài),提出了兩個(gè)量子隱私比較協(xié)議。兩個(gè)協(xié)議均采用了實(shí)驗(yàn)上較易實(shí)現(xiàn)的單光子測(cè)量和Bell測(cè)量,而未使用需要消耗昂貴量子設(shè)備的酉操作和量子糾纏交換技術(shù)。兩個(gè)協(xié)議均引入了一個(gè)半誠實(shí)的第三方,并采用量子密鑰分發(fā)方案和誘騙光子技術(shù)保證安全性,從而減少了量子資源的消耗。在這兩個(gè)協(xié)議中,所有粒子的傳輸都是單向的,使得這兩個(gè)協(xié)議都不受特洛伊木馬攻擊的影響。在多方量子隱私比較協(xié)議設(shè)計(jì)方面,基于d級(jí)cat態(tài)與d級(jí)Bell態(tài)的糾纏交換,提出了一個(gè)多方隱私比較協(xié)議,協(xié)議中以信息比較為目的的參與者們利用酉操作編碼秘密信息,他們?cè)谝粋(gè)半誠實(shí)第三方的協(xié)助下,只需執(zhí)行一次協(xié)議就可以判斷他們的秘密信息是否相同。在安全性上,協(xié)議利用了d級(jí)cat態(tài)與d級(jí)Bell態(tài)糾纏交換的特性,無須采用額外生成的密鑰加密信息,從而減少了量子資源的消耗。
[Abstract]:Quantum cryptography is a combination of cryptography and quantum mechanics, which is the most important application of quantum information. The security of classical cryptosystems based on computational complexity hypothesis has been severely challenged. Quantum cryptography has become an important research branch of new cryptography technology because of its unique advantages. Quantum privacy comparison is an important research direction in quantum cryptography. In recent years, many scholars have paid attention to it and made a lot of achievements. In this paper, we mainly study the design and analysis of quantum privacy comparison protocol, including privacy comparison design method, attack strategy and security analysis. Some research results have been obtained. The details are as follows: in the design of the two-party quantum privacy comparison protocol, it is based on the highly entangled six-particle pure state and the five-particle maximum entangled state, respectively. Two quantum privacy comparison protocols are proposed, both of which are easy to implement experimentally and Bell measurements. Both protocols introduce a semi-honest third party and use quantum key distribution scheme and decoy photon technology to ensure security. This reduces the consumption of quantum resources. In both protocols, the transport of all particles is unidirectional, so that neither protocol is affected by Trojan horse attacks. Based on the entanglement exchange between cat state of order d and Bell state of order d, a multi-party privacy comparison protocol is proposed. Participants in the protocol encode secret information using unitary operations with the assistance of a semi-honest third party. In terms of security, the protocol takes advantage of the entanglement exchange between cat state of order d and Bell state of level d, and does not need to use additional key encryption information. Thus reducing the consumption of quantum resources.
【學(xué)位授予單位】:浙江工商大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:O413;TN918.1
【參考文獻(xiàn)】
相關(guān)期刊論文 前3條
1 劉文;王永濱;崔巍;;Quantum Private Comparison Protocol Based on Bell Entangled States[J];Communications in Theoretical Physics;2012年04期
2 宋婷婷;張R,
本文編號(hào):1590996
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/1590996.html
最近更新
教材專著