非理想条件下量子安全多方计算协议的设计与分析
发布时间:2018-07-31 17:20
【摘要】:量子安全多方计算要求在完成计算的同时使用物理法则保护信息的安全,相对于基于数学困难问题的经典安全多方计算来说,它有更高的安全性。但在实际应用中,由于受到设备、环境的限制,协议的安全性、健壮性、可实现性都会受到一定的挑战。为了推动量子安全多方计算的实际应用,必须在各种非理想条件下对协议进行研究。 本文主要在非理想条件下对量子安全多方计算相关协议进行了设计和分析,这些非理想条件包括信源不完美、信道有损耗和噪声、操作设备和测量设备不完美、长时间量子存储的技术限制、非诚实的参与者等。所研究的协议包括量子安全多方计算协议的基础——量子密钥分配;量子安全多方计算的几个基本协议——通用的量子安全多方计算、量子比特承诺、量子不经意传输;量子安全多方计算的一个实用协议——量子保密比较等。具体成果如下: 在量子密钥分配协议的研究上,我们设计了一个基于单光子干涉和无相互作用测量的量子密钥分配协议;在实际损耗信道环境下对反直观量子密钥分配方案进行了分析,给出了基于损耗率的攻击方案。 在量子安全多方计算基本协议的研究上,我们设计了一种基于前、后选择量子态的量子比特承诺协议;一种基于非破坏性测量和长时间量子存储器的技术限制的不经意传输协议。对一个通用的量子安全多方计算协议给出了不诚实参与者的攻击方法,可以在不被发现的情况下得到另一方的所有秘密信息,之后给出了改进方案。 在量子保密比较协议的研究上,我们对一个量子保密比较协议给出了不诚实参与者的攻击方案,可以在不被发现的前提下以2/3的正确概率得到另一方的秘密比特;然后对之前的量子保密比较协议进行了分类研究,指出在实际噪声环境下这些协议的可行性较差;最后给出了分享态模式的容错量子保密比较协议,和一种抗联合噪声的基于非脱散态的量子保密比较协议。
[Abstract]:Quantum secure multiparty computing requires the use of physical rules to protect the security of information while completing the computation. It is more secure than classical secure multi-party computation based on mathematical difficulties. However, due to the limitation of equipment and environment, the security, robustness and realizability of the protocol will be challenged in practical applications. In order to promote the practical application of quantum secure multiparty computing, the protocol must be studied under various non-ideal conditions. In this paper, we mainly design and analyze the quantum secure multiparty computing protocols under non-ideal conditions. These non-ideal conditions include imperfect source, channel loss and noise, imperfect operating equipment and measuring equipment. Long-term quantum storage technology limitations, dishonest participants, etc. The protocols studied include quantum key distribution, quantum secure multi-party computing protocol, quantum bit commitment, quantum random transmission, quantum secure multi-party computing, quantum secure multi-party computing. A practical protocol for quantum secure multiparty computation-quantum security comparison and so on. The results are as follows: in the research of quantum key distribution protocol, we design a quantum key distribution protocol based on single photon interference and no interaction measurement. The anti-intuitive quantum key distribution scheme is analyzed in the actual loss channel environment, and the attack scheme based on loss rate is presented. In the research of quantum secure multiparty computing protocol, we design a quantum bit commitment protocol based on pre-and post-selective quantum states. A non-destructive measurement and long-time quantum memory based on the technical constraints of the inadvertent transmission protocol. In this paper, a general quantum secure multiparty computing protocol is presented, which can obtain all secret information of the other party without being discovered, and an improved scheme is given. In the research of quantum security comparison protocol, we present a dishonest participant attack scheme for a quantum security comparison protocol, which can obtain the secret bit of the other party with the correct probability of 2 / 3 without being discovered. Then we classify the previous quantum security comparison protocols, and point out that the feasibility of these protocols is poor in the actual noise environment. Finally, we give the fault-tolerant quantum security comparison protocols in the shared state mode. And a kind of quantum security comparison protocol based on non-delamination state against joint noise.
【学位授予单位】:北京邮电大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TN918.1;O413
[Abstract]:Quantum secure multiparty computing requires the use of physical rules to protect the security of information while completing the computation. It is more secure than classical secure multi-party computation based on mathematical difficulties. However, due to the limitation of equipment and environment, the security, robustness and realizability of the protocol will be challenged in practical applications. In order to promote the practical application of quantum secure multiparty computing, the protocol must be studied under various non-ideal conditions. In this paper, we mainly design and analyze the quantum secure multiparty computing protocols under non-ideal conditions. These non-ideal conditions include imperfect source, channel loss and noise, imperfect operating equipment and measuring equipment. Long-term quantum storage technology limitations, dishonest participants, etc. The protocols studied include quantum key distribution, quantum secure multi-party computing protocol, quantum bit commitment, quantum random transmission, quantum secure multi-party computing, quantum secure multi-party computing. A practical protocol for quantum secure multiparty computation-quantum security comparison and so on. The results are as follows: in the research of quantum key distribution protocol, we design a quantum key distribution protocol based on single photon interference and no interaction measurement. The anti-intuitive quantum key distribution scheme is analyzed in the actual loss channel environment, and the attack scheme based on loss rate is presented. In the research of quantum secure multiparty computing protocol, we design a quantum bit commitment protocol based on pre-and post-selective quantum states. A non-destructive measurement and long-time quantum memory based on the technical constraints of the inadvertent transmission protocol. In this paper, a general quantum secure multiparty computing protocol is presented, which can obtain all secret information of the other party without being discovered, and an improved scheme is given. In the research of quantum security comparison protocol, we present a dishonest participant attack scheme for a quantum security comparison protocol, which can obtain the secret bit of the other party with the correct probability of 2 / 3 without being discovered. Then we classify the previous quantum security comparison protocols, and point out that the feasibility of these protocols is poor in the actual noise environment. Finally, we give the fault-tolerant quantum security comparison protocols in the shared state mode. And a kind of quantum security comparison protocol based on non-delamination state against joint noise.
【学位授予单位】:北京邮电大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TN918.1;O413
【参考文献】
相关期刊论文 前6条
1 ;Many-Agent Controlled Teleportation of Multi-qubit Quantum Information via Quantum Entanglement Swapping[J];Communications in Theoretical Physics;2005年11期
2 ;Quantum threshold group signature[J];Science in China(Series G:Physics,Mechanics & Astronomy);2008年10期
3 杜建忠;陈秀波;温巧燕;朱甫臣;;保密多方量子求和[J];物理学报;2007年11期
4 何立宝;黄刘生;杨威;许瑞;;Cryptanalysis of fair quantum blind signatures[J];Chinese Physics B;2012年03期
5 高飞;温巧燕;朱甫臣;;Teleportation attack on the QSDC protocol with a random basis and order[J];Chinese Physics B;2008年09期
6 宋婷婷;张R,
本文编号:2156298
本文链接:https://www.wllwen.com/kejilunwen/wltx/2156298.html